Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7v200217 -
submitted
07-03-2020 23:23
Static task
static1
Behavioral task
behavioral1
Sample
vps43.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
vps43.exe
Resource
win10v200217
General
-
Target
vps43.exe
-
Size
654KB
-
MD5
c176c662c99aa9e1d36f4717ca27f078
-
SHA1
338655f5b87439da2546a35f11ce761b84821fec
-
SHA256
bdfa4ada92b902def37a7ea83f6c4be174a9e63ebc5701f8ec4e01b126556b44
-
SHA512
049627032aa01d9f150f849eb496f6d832a9a64dc0debc57345bff1fc21d74ccb0584c7d758334f0c445717864c40a2b192d363ef7ce6d201a598e8663e461ff
Malware Config
Extracted
danabot
5.61.56.192
5.61.58.130
2.56.212.4
58.188.144.17
123.112.255.121
73.95.154.165
18.179.60.205
47.1.50.27
109.115.156.127
2.56.213.39
226.24.58.229
214.251.0.68
118.124.17.69
32.5.51.86
207.17.93.111
109.80.105.108
Signatures
-
Danabot x86 payload 19 IoCs
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\vps43.dll family_danabot \Users\Admin\AppData\Local\Temp\vps43.dll family_danabot \Users\Admin\AppData\Local\Temp\vps43.dll family_danabot \Users\Admin\AppData\Local\Temp\vps43.dll family_danabot \Users\Admin\AppData\Local\Temp\vps43.dll family_danabot \Users\Admin\AppData\Local\Temp\vps43.dll family_danabot C:\ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot \ProgramData\D9051812\CD07E3A9.dll family_danabot -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 1 1888 rundll32.exe -
Executes dropped EXE 2 IoCs
Processes:
winlogon.exeservices.exepid process 408 winlogon.exe 464 services.exe -
Sets DLL path for service in the registry 2 TTPs
-
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 35 IoCs
Processes:
regsvr32.exerundll32.exerundll32.exerundll32.exerundll32.exeRUNDLL32.EXEsvchost.exerundll32.exeRUNDLL32.EXErundll32.exeExplorer.EXEpid process 1868 regsvr32.exe 1888 rundll32.exe 1888 rundll32.exe 1888 rundll32.exe 1888 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 1928 rundll32.exe 1956 rundll32.exe 1956 rundll32.exe 1956 rundll32.exe 1956 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 740 RUNDLL32.EXE 740 RUNDLL32.EXE 740 RUNDLL32.EXE 740 RUNDLL32.EXE 1360 svchost.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1636 RUNDLL32.EXE 1636 RUNDLL32.EXE 1636 RUNDLL32.EXE 1636 RUNDLL32.EXE 1472 rundll32.exe 1472 rundll32.exe 1472 rundll32.exe 1472 rundll32.exe 1292 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc process File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Z: svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXErundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Processes:
IEXPLORE.EXEIEXPLORE.EXEExplorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C02B811-60D3-11EA-B893-66B7C47E4B19} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE -
Modifies data under HKEY_USERS 20 IoCs
Processes:
RUNDLL32.EXErundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer = "127.0.0.1:8080" RUNDLL32.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates RUNDLL32.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings RUNDLL32.EXE Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings RUNDLL32.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\root rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\root RUNDLL32.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs RUNDLL32.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "1" RUNDLL32.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" RUNDLL32.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer = "127.0.0.1:8080" RUNDLL32.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates rundll32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings RUNDLL32.EXE Set value (int) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "1" RUNDLL32.EXE Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer = "127.0.0.1:8080" RUNDLL32.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs RUNDLL32.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 RUNDLL32.EXE Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "1" RUNDLL32.EXE -
Modifies registry class 11 IoCs
Processes:
RUNDLL32.EXEExplorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Software\Microsoft\Windows\CurrentVersion\Internet Settings RUNDLL32.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer = "127.0.0.1:8080" RUNDLL32.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Internet Settings RUNDLL32.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Software\Microsoft RUNDLL32.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Software\Microsoft\Windows\CurrentVersion RUNDLL32.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Software RUNDLL32.EXE Key created \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Software\Microsoft\Windows RUNDLL32.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1848298919-2336104428-4012071465-1000_CLASSES\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "1" RUNDLL32.EXE -
Processes:
RUNDLL32.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D0CF39C472A26FE0E63F61F59F073CE1C5703A9B RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D0CF39C472A26FE0E63F61F59F073CE1C5703A9B\Blob = 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 RUNDLL32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1284 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exerundll32.exeRUNDLL32.EXErundll32.exeRUNDLL32.EXEpid process 1360 svchost.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1636 RUNDLL32.EXE 1360 svchost.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1472 rundll32.exe 1360 svchost.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 740 RUNDLL32.EXE 740 RUNDLL32.EXE 1472 rundll32.exe 1472 rundll32.exe 1472 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1360 svchost.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1540 rundll32.exe 1360 svchost.exe 1540 rundll32.exe 1540 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Explorer.EXEvlc.exepid process 1292 Explorer.EXE 1284 vlc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
RUNDLL32.EXErundll32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 740 RUNDLL32.EXE Token: SeDebugPrivilege 2016 rundll32.exe Token: SeShutdownPrivilege 1292 Explorer.EXE Token: SeShutdownPrivilege 1292 Explorer.EXE Token: SeShutdownPrivilege 1292 Explorer.EXE -
Suspicious use of FindShellTrayWindow 43 IoCs
Processes:
vlc.exeExplorer.EXEIEXPLORE.EXEpid process 1284 vlc.exe 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1076 IEXPLORE.EXE -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
vlc.exeExplorer.EXEpid process 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1284 vlc.exe 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
vlc.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1284 vlc.exe 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
vps43.exeregsvr32.exerundll32.exerundll32.exerundll32.exesvchost.exeExplorer.EXEdescription pid process target process PID 1836 wrote to memory of 1868 1836 vps43.exe regsvr32.exe PID 1836 wrote to memory of 1868 1836 vps43.exe regsvr32.exe PID 1836 wrote to memory of 1868 1836 vps43.exe regsvr32.exe PID 1836 wrote to memory of 1868 1836 vps43.exe regsvr32.exe PID 1836 wrote to memory of 1868 1836 vps43.exe regsvr32.exe PID 1836 wrote to memory of 1868 1836 vps43.exe regsvr32.exe PID 1836 wrote to memory of 1868 1836 vps43.exe regsvr32.exe PID 1868 wrote to memory of 1888 1868 regsvr32.exe rundll32.exe PID 1868 wrote to memory of 1888 1868 regsvr32.exe rundll32.exe PID 1868 wrote to memory of 1888 1868 regsvr32.exe rundll32.exe PID 1868 wrote to memory of 1888 1868 regsvr32.exe rundll32.exe PID 1868 wrote to memory of 1888 1868 regsvr32.exe rundll32.exe PID 1868 wrote to memory of 1888 1868 regsvr32.exe rundll32.exe PID 1868 wrote to memory of 1888 1868 regsvr32.exe rundll32.exe PID 1888 wrote to memory of 1928 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1928 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1928 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1928 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1928 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1928 1888 rundll32.exe rundll32.exe PID 1888 wrote to memory of 1928 1888 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1956 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1956 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1956 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1956 1928 rundll32.exe rundll32.exe PID 1956 wrote to memory of 2016 1956 rundll32.exe rundll32.exe PID 1956 wrote to memory of 2016 1956 rundll32.exe rundll32.exe PID 1956 wrote to memory of 2016 1956 rundll32.exe rundll32.exe PID 1956 wrote to memory of 2016 1956 rundll32.exe rundll32.exe PID 1956 wrote to memory of 2016 1956 rundll32.exe rundll32.exe PID 1956 wrote to memory of 2016 1956 rundll32.exe rundll32.exe PID 1956 wrote to memory of 2016 1956 rundll32.exe rundll32.exe PID 1956 wrote to memory of 740 1956 rundll32.exe RUNDLL32.EXE PID 1956 wrote to memory of 740 1956 rundll32.exe RUNDLL32.EXE PID 1956 wrote to memory of 740 1956 rundll32.exe RUNDLL32.EXE PID 1360 wrote to memory of 1540 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1540 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1540 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1540 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1540 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1540 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1540 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 408 1360 svchost.exe winlogon.exe PID 1360 wrote to memory of 1636 1360 svchost.exe RUNDLL32.EXE PID 1360 wrote to memory of 1636 1360 svchost.exe RUNDLL32.EXE PID 1360 wrote to memory of 1636 1360 svchost.exe RUNDLL32.EXE PID 1360 wrote to memory of 1472 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1472 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1472 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1472 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1472 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1472 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 1472 1360 svchost.exe rundll32.exe PID 1360 wrote to memory of 464 1360 svchost.exe services.exe PID 1360 wrote to memory of 1292 1360 svchost.exe Explorer.EXE PID 1292 wrote to memory of 1284 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1284 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1284 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1604 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1604 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1604 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1460 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1460 1292 Explorer.EXE vlc.exe PID 1292 wrote to memory of 1460 1292 Explorer.EXE vlc.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Executes dropped EXE
PID:408
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Executes dropped EXE
PID:464 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\syswow64\rundll32.exeC:\Windows\syswow64\rundll32.exe C:\ProgramData\D9051812\CD07E3A9.dll,f33⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\system32\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\ProgramData\D9051812\CF2FCDD2.dll,f73⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\syswow64\rundll32.exeC:\Windows\syswow64\rundll32.exe C:\ProgramData\D9051812\CD07E3A9.dll,f2 E48E292D52AA1264BCBA6B30A9CB21133⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1228
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\vps43.exe"C:\Users\Admin\AppData\Local\Temp\vps43.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\vps43.dll f1 C:\Users\Admin\AppData\Local\Temp\vps43.exe@18363⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\vps43.dll,f04⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\\rundll32.exe C:\PROGRA~3\D9051812\CF2FCDD2.dll,f1 C:\Users\Admin\AppData\Local\Temp\vps43.dll@18885⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\\rundll32.exe C:\PROGRA~3\D9051812\CF2FCDD2.dll,f1 C:\Users\Admin\AppData\Local\Temp\vps43.dll@18886⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\syswow64\rundll32.exeC:\Windows\syswow64\rundll32.exe C:\ProgramData\D9051812\CD07E3A9.dll,f2 F7090F619059A3AAB3E71D0ADA4623727⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\system32\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\ProgramData\D9051812\CF2FCDD2.dll,f2 1FCAAAC36182D72B5B244331A74217017⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:1604
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:1460
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:564
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:1948
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:1324
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:2040
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:2004
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:652
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnregisterPop.mov"2⤵PID:1152
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵PID:984
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
C:\ProgramData\D9051812\20129F6A\4F9BDE7B42DBE5AE84E6339ECC4B71BEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\D9051812\20129F6A\87802788B350C3EA82E557F2257B9C60MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\D9051812\20129F6A\AF7B88CC7BE9BE91E068EB437C44825BMD5
a5907d1885324f06eaf120e7cb2a9741
SHA1da550352caf09244a095f71a8c25acca0ae90118
SHA256f5552a32c5f76dc53463c209f5b7bb8e3ab29ba14c3c4927316e529ff5c05d4a
SHA5128f0c874ffdf24e26f73eeed2a387805093145f3b418144a2445995cdac5dee63b4da209f06e96fe02252f8c0c66f50f574f0ca5b610fdafcd9b506ff2f7a0ab2
-
C:\ProgramData\D9051812\61BD9CDCMD5
0ee9d785173f697d63a4d82b08caf479
SHA1f2c140b2ff3b3d62c4bb52267dd71e40194c6744
SHA256c80aaf45801805b6c8384bb67b143c9328f9442010d16c43b2994162267f0025
SHA512553f12eebee219d0b12f7c083a1cffcbedc8e86c1357e49916ddd79c04e0faded3c7c826bdf1c9e542e321b71f5a6c9e60722dbb26d6dfe7375b0cfbd2d3480f
-
C:\ProgramData\D9051812\79515B93MD5
050f39768b733d05e827228545990251
SHA1736855b529e00f52a97e0f6a92cea86667f505aa
SHA2565ba54fc13c5e94998530b2cf4ae1b1d6298ba362ad39f3d184bedfeb8a6c8a12
SHA5124f287504f189942fe4ca5c3ba692ee9a0be13eabe359c0d70feefe1692baae790a1e4a43b1fcd16cefbd557f37f96baf6615cc5b4e37ab6172a33119818051db
-
C:\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\fff2299a8401b31b9764267bee70284a_cb3421d8-e2c8-4b12-9d02-76148b2a4ecfMD5
378b9fbbb7eabbeb28a8e9b36f3778b4
SHA11ab7fe35ded20f856431b8e0b37ee7c1e1998d45
SHA2568e99e9d40bc6b60c40cfefb598599d14d0dbd2a45cc944fb1ed95c6925ecfd13
SHA512d83007c1ca9f094163e72db4baa44ca8f4dfef83d7fe98646aa8c76a2b53d4617158327d22d48e8b1841d576b780a70c805e7b7140119503da7b684eac90515a
-
C:\Users\Admin\AppData\Local\Temp\vps43.dllMD5
4f9fa16fe2323e13808087594fadc338
SHA17fbe423126dbbbeebcc1822f6064f284761ebe20
SHA25671c03d255720b8df14c654a95efdca74dda27edb65b6e82d9d94153d584a28a4
SHA512c26197831942da3e46eb5cc866731af6ee2fff0839a3f63710e9f0afea14fc42fc565d57f441c0226a6eb7cc65a664534af90882a118c51042e02e86313d4676
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\PROGRA~3\D9051812\CF2FCDD2.dllMD5
ade73e21c54f060701cd58561a4f783f
SHA1cc548ab84ad8a23af61d28dc42fc13e58119af4a
SHA256db9a46d6f969770d385199241e3749afaeb90156d33b2bba17ae07ef33a2051e
SHA512063e7268baa0a249f58b6f916b703d7217509a29c66611bd75563274ba368f1e4be9326383c6459ffeea02076240f12a6ebce0df4599a11791af849ef1cc111e
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\ProgramData\D9051812\CD07E3A9.dllMD5
0f12dbaac78319b78cf36e688f1ec1cc
SHA1b81cd1a9eb8718fca785010762a3222f3d900307
SHA256975e133d367301a5157ec5340b279758003ca0892e7b57aa63dfc13d8d65a536
SHA512faeacd483072b99948cf6af8cc38535319dd02c34980fb83cdd764544ad43195b490b660f73f582a6984fa76459219999555fb3d8c83382875a1cbf184a9c8b6
-
\Users\Admin\AppData\Local\Temp\vps43.dllMD5
4f9fa16fe2323e13808087594fadc338
SHA17fbe423126dbbbeebcc1822f6064f284761ebe20
SHA25671c03d255720b8df14c654a95efdca74dda27edb65b6e82d9d94153d584a28a4
SHA512c26197831942da3e46eb5cc866731af6ee2fff0839a3f63710e9f0afea14fc42fc565d57f441c0226a6eb7cc65a664534af90882a118c51042e02e86313d4676
-
\Users\Admin\AppData\Local\Temp\vps43.dllMD5
4f9fa16fe2323e13808087594fadc338
SHA17fbe423126dbbbeebcc1822f6064f284761ebe20
SHA25671c03d255720b8df14c654a95efdca74dda27edb65b6e82d9d94153d584a28a4
SHA512c26197831942da3e46eb5cc866731af6ee2fff0839a3f63710e9f0afea14fc42fc565d57f441c0226a6eb7cc65a664534af90882a118c51042e02e86313d4676
-
\Users\Admin\AppData\Local\Temp\vps43.dllMD5
4f9fa16fe2323e13808087594fadc338
SHA17fbe423126dbbbeebcc1822f6064f284761ebe20
SHA25671c03d255720b8df14c654a95efdca74dda27edb65b6e82d9d94153d584a28a4
SHA512c26197831942da3e46eb5cc866731af6ee2fff0839a3f63710e9f0afea14fc42fc565d57f441c0226a6eb7cc65a664534af90882a118c51042e02e86313d4676
-
\Users\Admin\AppData\Local\Temp\vps43.dllMD5
4f9fa16fe2323e13808087594fadc338
SHA17fbe423126dbbbeebcc1822f6064f284761ebe20
SHA25671c03d255720b8df14c654a95efdca74dda27edb65b6e82d9d94153d584a28a4
SHA512c26197831942da3e46eb5cc866731af6ee2fff0839a3f63710e9f0afea14fc42fc565d57f441c0226a6eb7cc65a664534af90882a118c51042e02e86313d4676
-
\Users\Admin\AppData\Local\Temp\vps43.dllMD5
4f9fa16fe2323e13808087594fadc338
SHA17fbe423126dbbbeebcc1822f6064f284761ebe20
SHA25671c03d255720b8df14c654a95efdca74dda27edb65b6e82d9d94153d584a28a4
SHA512c26197831942da3e46eb5cc866731af6ee2fff0839a3f63710e9f0afea14fc42fc565d57f441c0226a6eb7cc65a664534af90882a118c51042e02e86313d4676
-
memory/408-42-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/408-45-0x00000000030A0000-0x0000000003317000-memory.dmpFilesize
2.5MB
-
memory/408-50-0x0000000003320000-0x0000000003460000-memory.dmpFilesize
1.2MB
-
memory/408-52-0x0000000003320000-0x0000000003460000-memory.dmpFilesize
1.2MB
-
memory/464-65-0x0000000001D80000-0x0000000001FF7000-memory.dmpFilesize
2.5MB
-
memory/464-70-0x0000000002000000-0x0000000002140000-memory.dmpFilesize
1.2MB
-
memory/464-72-0x0000000002000000-0x0000000002140000-memory.dmpFilesize
1.2MB
-
memory/740-30-0x00000000028B0000-0x0000000002C1E000-memory.dmpFilesize
3.4MB
-
memory/740-29-0x0000000002210000-0x0000000002487000-memory.dmpFilesize
2.5MB
-
memory/1292-463-0x00000000072C0000-0x00000000072C4000-memory.dmpFilesize
16KB
-
memory/1292-501-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-650-0x0000000004900000-0x0000000004904000-memory.dmpFilesize
16KB
-
memory/1292-634-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-633-0x0000000006360000-0x0000000006364000-memory.dmpFilesize
16KB
-
memory/1292-632-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-631-0x0000000006360000-0x0000000006364000-memory.dmpFilesize
16KB
-
memory/1292-630-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-529-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-527-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-525-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-523-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-521-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-519-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-517-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-515-0x0000000007A80000-0x0000000007A84000-memory.dmpFilesize
16KB
-
memory/1292-511-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-509-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-92-0x0000000006DF0000-0x0000000007067000-memory.dmpFilesize
2.5MB
-
memory/1292-96-0x0000000007070000-0x00000000071B0000-memory.dmpFilesize
1.2MB
-
memory/1292-98-0x0000000007070000-0x00000000071B0000-memory.dmpFilesize
1.2MB
-
memory/1292-507-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-505-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-503-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-499-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-497-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-495-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-493-0x0000000007910000-0x0000000007914000-memory.dmpFilesize
16KB
-
memory/1292-491-0x0000000007390000-0x0000000007394000-memory.dmpFilesize
16KB
-
memory/1292-487-0x0000000007390000-0x0000000007394000-memory.dmpFilesize
16KB
-
memory/1292-483-0x0000000007390000-0x0000000007394000-memory.dmpFilesize
16KB
-
memory/1292-481-0x0000000007390000-0x0000000007394000-memory.dmpFilesize
16KB
-
memory/1292-479-0x0000000007390000-0x0000000007394000-memory.dmpFilesize
16KB
-
memory/1292-477-0x0000000007390000-0x0000000007394000-memory.dmpFilesize
16KB
-
memory/1292-465-0x00000000072C0000-0x00000000072C4000-memory.dmpFilesize
16KB
-
memory/1292-459-0x00000000072C0000-0x00000000072C4000-memory.dmpFilesize
16KB
-
memory/1292-457-0x00000000072C0000-0x00000000072C4000-memory.dmpFilesize
16KB
-
memory/1292-455-0x00000000072C0000-0x00000000072C4000-memory.dmpFilesize
16KB
-
memory/1292-453-0x00000000072C0000-0x00000000072C4000-memory.dmpFilesize
16KB
-
memory/1292-445-0x00000000071B0000-0x00000000071B4000-memory.dmpFilesize
16KB
-
memory/1292-444-0x0000000004900000-0x0000000004904000-memory.dmpFilesize
16KB
-
memory/1292-443-0x00000000071B0000-0x00000000071B4000-memory.dmpFilesize
16KB
-
memory/1292-442-0x0000000004900000-0x0000000004904000-memory.dmpFilesize
16KB
-
memory/1292-441-0x00000000071B0000-0x00000000071B4000-memory.dmpFilesize
16KB
-
memory/1360-369-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-59-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-427-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-664-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-429-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-652-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-423-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-398-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-397-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-649-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-380-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-474-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-475-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-379-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-378-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-377-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-375-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-374-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-373-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-372-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-60-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-370-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-663-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-428-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-33-0x0000000002370000-0x00000000025E7000-memory.dmpFilesize
2.5MB
-
memory/1360-61-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-41-0x0000000002E60000-0x0000000002E71000-memory.dmpFilesize
68KB
-
memory/1360-36-0x0000000003190000-0x00000000031A1000-memory.dmpFilesize
68KB
-
memory/1360-86-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-84-0x00000000034D0000-0x00000000034E1000-memory.dmpFilesize
68KB
-
memory/1360-82-0x00000000030C0000-0x00000000030D1000-memory.dmpFilesize
68KB
-
memory/1360-35-0x0000000002D80000-0x0000000002D91000-memory.dmpFilesize
68KB
-
memory/1472-169-0x0000000003450000-0x0000000003461000-memory.dmpFilesize
68KB
-
memory/1472-80-0x0000000003450000-0x0000000003461000-memory.dmpFilesize
68KB
-
memory/1472-71-0x00000000028C0000-0x0000000003166000-memory.dmpFilesize
8.6MB
-
memory/1472-170-0x0000000003860000-0x0000000003871000-memory.dmpFilesize
68KB
-
memory/1472-171-0x0000000003450000-0x0000000003461000-memory.dmpFilesize
68KB
-
memory/1472-79-0x0000000003860000-0x0000000003871000-memory.dmpFilesize
68KB
-
memory/1472-78-0x0000000003450000-0x0000000003461000-memory.dmpFilesize
68KB
-
memory/1472-58-0x0000000002420000-0x00000000025AC000-memory.dmpFilesize
1.5MB
-
memory/1540-44-0x0000000002410000-0x000000000259C000-memory.dmpFilesize
1.5MB
-
memory/1636-51-0x0000000002420000-0x0000000002697000-memory.dmpFilesize
2.5MB
-
memory/1836-0-0x000000000487B000-0x000000000487C000-memory.dmpFilesize
4KB
-
memory/1836-1-0x0000000006080000-0x0000000006091000-memory.dmpFilesize
68KB
-
memory/1956-18-0x0000000002320000-0x0000000002597000-memory.dmpFilesize
2.5MB
-
memory/2016-31-0x00000000027C0000-0x0000000002C76000-memory.dmpFilesize
4.7MB
-
memory/2016-28-0x00000000023A0000-0x000000000252C000-memory.dmpFilesize
1.5MB