Analysis
-
max time kernel
290s -
max time network
290s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-02-2021 09:44
Static task
static1
URLScan task
urlscan1
Sample
https://crackheap.net/
Behavioral task
behavioral1
Sample
https://crackheap.net/
Resource
win10v20201028
Behavioral task
behavioral2
Sample
https://crackheap.net/
Resource
win10v20201028
Behavioral task
behavioral3
Sample
https://crackheap.net/
Resource
win10v20201028
General
-
Target
https://crackheap.net/
-
Sample
210215-fe9bcqlt6e
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
raccoon
8a5ae6012868ca42851ee67a7adea59c46a3fb6d
-
url4cnc
https://telete.in/jdiavolenok23
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1396-160-0x0000000000400000-0x000000000042C000-memory.dmp family_redline behavioral2/memory/1396-161-0x0000000000423FCA-mapping.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 32 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exefile.exeD497.tmp.exeD64C.tmp.exeD795.tmp.exekeygen-step-2.exeD881.tmp.exekeygen-step-2.exeD64C.tmp.exeSetup.exeBC863AABC388D491.exeBC863AABC388D491.exemd2_2efs.exe1613385761402.exe1613385763621.exeD795.tmp.exeD795.tmp.exeBTRSetp.exe5482357.447708831.848336782.916237771.68gdrrr.exeThunderFW.exejfiag3g_gg.exeWindows Host.exejfiag3g_gg.exepid process 4068 keygen-pr.exe 4016 keygen-step-1.exe 2136 keygen-step-2.exe 2240 keygen-step-3.exe 508 keygen-step-4.exe 2984 key.exe 3068 file.exe 1624 D497.tmp.exe 3960 D64C.tmp.exe 1732 D795.tmp.exe 384 keygen-step-2.exe 2212 D881.tmp.exe 1020 keygen-step-2.exe 4224 D64C.tmp.exe 4500 Setup.exe 4788 BC863AABC388D491.exe 4800 BC863AABC388D491.exe 4904 md2_2efs.exe 5064 1613385761402.exe 732 1613385763621.exe 736 D795.tmp.exe 1396 D795.tmp.exe 4136 BTRSetp.exe 1336 5482357.44 4332 7708831.84 4424 8336782.91 4668 6237771.68 4692 gdrrr.exe 4900 ThunderFW.exe 1008 jfiag3g_gg.exe 3996 Windows Host.exe 4208 jfiag3g_gg.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6237771.688336782.91description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6237771.68 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8336782.91 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8336782.91 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6237771.68 -
Loads dropped DLL 9 IoCs
Processes:
D497.tmp.exeMsiExec.exepid process 1624 D497.tmp.exe 1624 D497.tmp.exe 1624 D497.tmp.exe 1624 D497.tmp.exe 1624 D497.tmp.exe 1624 D497.tmp.exe 1624 D497.tmp.exe 1624 D497.tmp.exe 4840 MsiExec.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4424-205-0x0000000000B20000-0x0000000000B21000-memory.dmp themida behavioral2/memory/4668-211-0x0000000000C40000-0x0000000000C41000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7708831.84gdrrr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 7708831.84 Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gdrrr.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
BC863AABC388D491.exeBC863AABC388D491.exemd2_2efs.exe8336782.916237771.68Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8336782.91 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6237771.68 Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 91 api.ipify.org 129 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Setup.exeBC863AABC388D491.exeBC863AABC388D491.exedescription ioc process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 BC863AABC388D491.exe File opened for modification \??\PhysicalDrive0 BC863AABC388D491.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Setup.exe8336782.916237771.68pid process 4500 Setup.exe 4424 8336782.91 4668 6237771.68 -
Suspicious use of SetThreadContext 6 IoCs
Processes:
keygen-step-2.exekeygen-step-2.exeD64C.tmp.exeBC863AABC388D491.exeD795.tmp.exedescription pid process target process PID 2136 set thread context of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 384 set thread context of 1020 384 keygen-step-2.exe keygen-step-2.exe PID 3960 set thread context of 4224 3960 D64C.tmp.exe D64C.tmp.exe PID 4788 set thread context of 4680 4788 BC863AABC388D491.exe firefox.exe PID 4788 set thread context of 4328 4788 BC863AABC388D491.exe firefox.exe PID 1732 set thread context of 1396 1732 D795.tmp.exe D795.tmp.exe -
Drops file in Program Files directory 3 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File created C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File created C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe -
Drops file in Windows directory 8 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{9A2A452C-3057-4F5E-8C7F-41B0D566B831} msiexec.exe File opened for modification C:\Windows\Installer\MSIF410.tmp msiexec.exe File created C:\Windows\Installer\f76f0d6.msi msiexec.exe File created C:\Windows\Installer\f76f0d4.msi msiexec.exe File opened for modification C:\Windows\Installer\f76f0d4.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4180 384 WerFault.exe keygen-step-2.exe 4256 4904 WerFault.exe md2_2efs.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exeBC863AABC388D491.exeBC863AABC388D491.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc BC863AABC388D491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName BC863AABC388D491.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
keygen-step-2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 keygen-step-2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString keygen-step-2.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4604 timeout.exe 4660 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4700 taskkill.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 7fd9c04391add601 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "361887597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{409E342B-6F7A-11EB-B59A-C288FA2082BC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30868359" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002d3c457c933cd543b474509608ea7496000000000200000000001066000000010000200000002749f7ba48ae33a1607e330e98ac80d5223b1b377bf2176e97580a69ac1241f6000000000e800000000200002000000053454664bd94e2d0fc0bb95d54d2db6472e4914fd537a4689763c79ae482b7722000000091d5a95922cd9c8e570f1005f6d81abca2b5e2688009b986e2a1410929807f4240000000ff03baade9cda896ec72c5839e5d798ad8db474fb4a15d0416c8e007afeb8d47faa603a5d9694c37d37a87255d5f6c570ac24c9e9a7ddf09ea41f84e8d5adbd4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "361887597" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "320150620" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "320167214" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{5B90831B-F905-46F5-94AF-1BF2D63CF54C}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30868359" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "320199206" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30868359" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d093ab0f8703d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "393450678" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
file.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 1 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings iexplore.exe -
Processes:
file.exekeygen-step-2.exeSetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 file.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe -
Runs ping.exe 1 TTPs 6 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 860 PING.EXE 4392 PING.EXE 3908 PING.EXE 4264 PING.EXE 4528 PING.EXE 4948 PING.EXE -
Suspicious behavior: EnumeratesProcesses 59 IoCs
Processes:
WerFault.exefile.exekeygen-step-2.exe1613385761402.exeWerFault.exe1613385763621.exeD795.tmp.exejfiag3g_gg.exe5482357.44D795.tmp.exe8336782.91msiexec.exepid process 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 4180 WerFault.exe 3068 file.exe 3068 file.exe 1020 keygen-step-2.exe 1020 keygen-step-2.exe 3068 file.exe 3068 file.exe 5064 1613385761402.exe 5064 1613385761402.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 4256 WerFault.exe 732 1613385763621.exe 732 1613385763621.exe 1732 D795.tmp.exe 1732 D795.tmp.exe 4208 jfiag3g_gg.exe 4208 jfiag3g_gg.exe 1336 5482357.44 1336 5482357.44 1396 D795.tmp.exe 1396 D795.tmp.exe 1336 5482357.44 1396 D795.tmp.exe 4424 8336782.91 4424 8336782.91 4744 msiexec.exe 4744 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
D795.tmp.exeWerFault.exefile.exemsiexec.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1732 D795.tmp.exe Token: SeRestorePrivilege 4180 WerFault.exe Token: SeBackupPrivilege 4180 WerFault.exe Token: SeDebugPrivilege 4180 WerFault.exe Token: SeDebugPrivilege 3068 file.exe Token: SeShutdownPrivilege 4684 msiexec.exe Token: SeIncreaseQuotaPrivilege 4684 msiexec.exe Token: SeSecurityPrivilege 4744 msiexec.exe Token: SeCreateTokenPrivilege 4684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4684 msiexec.exe Token: SeLockMemoryPrivilege 4684 msiexec.exe Token: SeIncreaseQuotaPrivilege 4684 msiexec.exe Token: SeMachineAccountPrivilege 4684 msiexec.exe Token: SeTcbPrivilege 4684 msiexec.exe Token: SeSecurityPrivilege 4684 msiexec.exe Token: SeTakeOwnershipPrivilege 4684 msiexec.exe Token: SeLoadDriverPrivilege 4684 msiexec.exe Token: SeSystemProfilePrivilege 4684 msiexec.exe Token: SeSystemtimePrivilege 4684 msiexec.exe Token: SeProfSingleProcessPrivilege 4684 msiexec.exe Token: SeIncBasePriorityPrivilege 4684 msiexec.exe Token: SeCreatePagefilePrivilege 4684 msiexec.exe Token: SeCreatePermanentPrivilege 4684 msiexec.exe Token: SeBackupPrivilege 4684 msiexec.exe Token: SeRestorePrivilege 4684 msiexec.exe Token: SeShutdownPrivilege 4684 msiexec.exe Token: SeDebugPrivilege 4684 msiexec.exe Token: SeAuditPrivilege 4684 msiexec.exe Token: SeSystemEnvironmentPrivilege 4684 msiexec.exe Token: SeChangeNotifyPrivilege 4684 msiexec.exe Token: SeRemoteShutdownPrivilege 4684 msiexec.exe Token: SeUndockPrivilege 4684 msiexec.exe Token: SeSyncAgentPrivilege 4684 msiexec.exe Token: SeEnableDelegationPrivilege 4684 msiexec.exe Token: SeManageVolumePrivilege 4684 msiexec.exe Token: SeImpersonatePrivilege 4684 msiexec.exe Token: SeCreateGlobalPrivilege 4684 msiexec.exe Token: SeCreateTokenPrivilege 4684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4684 msiexec.exe Token: SeLockMemoryPrivilege 4684 msiexec.exe Token: SeIncreaseQuotaPrivilege 4684 msiexec.exe Token: SeMachineAccountPrivilege 4684 msiexec.exe Token: SeTcbPrivilege 4684 msiexec.exe Token: SeSecurityPrivilege 4684 msiexec.exe Token: SeTakeOwnershipPrivilege 4684 msiexec.exe Token: SeLoadDriverPrivilege 4684 msiexec.exe Token: SeSystemProfilePrivilege 4684 msiexec.exe Token: SeSystemtimePrivilege 4684 msiexec.exe Token: SeProfSingleProcessPrivilege 4684 msiexec.exe Token: SeIncBasePriorityPrivilege 4684 msiexec.exe Token: SeCreatePagefilePrivilege 4684 msiexec.exe Token: SeCreatePermanentPrivilege 4684 msiexec.exe Token: SeBackupPrivilege 4684 msiexec.exe Token: SeRestorePrivilege 4684 msiexec.exe Token: SeShutdownPrivilege 4684 msiexec.exe Token: SeDebugPrivilege 4684 msiexec.exe Token: SeAuditPrivilege 4684 msiexec.exe Token: SeSystemEnvironmentPrivilege 4684 msiexec.exe Token: SeChangeNotifyPrivilege 4684 msiexec.exe Token: SeRemoteShutdownPrivilege 4684 msiexec.exe Token: SeUndockPrivilege 4684 msiexec.exe Token: SeSyncAgentPrivilege 4684 msiexec.exe Token: SeEnableDelegationPrivilege 4684 msiexec.exe Token: SeManageVolumePrivilege 4684 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exemsiexec.exepid process 412 iexplore.exe 412 iexplore.exe 4684 msiexec.exe 4684 msiexec.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 412 iexplore.exe 412 iexplore.exe 3916 IEXPLORE.EXE 3916 IEXPLORE.EXE 3916 IEXPLORE.EXE 3916 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeWindows_7_Professional_x86_keygen_by_KeygenNinja.execmd.exekeygen-step-3.exekeygen-step-4.exekeygen-pr.exekey.execmd.exekeygen-step-2.exefile.exedescription pid process target process PID 412 wrote to memory of 3916 412 iexplore.exe IEXPLORE.EXE PID 412 wrote to memory of 3916 412 iexplore.exe IEXPLORE.EXE PID 412 wrote to memory of 3916 412 iexplore.exe IEXPLORE.EXE PID 412 wrote to memory of 2148 412 iexplore.exe IEXPLORE.EXE PID 412 wrote to memory of 2148 412 iexplore.exe IEXPLORE.EXE PID 412 wrote to memory of 2148 412 iexplore.exe IEXPLORE.EXE PID 4080 wrote to memory of 836 4080 Windows_7_Professional_x86_keygen_by_KeygenNinja.exe cmd.exe PID 4080 wrote to memory of 836 4080 Windows_7_Professional_x86_keygen_by_KeygenNinja.exe cmd.exe PID 4080 wrote to memory of 836 4080 Windows_7_Professional_x86_keygen_by_KeygenNinja.exe cmd.exe PID 836 wrote to memory of 4068 836 cmd.exe keygen-pr.exe PID 836 wrote to memory of 4068 836 cmd.exe keygen-pr.exe PID 836 wrote to memory of 4068 836 cmd.exe keygen-pr.exe PID 836 wrote to memory of 4016 836 cmd.exe keygen-step-1.exe PID 836 wrote to memory of 4016 836 cmd.exe keygen-step-1.exe PID 836 wrote to memory of 4016 836 cmd.exe keygen-step-1.exe PID 836 wrote to memory of 2136 836 cmd.exe keygen-step-2.exe PID 836 wrote to memory of 2136 836 cmd.exe keygen-step-2.exe PID 836 wrote to memory of 2136 836 cmd.exe keygen-step-2.exe PID 836 wrote to memory of 2240 836 cmd.exe keygen-step-3.exe PID 836 wrote to memory of 2240 836 cmd.exe keygen-step-3.exe PID 836 wrote to memory of 2240 836 cmd.exe keygen-step-3.exe PID 836 wrote to memory of 508 836 cmd.exe keygen-step-4.exe PID 836 wrote to memory of 508 836 cmd.exe keygen-step-4.exe PID 836 wrote to memory of 508 836 cmd.exe keygen-step-4.exe PID 2240 wrote to memory of 496 2240 keygen-step-3.exe cmd.exe PID 2240 wrote to memory of 496 2240 keygen-step-3.exe cmd.exe PID 2240 wrote to memory of 496 2240 keygen-step-3.exe cmd.exe PID 508 wrote to memory of 3068 508 keygen-step-4.exe file.exe PID 508 wrote to memory of 3068 508 keygen-step-4.exe file.exe PID 508 wrote to memory of 3068 508 keygen-step-4.exe file.exe PID 4068 wrote to memory of 2984 4068 keygen-pr.exe key.exe PID 4068 wrote to memory of 2984 4068 keygen-pr.exe key.exe PID 4068 wrote to memory of 2984 4068 keygen-pr.exe key.exe PID 2984 wrote to memory of 1328 2984 key.exe key.exe PID 2984 wrote to memory of 1328 2984 key.exe key.exe PID 2984 wrote to memory of 1328 2984 key.exe key.exe PID 496 wrote to memory of 3908 496 cmd.exe PING.EXE PID 496 wrote to memory of 3908 496 cmd.exe PING.EXE PID 496 wrote to memory of 3908 496 cmd.exe PING.EXE PID 2136 wrote to memory of 1624 2136 keygen-step-2.exe D497.tmp.exe PID 2136 wrote to memory of 1624 2136 keygen-step-2.exe D497.tmp.exe PID 2136 wrote to memory of 1624 2136 keygen-step-2.exe D497.tmp.exe PID 3068 wrote to memory of 3960 3068 file.exe D64C.tmp.exe PID 3068 wrote to memory of 3960 3068 file.exe D64C.tmp.exe PID 3068 wrote to memory of 3960 3068 file.exe D64C.tmp.exe PID 3068 wrote to memory of 1732 3068 file.exe D795.tmp.exe PID 3068 wrote to memory of 1732 3068 file.exe D795.tmp.exe PID 3068 wrote to memory of 1732 3068 file.exe D795.tmp.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 2136 wrote to memory of 384 2136 keygen-step-2.exe keygen-step-2.exe PID 3068 wrote to memory of 2212 3068 file.exe D881.tmp.exe PID 3068 wrote to memory of 2212 3068 file.exe D881.tmp.exe PID 3068 wrote to memory of 2212 3068 file.exe D881.tmp.exe PID 2136 wrote to memory of 1232 2136 keygen-step-2.exe cmd.exe PID 2136 wrote to memory of 1232 2136 keygen-step-2.exe cmd.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://crackheap.net/1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:412 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:412 CREDAT:148483 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp2_Windows_7_Professional_x86_keygen_by_KeygenNinja.zip\Windows_7_Professional_x86_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_Windows_7_Professional_x86_keygen_by_KeygenNinja.zip\Windows_7_Professional_x86_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\D497.tmp.exe"C:\Users\Admin\AppData\Roaming\D497.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\D497.tmp.exe"5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 5405⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\D64C.tmp.exe"C:\Users\Admin\AppData\Roaming\D64C.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\D64C.tmp.exe"C:\Users\Admin\AppData\Roaming\D64C.tmp.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\D795.tmp.exe"C:\Users\Admin\AppData\Roaming\D795.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\D795.tmp.exe"{path}"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\D795.tmp.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\D881.tmp.exe"C:\Users\Admin\AppData\Roaming\D881.tmp.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\D881.tmp.exe6⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exeC:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe 0011 installp15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1613385761402.exe"C:\Users\Admin\AppData\Roaming\1613385761402.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613385761402.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1613385763621.exe"C:\Users\Admin\AppData\Roaming\1613385763621.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613385763621.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe"6⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exeC:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe 200 installp15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\BC863AABC388D491.exe"6⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 29325⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
- Executes dropped EXE
-
C:\ProgramData\5482357.44"C:\ProgramData\5482357.44"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\7708831.84"C:\ProgramData\7708831.84"5⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵
- Executes dropped EXE
-
C:\ProgramData\8336782.91"C:\ProgramData\8336782.91"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\6237771.68"C:\ProgramData\6237771.68"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AC9040F3BC32A1844A6A3E9F80181974 C2⤵
- Loads dropped DLL
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
c3b24cda90e68d22d2fd4b1bcd62ecc6
SHA11bb7471fca2b15fa123f8190caad4b56ed684c6b
SHA25613b758cdfd30181acdd678793a36df96b9441e57e27323da96fd064b07bfb734
SHA512184c43feb71c63468d20ee0280ccadd9ff9aa012f0baf5243faaf66e50f7289911ea15f94a2f2c6e40e0de164c71f6f034bf7e4c0cca7003e9a77d5ff0f8fed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5EE9003E3DC4134E8CF26DC55FD926FAMD5
f41bcc72daca7eaf7ba1330602b75243
SHA12b58d0a125644e1de4af329ca9ba8c63dcb3325b
SHA2560bd6d3f9bcc09cc32548da14273c88f148beeda32aefc0c3f08b8eb7531648a9
SHA5126e8f0dd675f741f144cca556a6c55f18d9c630b7eb030a0fbdcd40bc339d4e7ab48fc1035574001a9e3f48edc37f9bd079fae6010b070555d8be2909417eb82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
50ff430a52f9b94d9ba962039cda430e
SHA1e8e42d19932e752b9346f983b80b7f782bc90b09
SHA25646c59bae1082fad3d0bf115342b476b6b026407da6a119443772eb463a9c54cd
SHA51262cddd9ef0f161e4b618c086b849ee325f1baac22fc58561ac39c86028fdef4219620cc12a68661a09eb6a40e29db6f40fef83ecf3630cbad22beedf3c8394c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
59ebd61655bf771648038925dc65efc7
SHA1354945ced27d6532bfd03501b795aa309b64a1d8
SHA256e5a60d5dd5fd9a93fd24cf9b5cd35019f46456baf0a48fa9410e60834bc3c9c6
SHA512863d73fbd5aa94d0d8a58c865aa48a44158918c575304de853b48f0e20a7c29cae495e5843b9e57ff4e770ceb655cc56c27f8d09c1fb9f76de3dba5102e34fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_1C29DD89BF93B3B00C9BB4D44D06A8B2MD5
973ba03265ef848f4d361000ae25248c
SHA12c32f9a4948e8c261d7216b3519b1bd3aca26413
SHA256bacd5f46f87d7934b0c0d278d4f5056969faf90aae235890598741c30726bd73
SHA5122a70bb49bc603fb63392563d8d8be1a65bb95859b4a54bafb9abf20e36989859e174b9b1744c93222d368f9e555539dc76a3274ed36ae2d32fd6a9886cab9ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
da11b6a3997c51af5dfc2ab15d3a4d20
SHA114e182dd46e0f682dfc16edf6e5e1d4e08b237a8
SHA2562857a06d994bdcfa09d7f69746f4ad56b9adf45daf0a14a3ad6885390708b189
SHA5120d43c36c36d048cd573f4ef11907642973b5906a05b2f89cd447ed97da142dd5d2608653f70c716bbcac979b4cb06fafb45781dc207f6c5dcc1d1e06ea90bc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_5B42A8F3767153233D8FDC2B887F78B8MD5
0ddf850964ee1046b5115bb15fd5fb0a
SHA1cbcafafd8d196e8f7ff3b09b64a23d9ea27d9020
SHA2568d65863c32bc72516f74f1a303553a1fb34f48ad989f4419d3c3ffcb55939ddc
SHA512d981e26b9cff603615f17f6b211851b3d4d7dd29fb748efb3a3da38ac4694ba13b03252a0f08939d1adf791db987f4e9d9150627c64b55520b30ac8c06603370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288BMD5
48d7b88f7986388169c9f46bd8d48050
SHA1f34113edae5d2fe7046d9250a019bc19cf6534cc
SHA256679a3247b5f50991c3aef6f491cd5a5b0c55f11693a886f6a7cfed811f108cc8
SHA512fb43568a8419777a45ebf4a6325e3c256ce0c464fc9ecb88fd924709aa0ab2b631c027fc258e66e1fc5616f4d252029d926d31b29c445c8af31e4aa70fb0d21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
f539eabfbeac5f18b67403de88560d48
SHA19750d78fa67f75150907dff0bf17e8ad9ca80518
SHA256599d8fecc62e17f6394b2415418f6fed19d6a8a4966b3234b67e4ed5c4ec5a31
SHA512afedc7773a931a3521fc7ee84c21b7e40b295279072124852cce107e12d44bf9fa3e7f5f890123b5d7592e8d0cc013892b996cf12364c4569c8941180f373ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5EE9003E3DC4134E8CF26DC55FD926FAMD5
1273a07cb062e6754a861eaafb1d9f2c
SHA119b7e70c0180b8a7635d98496fc3b2457567c543
SHA2567345538c0fa9d35170560cf9d0ecf18cb4ea2fe784ddad903091b52f15a287d9
SHA51231b226330d472b1375b77e1504ca4c62d265a0d1d8fadc51593492020bc3f9adab6e9b452eabc9e592f2ad5b96167219c3860f3c483549d8efad6e03ad1730fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
2c5bb1e7230eec9102a8b0441b1bfd1a
SHA10e75c7f282512fd722c0c3448fc4bee49a73bf57
SHA2560e316bd677b9f502d1377b45f4d38a7a5da0c052a5496c431074e87cd3d5733f
SHA5120965def6b348d5edb8739853736a31e95254b86eb0ca6a672c01bf968be4bba2e0539a094fe86e6389ed6cb70245f6e40e2af7d24d5a8bdd8358ec36c690f0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
c9f228f8e78f156d4412e416b2baf697
SHA16e25a452491f195fb5af3e263ddc8ae2439ec0a2
SHA256f5e86a72e173f4a035c860f6e4419a82235b9790fca3511922786638025deefd
SHA5129a7140f71068cb8d45bd0331b89967a17f78c0027d2ba8a7aa3014f4b437c1e555e019a47fdef24a65c92e61f196103805b994d4958c7ae7c2fd63bdab9e0f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_1C29DD89BF93B3B00C9BB4D44D06A8B2MD5
8803479fdd74bc6b1400dc12fc2127c1
SHA1e16e17c1057244125b5ccb431b98079fd8f23c7f
SHA25689db8399c73335437e3841e05787f4c4168c4d6eb52f51d8ed52cc93cc455713
SHA512919bc89f6f1fa8180493f209eb6dba0631eca677201fd477b8e8fa772314f17d384eb0482a0819f90e397b3a357e70022847bcf83afde666a2579be0e25afdd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
1c1a1d875252c58b871d639b63308cab
SHA139a310a59d72e47a91edefcc988d6ae6b4186ac8
SHA256482cf8bb865647544cadeddb67a969577cad7aa8e4c78d0178c90aa1adb8f204
SHA512ff0632506a30fb530d96d2463c50f45860897085cf3e4dbfb298934817c6e385129ce590b1c031c99e0ef1094bde1a00bc91972d6d5e84ca149644d9144cbc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_5B42A8F3767153233D8FDC2B887F78B8MD5
ff1dc286f251a9527c653376dcf79bab
SHA1065a1e0ddb156e98c2533d5241d358b173fe14c3
SHA2567d892cdfc70afa90321ad643f744d5eb8bc4ac81824dbe8c6fc8e374916f6bc1
SHA5127b35770e2fb5ea2f1e9dd3b25f3dda74b5c6ca8606f95ad04e79efea8495dc69b0f83cbd1735fbe118d6c090d921351834d85f35d885ecadbe5ba719840ffef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288BMD5
ae5f4e2e268dfc98814b8a7161ddf9fd
SHA1401a1f385549a42362f60aaf015a1f8c913e9485
SHA25616b4269e87a22b798fbe1aa1d16e1f936e0f03021b121c503fc0b0d7ac407167
SHA512505001f949470a8c06f802192b7c09c387329455c75da0d7942b31c6458ebd2cd255177eca9c9cfba97de2bbbc7d4024afe8386c0d5f2e0f7bcf7c91999f649b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xmlMD5
1a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8U21I66T\analytics[1].jsMD5
53ee95b384d866e8692bb1aef923b763
SHA1a82812b87b667d32a8e51514c578a5175edd94b4
SHA256e441c3e2771625ba05630ab464275136a82c99650ee2145ca5aa9853bedeb01b
SHA512c1f98a09a102bb1e87bfdf825a725b0e2cc1dbedb613d1bd9e8fd9d8fd8b145104d5f4caca44d96db14ac20f2f51b4c653278bfc87556e7f00e48a5fa6231fad
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\bgmain[1].gifMD5
d2cc28433efa2c2a17eba0bd681a8386
SHA1365251dfe825d09b97e80530643102c65d62c57c
SHA25687a5c5dabe18835f31ecaeb557617f6b3ff3f29ff7e5cb7321348d9390ed852c
SHA51281af53b4ad6ebaf6885bd871c7b5707db646dc46cd61bbed84387d405268d803c08aa839e39dda4c8380923887509b9c762e99567be262c8e422cfb6690752d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\js[1].jsMD5
3f976de9eb8e216caf111ae5a3449540
SHA180519454c99bf1c5e952ce67a1ba95fc0cf7335a
SHA2562929ed66b5f544784d16f4e52e003ffac3681c9a83f4e3ce580734dd4722f9e1
SHA5128d3f9c320c8e8892145f44a4893d8383832ebb8075ec7649f8f8b180b8ca429b5a19f4b37123f3a4d1d48b977fd38385fe9f89fc40da4ee43cdc22b30ecd8bf9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UOAPEAJQ\bg[1].gifMD5
1a921c45af23c3bdbfe641ab81136e87
SHA111183c87c973de4e2732f565270f8e8555c19954
SHA2569d4d419d87f02e3273044e6f55808cde8747aea33d54a2ff636251e769dd16dc
SHA51225f588cd3da99651f3a54c67e948c7405cd1cf11d2afe4a7c64aad22a5256a50dfcdee201a12f2a41ba94852b0cd67fed72dc11fb74b47892c233060ac140be2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UOAPEAJQ\bgfooter[1].gifMD5
f2ef23a7ab9da8126a8ed5fc31d72c5d
SHA1c3e81ea14c6bb5e0a26aa85e52def601cdfb5561
SHA2563fdf927c7efdd1ea310cf2d23e031f955f75feed8b8f4cea648e4689e7cb42eb
SHA5123b17503906bb997eec3be43eea96a96de7fe134d3bb3d953bbd12326384b6b49e9207b9fb40c44da6a2bb0299fb0de43cb987e87963385d8b26202a414d38fa0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XMX44WX9\Windows_7_Professional_x86_keygen_by_KeygenNinja.zip.b4ru8ut.partialMD5
dff14f1876245f6145981dd031f6666e
SHA19511fe813362c44f2740cd3fb67f898b3ef2651a
SHA2561aec6a5509bd537a15ad09cb387d5f8ce54dbda84d1e356fa52ab95f28d6021a
SHA512ba5ed26f53fcfa863fe3b3997e836328cbc9c2523922e9b08f5f0aee9585a58216118b349d9c68ec61c379d8a5f0ca296b02c883df7a2e5fe34fc9a3b6fa11fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XMX44WX9\style[1].cssMD5
fae74299af0bb79918940129219c39f6
SHA1ccf8e338a8bfe051188f4fea48b80cf602d243ad
SHA25677ac48cef3aff67958090c09f93fdfecaf75139ac54d2a450d2d6c9d97861269
SHA5123296df999e16d31936cededb24c287d9fef533fae3c23b3cd64173591f3e8c95d950a38330971c3b8373d8ea18caa488678cb81e02ae94f6d2f45ddc6227cccb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XMX44WX9\topleft[1].gifMD5
a43900ba1829ce6c45f66f12d7bd95b4
SHA1e7d92ed40a68b4ea0d47c3cff0e88b50b58581ae
SHA256bc750a89378b7a3c0b4bc88c07fb5fc236efc4473de3cd954ae15e3b1dd27034
SHA512e2ce0a445bb5344b428cd6a56074875f38988d25f2ce07216ebec0a8d4f017472cbe642d249508c0f7c7cd9e05ba5c32cfe842c19dd391bd1a8c762a7a76ffb8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1VARH1QM.cookieMD5
517efd14b22a7e628d3cc2845cc4b71a
SHA162ed5e68ee9808e5c024936a162b3f85424b56e7
SHA256540591bc3f5292dfc0779abddc88694ac0b74f4a5fbf98e96352e9c27a1806ae
SHA512b1474c7523b79c85669c6b5cb6700a2c1c798a6200a2c3ccb1e1ae6923d0efd1a8b78669505c613c3265d93b1db5bcd9f74c5219ede566a18577c62c24ce597f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\4BUG2J3Q.cookieMD5
bda70f7a7e70a751fbb05a8b3ab24864
SHA12becdf0499b5d11b121f408eae56592c7c93b8d7
SHA256d4c9aed8add80d14a8adbeefa9c6c9e27277099c743f80fd6c0e545fbb497493
SHA512bb34de36ff3f2add0986276eb41acec176c41792824d9f1e5435f9d0bf0c508afb5bde0c590c3c37e26b234966ef5b10e79581c998b02f9d30a064529105d564
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\529F63Z5.cookieMD5
fc36bae19e1f74c08e9028c77e554e17
SHA1e375b927554d98873023147f6eeb10c34c310fd8
SHA2560fac2c66cf7dd0cbd18bcb819f5afcd1c016c2d795dd7f9c752d47135ebd726d
SHA512b53cbfa39a982155849663a912662bdecd48102533274245ace1712cac67a7e3bf6c91030f8b04784481ef3a28cb6744a8ca224fa0634a6b80a5e81f7f2ac9ef
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\62K2S6T6.cookieMD5
cb8624cffb5fd86e3c4c331aa4b5d16f
SHA1c68d554a33e2849ef63163e005a057e8a16c70a3
SHA25696c908b828fe6cbd1b3f771bad58fe2d93cc24694e4818055ed302d369a41b76
SHA512643446282b17e3f001744a9831e0e72e87a7a022af9ba1b7700ea91626c5908361ca01800a48bd232a7ed356dc860fe0f06e4f5cb30a17abadb3ef61647737b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\E0961ZQ6.cookieMD5
fc3a7b11e75b8fec56c2c0f57ea1da11
SHA11c0bf45d4437e0b55c762aa69a285ef4498ffcf6
SHA2560fad94b0a38d8b3f8970ed350af9ed2a7c9ef989de826bbbdf260a59cfce4dc1
SHA512f4d73e5c4f53c0444f7820d24cf3727a1d22602ac4bc4d92d5158ccec40dbdb82dbd1c3ff16fe6d24d68a6d33f6bbab50b9c04fd7e27a0bd92776843db7b8d99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\GAS8XLSP.cookieMD5
6f64305be4ffa368d90bb5165e77a2ff
SHA10f0ecc3ea7645ae3137dc1415b88b81bcae9fabf
SHA2566c9deca76c9049008d9aaf9251d93042ad4cb59f49bfc653f9f703e5e919eb80
SHA51285663b24a1aaad3ceec8a94c76f172695e3d03ea9f09d556b0a50d220775adcf452bbfa04b9c485ed710c5f7b011b9ec19d77476619ecd7f0d4cf9642c07735f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\K4QAMX69.cookieMD5
d889040a9c6b159fbeeea0f040dfb035
SHA18c63e30823ce695b754405f70da9dc0596ac7f18
SHA2562237f09657814347ff206e1b52ace0128493080e226d1f83217da1b6ab1cba24
SHA512c0883d7ff21a6876e9e8b65c4eb5b16ca601415784a07190f92e63960fa8fbf29cca31e813c974f0bad452753569c8decc2c4cf6063c5fa375aaae5693f3d7bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\R54VAXKS.cookieMD5
7ff5b395e719dc52655b153fd3f8459f
SHA159a6a9bf973e76d64d35181e6b1aa7be9436d845
SHA256e4e2fbeb54ca5f0381ba44d8f5109c3005312337f5b5d39de32c73d1697b028e
SHA5128b3e44f202a01160246d58d88472b79162851cce04d3352120d709af4490c59ed929ca0e858cb98aabb3b0b71e76b859a598352e99e81d64822ba287794393eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SYU3GXIB.cookieMD5
3851e582b2ace4f3d3a35df3e026c5f7
SHA104dbe0dbd2929cb754dd8bfca35a37eaec3678dc
SHA2562260d90026f4b5b5bc6ba9329a2a2181f16ae0858cd96b67597127496336f764
SHA512b0992aa0daa4ebd85a3ccd861cf02ef6daea228f457782f0cf5cf04f350f0272cacaaedd7d36c6ebdc84e1c1182006d22b0c45b967c41e7109c6f7c871b6c4a3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WDXKCRDO.cookieMD5
8f1541df5d48cbf0327e857b84de2ec5
SHA1029481be7cc4dc4fb0d367b47b853ff18cbfda00
SHA256d217db66a74988de21bb46ab652ad799164fb1f0b69d1e48a8503815b01255d6
SHA5122603467bf591704842c71d05631a03f784bd864bc078782ea381627becc5e40adadea8d3695cc1cff4e058fd9321a1efde8c64a8ff380128936c5a41c1df551f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YTAIFH4E.cookieMD5
56e942b1a1000f78dcb298744bd7ebd9
SHA13936682a5ca76fb4440a9e90d51de2be3912a582
SHA2560c712b166fc2128e1616e5171444534382e4c918ece988e4a4799ac2027e194f
SHA512f11c99aab70c6cc3974d14e86873586f941ba4b05859ef9f8a6631f7196878f47fdfe9ca7495aae92d0336a03e6df40fb221e7a346d69d43bace7b1184e4d425
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exeMD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exeMD5
65b49b106ec0f6cf61e7dc04c0a7eb74
SHA1a1f4784377c53151167965e0ff225f5085ebd43b
SHA256862a8cf0e5561c848145a1a1f464acf77f92a3b15cc43722a7208701f60a2fcd
SHA512e9030cd609f42fb616e5bac3a5203ae46bbae9ec95682432a367f8805cdaa3e30c18a732ceddb0545ac653d543348a6728866149d2822752c80948066bfdf3da
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exeMD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exeMD5
c615d0bfa727f494fee9ecb3f0acf563
SHA16c3509ae64abc299a7afa13552c4fe430071f087
SHA25695d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199
SHA512d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exeMD5
3824de5147ee4af1f094d3990c48e34f
SHA11e0fee08d4c88ecf2da789e6986ea905424afc45
SHA256a5da5f12207c0a0865d78d4ece221c5721ce3e895e964c8143b9c4173e73c1a0
SHA512d6ba97522df08fa4fc426182ad8308a200ab659badcdff1e5e5c70973db31c3ab0dacd8fc5dfc470aabc4bb4ed64cd3363ea867e6e63a88b6b93acb9a433f8a0
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exeMD5
3824de5147ee4af1f094d3990c48e34f
SHA11e0fee08d4c88ecf2da789e6986ea905424afc45
SHA256a5da5f12207c0a0865d78d4ece221c5721ce3e895e964c8143b9c4173e73c1a0
SHA512d6ba97522df08fa4fc426182ad8308a200ab659badcdff1e5e5c70973db31c3ab0dacd8fc5dfc470aabc4bb4ed64cd3363ea867e6e63a88b6b93acb9a433f8a0
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exeMD5
3824de5147ee4af1f094d3990c48e34f
SHA11e0fee08d4c88ecf2da789e6986ea905424afc45
SHA256a5da5f12207c0a0865d78d4ece221c5721ce3e895e964c8143b9c4173e73c1a0
SHA512d6ba97522df08fa4fc426182ad8308a200ab659badcdff1e5e5c70973db31c3ab0dacd8fc5dfc470aabc4bb4ed64cd3363ea867e6e63a88b6b93acb9a433f8a0
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exeMD5
3824de5147ee4af1f094d3990c48e34f
SHA11e0fee08d4c88ecf2da789e6986ea905424afc45
SHA256a5da5f12207c0a0865d78d4ece221c5721ce3e895e964c8143b9c4173e73c1a0
SHA512d6ba97522df08fa4fc426182ad8308a200ab659badcdff1e5e5c70973db31c3ab0dacd8fc5dfc470aabc4bb4ed64cd3363ea867e6e63a88b6b93acb9a433f8a0
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exeMD5
62d2a07135884c5c8ff742c904fddf56
SHA146ce1f7fdf8b4cb2abe479efd5f352db9728a40b
SHA256a12fee020eb54a0f012545074c689893113d130498d9ad411d5852c786770b81
SHA51219c4dc3558308052bb13f71ca633ab05d55d57b68fc240fcc6d06e583fa61c5ccea87ef0f8196acc19b37d87deb42e5c204a2a05fce63f1accaf9e39c219f519
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exeMD5
62d2a07135884c5c8ff742c904fddf56
SHA146ce1f7fdf8b4cb2abe479efd5f352db9728a40b
SHA256a12fee020eb54a0f012545074c689893113d130498d9ad411d5852c786770b81
SHA51219c4dc3558308052bb13f71ca633ab05d55d57b68fc240fcc6d06e583fa61c5ccea87ef0f8196acc19b37d87deb42e5c204a2a05fce63f1accaf9e39c219f519
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exeMD5
39cd4c5049e83a7dc78185ff31710463
SHA1ecf06762cef590ce8c8f5389aff585233ae8c053
SHA2563fc3564f031d6d9b70568f31ec74dfba84734f76e6ed14609718d8f8d99595eb
SHA512c4e52c3c3efecd4d57e30a48e62a96438c198d3bdc5db60dfe448e6e5e6b318e0f60b1818b10b3e883735d20da91ac0bf89ea3237f73029fd1c80b1cf01d18fd
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exeMD5
39cd4c5049e83a7dc78185ff31710463
SHA1ecf06762cef590ce8c8f5389aff585233ae8c053
SHA2563fc3564f031d6d9b70568f31ec74dfba84734f76e6ed14609718d8f8d99595eb
SHA512c4e52c3c3efecd4d57e30a48e62a96438c198d3bdc5db60dfe448e6e5e6b318e0f60b1818b10b3e883735d20da91ac0bf89ea3237f73029fd1c80b1cf01d18fd
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.batMD5
a12e7acce9c54e8f477830c938cd5bb7
SHA1482ac6ae9ea9ab1673e1444269bba2ef7a86794c
SHA256b5433a43058d8b81958e13064f7d5485b787d6812513600c27b913dc5c3b3bd0
SHA5125198b9b7f7ab17a0173a5eed18f3b1906ab3fc64da62cfb765ff43539acdcf3a0eafeefe6184f51f1fbebaacdb0bdf422572b4b3ba70de0b116c779f5e1b7174
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\JOzWR.datMD5
12476321a502e943933e60cfb4429970
SHA1c71d293b84d03153a1bd13c560fca0f8857a95a7
SHA25614a0fbd7eab461e49ee161ac3bd9ad8055086dbe56848dbaba9ec2034b3dea29
SHA512f222de8febc705146394fd389e6cece95b077a0629e18eab91c49b139bf5b686435e28a6ada4a0dbb951fd24ec3db692e7a5584d57ffd0e851739e595f2bbfdc
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exeMD5
26baf1dd4e0c44975cf943b6d5269b07
SHA14648e9a79c7a4fd5be622128ddc5af68697f3121
SHA2569117de15747527123f93284c821ea2e681b574639112532e66ad37a8246d98c9
SHA51257adccbf3424849a19291e9e4ec018a4f3b1ca5fbdfedd16592fadae5c7664249eafcff85e916dd2342ab47b6440ac314af63360aaafba1a11c7356c0f27fcef
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exeMD5
26baf1dd4e0c44975cf943b6d5269b07
SHA14648e9a79c7a4fd5be622128ddc5af68697f3121
SHA2569117de15747527123f93284c821ea2e681b574639112532e66ad37a8246d98c9
SHA51257adccbf3424849a19291e9e4ec018a4f3b1ca5fbdfedd16592fadae5c7664249eafcff85e916dd2342ab47b6440ac314af63360aaafba1a11c7356c0f27fcef
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeMD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeMD5
51ef03c9257f2dd9b93bfdd74e96c017
SHA13baa7bee4b4b7d3ace13409d69dc7bcd0399ac34
SHA25682a022b29bda763ef9f2ce01c82c82e199182d1d0243cca9811eccc1d993cecf
SHA5122c97e5d08c9be89ca45153511e0976abfabf41e25d4187dcb7586ba125b6d8d763b99e79043ac1504203c26c7ab47a9246d9a0235b469f6c611703d4e2ae00e1
-
C:\Users\Admin\AppData\Roaming\D497.tmp.exeMD5
88cab2a6ef2a36cc3fdc19453747b1ac
SHA1256593cc9f7f467809e879cfbfef824b04704719
SHA256138d38b4f476aeb3af3f6dbd215d013d65757335ea8f37efafb5e320af4e1527
SHA512137d0aa1ae62d6432d428aedde72adbd86980b0031ebac165406ac8639351240df3f92e4caebef7c4aeb0b845e24c9b2d392695086e4f066a93cdd60c7c44233
-
C:\Users\Admin\AppData\Roaming\D497.tmp.exeMD5
88cab2a6ef2a36cc3fdc19453747b1ac
SHA1256593cc9f7f467809e879cfbfef824b04704719
SHA256138d38b4f476aeb3af3f6dbd215d013d65757335ea8f37efafb5e320af4e1527
SHA512137d0aa1ae62d6432d428aedde72adbd86980b0031ebac165406ac8639351240df3f92e4caebef7c4aeb0b845e24c9b2d392695086e4f066a93cdd60c7c44233
-
C:\Users\Admin\AppData\Roaming\D64C.tmp.exeMD5
d90236379179b7629d86e9f31e9186d2
SHA13bff11f96f86e37eab8c71176bfd04bcfcafa217
SHA2566df70b49ed6ad21f6dbeed44efb4531849d42ab3e8c81686cd7852673dd22084
SHA5124b826efa98214d5e173b36df3dadd71943d5b85f775d67f501ac89b149660a2d488ec30a28a6f60bb1edf3c2a899b3bba4fb8a9f93b98aa843bc22a0f20dfb1b
-
C:\Users\Admin\AppData\Roaming\D64C.tmp.exeMD5
d90236379179b7629d86e9f31e9186d2
SHA13bff11f96f86e37eab8c71176bfd04bcfcafa217
SHA2566df70b49ed6ad21f6dbeed44efb4531849d42ab3e8c81686cd7852673dd22084
SHA5124b826efa98214d5e173b36df3dadd71943d5b85f775d67f501ac89b149660a2d488ec30a28a6f60bb1edf3c2a899b3bba4fb8a9f93b98aa843bc22a0f20dfb1b
-
C:\Users\Admin\AppData\Roaming\D64C.tmp.exeMD5
d90236379179b7629d86e9f31e9186d2
SHA13bff11f96f86e37eab8c71176bfd04bcfcafa217
SHA2566df70b49ed6ad21f6dbeed44efb4531849d42ab3e8c81686cd7852673dd22084
SHA5124b826efa98214d5e173b36df3dadd71943d5b85f775d67f501ac89b149660a2d488ec30a28a6f60bb1edf3c2a899b3bba4fb8a9f93b98aa843bc22a0f20dfb1b
-
C:\Users\Admin\AppData\Roaming\D795.tmp.exeMD5
eb0f993f9febb294a0f296aafb8be68b
SHA122de1020ae91df4607e945af4ad7110fcde914f7
SHA2562bb54fb9a24d400231c672454fa2a7ac4c77d434fbb6bd27096934f14964fba1
SHA51274bac126d74ccbf015a32d63e631e49bf8660fbbe66cab526b579155342953306a681618552aa179ea50c78b29b30a9d4904d2a638a506d25edf82047c0443b7
-
C:\Users\Admin\AppData\Roaming\D795.tmp.exeMD5
eb0f993f9febb294a0f296aafb8be68b
SHA122de1020ae91df4607e945af4ad7110fcde914f7
SHA2562bb54fb9a24d400231c672454fa2a7ac4c77d434fbb6bd27096934f14964fba1
SHA51274bac126d74ccbf015a32d63e631e49bf8660fbbe66cab526b579155342953306a681618552aa179ea50c78b29b30a9d4904d2a638a506d25edf82047c0443b7
-
C:\Users\Admin\AppData\Roaming\D881.tmp.exeMD5
916417be8309fd0969f066a5e5a98e98
SHA1d3debd63476e6255bf808f81e0ba0c88488add4c
SHA25693fae5e9fdbde83042b5112abeb74a889c240d389745340cd0268870f13345f8
SHA512b16f434acfccf4b4b3a02a4a6ee40c1da6482018dd5c4ce8d92e2a5a0ebd954f945cfe8b0dbdbfefcdac54f67d560a6226b2f76d56e6970aee36ca7415f462d4
-
C:\Users\Admin\AppData\Roaming\D881.tmp.exeMD5
916417be8309fd0969f066a5e5a98e98
SHA1d3debd63476e6255bf808f81e0ba0c88488add4c
SHA25693fae5e9fdbde83042b5112abeb74a889c240d389745340cd0268870f13345f8
SHA512b16f434acfccf4b4b3a02a4a6ee40c1da6482018dd5c4ce8d92e2a5a0ebd954f945cfe8b0dbdbfefcdac54f67d560a6226b2f76d56e6970aee36ca7415f462d4
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
memory/384-80-0x0000000000400000-0x0000000000461000-memory.dmpFilesize
388KB
-
memory/384-97-0x0000000001550000-0x0000000001599000-memory.dmpFilesize
292KB
-
memory/384-83-0x00000000004046CC-mapping.dmp
-
memory/384-86-0x0000000000400000-0x0000000000461000-memory.dmpFilesize
388KB
-
memory/496-45-0x0000000000000000-mapping.dmp
-
memory/508-41-0x0000000000000000-mapping.dmp
-
memory/732-156-0x0000000000000000-mapping.dmp
-
memory/836-27-0x0000000000000000-mapping.dmp
-
memory/860-154-0x0000000000000000-mapping.dmp
-
memory/1008-230-0x0000000000000000-mapping.dmp
-
memory/1020-94-0x0000000000401480-mapping.dmp
-
memory/1020-92-0x0000000000400000-0x0000000000449000-memory.dmpFilesize
292KB
-
memory/1232-85-0x0000000000000000-mapping.dmp
-
memory/1336-204-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/1336-200-0x000000000A680000-0x000000000A6B5000-memory.dmpFilesize
212KB
-
memory/1336-194-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/1336-188-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/1336-185-0x0000000000780000-0x0000000000781000-memory.dmpFilesize
4KB
-
memory/1336-182-0x000000006E240000-0x000000006E92E000-memory.dmpFilesize
6.9MB
-
memory/1336-181-0x0000000000000000-mapping.dmp
-
memory/1336-235-0x0000000005150000-0x0000000005151000-memory.dmpFilesize
4KB
-
memory/1396-166-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/1396-253-0x0000000007960000-0x0000000007961000-memory.dmpFilesize
4KB
-
memory/1396-180-0x0000000005950000-0x0000000005951000-memory.dmpFilesize
4KB
-
memory/1396-241-0x0000000006BE0000-0x0000000006BE1000-memory.dmpFilesize
4KB
-
memory/1396-242-0x00000000072E0000-0x00000000072E1000-memory.dmpFilesize
4KB
-
memory/1396-172-0x00000000056A0000-0x00000000056A1000-memory.dmpFilesize
4KB
-
memory/1396-173-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/1396-169-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/1396-168-0x0000000005720000-0x0000000005721000-memory.dmpFilesize
4KB
-
memory/1396-167-0x0000000005D40000-0x0000000005D41000-memory.dmpFilesize
4KB
-
memory/1396-165-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/1396-160-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1396-162-0x000000006E240000-0x000000006E92E000-memory.dmpFilesize
6.9MB
-
memory/1396-161-0x0000000000423FCA-mapping.dmp
-
memory/1624-114-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/1624-98-0x00000000031D0000-0x00000000031D1000-memory.dmpFilesize
4KB
-
memory/1624-113-0x0000000002D80000-0x0000000002E12000-memory.dmpFilesize
584KB
-
memory/1624-71-0x0000000000000000-mapping.dmp
-
memory/1732-159-0x0000000006A20000-0x0000000006A69000-memory.dmpFilesize
292KB
-
memory/1732-100-0x0000000004DC0000-0x0000000004DC1000-memory.dmpFilesize
4KB
-
memory/1732-117-0x0000000004FB0000-0x0000000004FB2000-memory.dmpFilesize
8KB
-
memory/1732-118-0x00000000084A0000-0x00000000084A1000-memory.dmpFilesize
4KB
-
memory/1732-90-0x0000000000460000-0x0000000000461000-memory.dmpFilesize
4KB
-
memory/1732-112-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/1732-89-0x000000006E240000-0x000000006E92E000-memory.dmpFilesize
6.9MB
-
memory/1732-78-0x0000000000000000-mapping.dmp
-
memory/1732-99-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/1732-115-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/1732-116-0x0000000005080000-0x00000000050BD000-memory.dmpFilesize
244KB
-
memory/1732-102-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/1992-153-0x0000000000000000-mapping.dmp
-
memory/2136-35-0x0000000000000000-mapping.dmp
-
memory/2136-44-0x0000000001410000-0x000000000141D000-memory.dmpFilesize
52KB
-
memory/2148-11-0x0000000000000000-mapping.dmp
-
memory/2212-95-0x0000000005A70000-0x0000000008FCC000-memory.dmpFilesize
53.4MB
-
memory/2212-104-0x0000000000400000-0x000000000395C000-memory.dmpFilesize
53.4MB
-
memory/2212-82-0x0000000000000000-mapping.dmp
-
memory/2240-38-0x0000000000000000-mapping.dmp
-
memory/2984-63-0x0000000002540000-0x00000000026DC000-memory.dmpFilesize
1.6MB
-
memory/2984-47-0x0000000000000000-mapping.dmp
-
memory/3068-93-0x00000000039D0000-0x0000000003A1A000-memory.dmpFilesize
296KB
-
memory/3068-46-0x0000000000000000-mapping.dmp
-
memory/3068-52-0x00000000003E0000-0x00000000003ED000-memory.dmpFilesize
52KB
-
memory/3908-62-0x0000000000000000-mapping.dmp
-
memory/3916-2-0x0000000000000000-mapping.dmp
-
memory/3960-103-0x00000000030F0000-0x00000000030F1000-memory.dmpFilesize
4KB
-
memory/3960-110-0x0000000002DE0000-0x0000000002E25000-memory.dmpFilesize
276KB
-
memory/3960-74-0x0000000000000000-mapping.dmp
-
memory/3996-231-0x0000000000000000-mapping.dmp
-
memory/3996-232-0x000000006E240000-0x000000006E92E000-memory.dmpFilesize
6.9MB
-
memory/3996-240-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/4016-32-0x0000000000000000-mapping.dmp
-
memory/4068-29-0x0000000000000000-mapping.dmp
-
memory/4136-178-0x0000000001280000-0x0000000001281000-memory.dmpFilesize
4KB
-
memory/4136-177-0x0000000001660000-0x0000000001681000-memory.dmpFilesize
132KB
-
memory/4136-171-0x00007FF801B40000-0x00007FF80252C000-memory.dmpFilesize
9.9MB
-
memory/4136-179-0x000000001BAA0000-0x000000001BAA2000-memory.dmpFilesize
8KB
-
memory/4136-170-0x0000000000000000-mapping.dmp
-
memory/4136-176-0x0000000001260000-0x0000000001261000-memory.dmpFilesize
4KB
-
memory/4136-174-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/4180-108-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/4208-246-0x0000000000000000-mapping.dmp
-
memory/4224-111-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4224-106-0x0000000000401480-mapping.dmp
-
memory/4224-105-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4256-152-0x0000000004B30000-0x0000000004B31000-memory.dmpFilesize
4KB
-
memory/4264-109-0x0000000000000000-mapping.dmp
-
memory/4328-155-0x00007FF6C6D18270-mapping.dmp
-
memory/4328-158-0x000001A074230000-0x000001A074231000-memory.dmpFilesize
4KB
-
memory/4332-189-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/4332-183-0x0000000000000000-mapping.dmp
-
memory/4332-199-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/4332-192-0x00000000010F0000-0x00000000010FB000-memory.dmpFilesize
44KB
-
memory/4332-184-0x000000006E240000-0x000000006E92E000-memory.dmpFilesize
6.9MB
-
memory/4392-248-0x0000000000000000-mapping.dmp
-
memory/4424-187-0x0000000000000000-mapping.dmp
-
memory/4424-220-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/4424-203-0x000000006E240000-0x000000006E92E000-memory.dmpFilesize
6.9MB
-
memory/4424-205-0x0000000000B20000-0x0000000000B21000-memory.dmpFilesize
4KB
-
memory/4424-197-0x0000000077C64000-0x0000000077C65000-memory.dmpFilesize
4KB
-
memory/4476-125-0x0000000000000000-mapping.dmp
-
memory/4500-132-0x0000000010000000-0x000000001033D000-memory.dmpFilesize
3.2MB
-
memory/4500-127-0x0000000000000000-mapping.dmp
-
memory/4508-144-0x0000000000000000-mapping.dmp
-
memory/4528-126-0x0000000000000000-mapping.dmp
-
memory/4568-128-0x0000000000000000-mapping.dmp
-
memory/4584-247-0x0000000000000000-mapping.dmp
-
memory/4604-129-0x0000000000000000-mapping.dmp
-
memory/4624-130-0x0000000000000000-mapping.dmp
-
memory/4660-131-0x0000000000000000-mapping.dmp
-
memory/4668-211-0x0000000000C40000-0x0000000000C41000-memory.dmpFilesize
4KB
-
memory/4668-209-0x000000006E240000-0x000000006E92E000-memory.dmpFilesize
6.9MB
-
memory/4668-221-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/4668-191-0x0000000000000000-mapping.dmp
-
memory/4672-260-0x0000000000000000-mapping.dmp
-
memory/4680-145-0x00007FF6C6D18270-mapping.dmp
-
memory/4680-147-0x0000000010000000-0x0000000010057000-memory.dmpFilesize
348KB
-
memory/4680-149-0x00000225335D0000-0x00000225335D1000-memory.dmpFilesize
4KB
-
memory/4684-133-0x0000000000000000-mapping.dmp
-
memory/4692-198-0x0000000000000000-mapping.dmp
-
memory/4700-146-0x0000000000000000-mapping.dmp
-
memory/4788-134-0x0000000000000000-mapping.dmp
-
memory/4788-142-0x0000000002ED0000-0x000000000337F000-memory.dmpFilesize
4.7MB
-
memory/4800-135-0x0000000000000000-mapping.dmp
-
memory/4800-143-0x0000000002E30000-0x00000000032DF000-memory.dmpFilesize
4.7MB
-
memory/4840-136-0x0000000000000000-mapping.dmp
-
memory/4884-137-0x0000000000000000-mapping.dmp
-
memory/4900-201-0x0000000000000000-mapping.dmp
-
memory/4904-138-0x0000000000000000-mapping.dmp
-
memory/4948-139-0x0000000000000000-mapping.dmp
-
memory/5064-148-0x0000000000000000-mapping.dmp