Analysis
-
max time kernel
1811s -
max time network
1571s -
platform
windows11_x64 -
resource
win11 -
submitted
03-11-2021 07:43
Static task
static1
Behavioral task
behavioral1
Sample
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
Resource
win7-ja-20211014
Behavioral task
behavioral2
Sample
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
Resource
win11
Behavioral task
behavioral5
Sample
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
Resource
win10-de-20211014
General
-
Target
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe
-
Size
289KB
-
MD5
cba7a4e1465fdeae3b5d68020233de6e
-
SHA1
079519332561557fa958d460d6d9fdcdba6f6c7a
-
SHA256
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa
-
SHA512
bca58bad3a9702885f489b7b7131734f5fb8b51dbfdb18e81131afcd8be167ff574e46f6f0735991209a73fab1168ed5f3584b7a819bb401c8c9f442222fb1ea
Malware Config
Extracted
smokeloader
2020
http://honawey70.top/
http://wijibui00.top/
Extracted
redline
45.147.231.161:38637
Extracted
icedid
3022016856
actuallyobligat.info
Extracted
redline
SuperStar
185.215.113.29:36224
Extracted
redline
101
185.92.73.142:52097
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\FE38.exe family_redline C:\Users\Admin\AppData\Local\Temp\FE38.exe family_redline behavioral4/memory/3764-210-0x0000000002150000-0x000000000216C000-memory.dmp family_redline behavioral4/memory/3764-212-0x0000000002500000-0x000000000251B000-memory.dmp family_redline behavioral4/memory/2896-247-0x0000000000D20000-0x0000000000D50000-memory.dmp family_redline behavioral4/memory/2896-248-0x0000000000D50000-0x0000000000D6B000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 2672 created 5100 2672 WerFault.exe A9BE.exe PID 4016 created 1596 4016 WerFault.exe FFCF.exe PID 1976 created 1700 1976 WerFault.exe 53EB.exe PID 2840 created 4636 2840 WerFault.exe 5CC8.exe PID 3092 created 444 3092 WerFault.exe 5D4.exe -
Arkei Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/444-263-0x00000000024B0000-0x00000000024D1000-memory.dmp family_arkei -
Core1 .NET packer 1 IoCs
Detects packer/loader used by .NET malware.
Processes:
resource yara_rule behavioral4/memory/2896-247-0x0000000000D20000-0x0000000000D50000-memory.dmp Core1 -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
A9BE.exeFE38.exeFFCF.exe53EB.exe55D1.exe5CC8.exe55D1.exeAF42.exe5D4.exepid process 5100 A9BE.exe 2184 FE38.exe 1596 FFCF.exe 1700 53EB.exe 2868 55D1.exe 4636 5CC8.exe 3764 55D1.exe 2896 AF42.exe 444 5D4.exe -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1016 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe55D1.exedescription pid process target process PID 3632 set thread context of 4220 3632 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe PID 2868 set thread context of 3764 2868 55D1.exe 55D1.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4280 5100 WerFault.exe A9BE.exe 1468 1596 WerFault.exe FFCF.exe 3304 1700 WerFault.exe 53EB.exe 4972 4636 WerFault.exe 5CC8.exe 416 444 WerFault.exe 5D4.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe -
Checks processor information in registry 2 TTPs 37 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
WaaSMedicAgent.exesvchost.exeWaaSMedicAgent.exeWaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exepid process 4220 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 4220 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 3208 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3208 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exepid process 4220 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exesvchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 2364 svchost.exe Token: SeCreatePagefilePrivilege 2364 svchost.exe Token: SeShutdownPrivilege 2364 svchost.exe Token: SeCreatePagefilePrivilege 2364 svchost.exe Token: SeShutdownPrivilege 2364 svchost.exe Token: SeCreatePagefilePrivilege 2364 svchost.exe Token: SeShutdownPrivilege 1556 svchost.exe Token: SeCreatePagefilePrivilege 1556 svchost.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe Token: SeSecurityPrivilege 1620 TiWorker.exe Token: SeBackupPrivilege 1620 TiWorker.exe Token: SeRestorePrivilege 1620 TiWorker.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3208 -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exesvchost.exeWerFault.exeWerFault.exeWerFault.exe55D1.exeWerFault.exeWerFault.exedescription pid process target process PID 3632 wrote to memory of 4220 3632 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe PID 3632 wrote to memory of 4220 3632 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe PID 3632 wrote to memory of 4220 3632 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe PID 3632 wrote to memory of 4220 3632 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe PID 3632 wrote to memory of 4220 3632 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe PID 3632 wrote to memory of 4220 3632 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe 872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe PID 1556 wrote to memory of 2984 1556 svchost.exe MoUsoCoreWorker.exe PID 1556 wrote to memory of 2984 1556 svchost.exe MoUsoCoreWorker.exe PID 3208 wrote to memory of 5100 3208 A9BE.exe PID 3208 wrote to memory of 5100 3208 A9BE.exe PID 3208 wrote to memory of 5100 3208 A9BE.exe PID 2672 wrote to memory of 5100 2672 WerFault.exe A9BE.exe PID 2672 wrote to memory of 5100 2672 WerFault.exe A9BE.exe PID 3208 wrote to memory of 2184 3208 FE38.exe PID 3208 wrote to memory of 2184 3208 FE38.exe PID 3208 wrote to memory of 2184 3208 FE38.exe PID 3208 wrote to memory of 1596 3208 FFCF.exe PID 3208 wrote to memory of 1596 3208 FFCF.exe PID 3208 wrote to memory of 1596 3208 FFCF.exe PID 4016 wrote to memory of 1596 4016 WerFault.exe FFCF.exe PID 4016 wrote to memory of 1596 4016 WerFault.exe FFCF.exe PID 3208 wrote to memory of 1700 3208 53EB.exe PID 3208 wrote to memory of 1700 3208 53EB.exe PID 3208 wrote to memory of 1700 3208 53EB.exe PID 3208 wrote to memory of 2868 3208 55D1.exe PID 3208 wrote to memory of 2868 3208 55D1.exe PID 3208 wrote to memory of 2868 3208 55D1.exe PID 1976 wrote to memory of 1700 1976 WerFault.exe 53EB.exe PID 1976 wrote to memory of 1700 1976 WerFault.exe 53EB.exe PID 3208 wrote to memory of 1016 3208 regsvr32.exe PID 3208 wrote to memory of 1016 3208 regsvr32.exe PID 3208 wrote to memory of 4636 3208 5CC8.exe PID 3208 wrote to memory of 4636 3208 5CC8.exe PID 3208 wrote to memory of 4636 3208 5CC8.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2868 wrote to memory of 3764 2868 55D1.exe 55D1.exe PID 2840 wrote to memory of 4636 2840 WerFault.exe 5CC8.exe PID 2840 wrote to memory of 4636 2840 WerFault.exe 5CC8.exe PID 1556 wrote to memory of 1612 1556 svchost.exe MoUsoCoreWorker.exe PID 1556 wrote to memory of 1612 1556 svchost.exe MoUsoCoreWorker.exe PID 3208 wrote to memory of 2896 3208 AF42.exe PID 3208 wrote to memory of 2896 3208 AF42.exe PID 3208 wrote to memory of 444 3208 5D4.exe PID 3208 wrote to memory of 444 3208 5D4.exe PID 3208 wrote to memory of 444 3208 5D4.exe PID 3092 wrote to memory of 444 3092 WerFault.exe 5D4.exe PID 3092 wrote to memory of 444 3092 WerFault.exe 5D4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe"C:\Users\Admin\AppData\Local\Temp\872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe"C:\Users\Admin\AppData\Local\Temp\872db16f209592c4074cd122f51967bf9c2a37b913dcbd4e79e409c87a4459fa.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe afb82988f16e7c0162b21508dc9ed45e NxvWSanJNk6YGYbyE6hnZQ.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe afb82988f16e7c0162b21508dc9ed45e NxvWSanJNk6YGYbyE6hnZQ.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe afb82988f16e7c0162b21508dc9ed45e NxvWSanJNk6YGYbyE6hnZQ.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\A9BE.exeC:\Users\Admin\AppData\Local\Temp\A9BE.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5100 -ip 51001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FE38.exeC:\Users\Admin\AppData\Local\Temp\FE38.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FFCF.exeC:\Users\Admin\AppData\Local\Temp\FFCF.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2362⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1596 -ip 15961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\53EB.exeC:\Users\Admin\AppData\Local\Temp\53EB.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 2762⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Users\Admin\AppData\Local\Temp\55D1.exeC:\Users\Admin\AppData\Local\Temp\55D1.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\55D1.exeC:\Users\Admin\AppData\Local\Temp\55D1.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1700 -ip 17001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5B50.dll1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\5CC8.exeC:\Users\Admin\AppData\Local\Temp\5CC8.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4636 -ip 46361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AF42.exeC:\Users\Admin\AppData\Local\Temp\AF42.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5D4.exeC:\Users\Admin\AppData\Local\Temp\5D4.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 2962⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 444 -ip 4441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\53EB.exeMD5
aa274b420a15cdb8384906a3c45a6d22
SHA199bc08e28683f4b07f0c168facce2d529a08d0fa
SHA256b9e7d6015213b2126e602e7e796f4590cdb2a941b4e8eb30b75bc9c46dce1754
SHA5121012f2fe52a514cb06f536c6343e9dddb1bcc914dee33c013ec393162c6151f61916bc147068c8db4377f2714f70903fbadfa74d23f104d12180c2d9b00fe7d1
-
C:\Users\Admin\AppData\Local\Temp\53EB.exeMD5
aa274b420a15cdb8384906a3c45a6d22
SHA199bc08e28683f4b07f0c168facce2d529a08d0fa
SHA256b9e7d6015213b2126e602e7e796f4590cdb2a941b4e8eb30b75bc9c46dce1754
SHA5121012f2fe52a514cb06f536c6343e9dddb1bcc914dee33c013ec393162c6151f61916bc147068c8db4377f2714f70903fbadfa74d23f104d12180c2d9b00fe7d1
-
C:\Users\Admin\AppData\Local\Temp\55D1.exeMD5
83ae8211d7a716ca53a2b7e51868009b
SHA1909de09eaecd7edeb85941a1e413fe8b42cb6fdc
SHA25695fbfa4c2148dd1ef7975dbf556919f2588c36d4f3b37d0072e690a2694c0d15
SHA51237148b971be87e61e5eafd160aa0a893503c2f8953130770c8100fd8fee2c2f715c100b2442e0704034656cba11523b2f2d9a451c3c5d20b4a09b6bdca8eefb8
-
C:\Users\Admin\AppData\Local\Temp\55D1.exeMD5
83ae8211d7a716ca53a2b7e51868009b
SHA1909de09eaecd7edeb85941a1e413fe8b42cb6fdc
SHA25695fbfa4c2148dd1ef7975dbf556919f2588c36d4f3b37d0072e690a2694c0d15
SHA51237148b971be87e61e5eafd160aa0a893503c2f8953130770c8100fd8fee2c2f715c100b2442e0704034656cba11523b2f2d9a451c3c5d20b4a09b6bdca8eefb8
-
C:\Users\Admin\AppData\Local\Temp\55D1.exeMD5
83ae8211d7a716ca53a2b7e51868009b
SHA1909de09eaecd7edeb85941a1e413fe8b42cb6fdc
SHA25695fbfa4c2148dd1ef7975dbf556919f2588c36d4f3b37d0072e690a2694c0d15
SHA51237148b971be87e61e5eafd160aa0a893503c2f8953130770c8100fd8fee2c2f715c100b2442e0704034656cba11523b2f2d9a451c3c5d20b4a09b6bdca8eefb8
-
C:\Users\Admin\AppData\Local\Temp\5B50.dllMD5
628b068ebb6c34efd8b4d21d4f4c7723
SHA1957bb67a89b7009539ecf2ac61ce83daf497a464
SHA25604d14e3e9c577b0fd56c1c63a6c9bdc5220db0b6af8d373831da2a3a79c45881
SHA51293870c1f43eba9104f5bfb7f0e58dd299e54d8958cb746f641b336da639a919b626f836914e1ad6582f2e83206984c6003c7476d84905d6cedc32cce2c3dc750
-
C:\Users\Admin\AppData\Local\Temp\5B50.dllMD5
628b068ebb6c34efd8b4d21d4f4c7723
SHA1957bb67a89b7009539ecf2ac61ce83daf497a464
SHA25604d14e3e9c577b0fd56c1c63a6c9bdc5220db0b6af8d373831da2a3a79c45881
SHA51293870c1f43eba9104f5bfb7f0e58dd299e54d8958cb746f641b336da639a919b626f836914e1ad6582f2e83206984c6003c7476d84905d6cedc32cce2c3dc750
-
C:\Users\Admin\AppData\Local\Temp\5CC8.exeMD5
738f696f228f13c18454c013926b38b2
SHA104c1ea711ed7077cee2b67c33577caadc24b97e8
SHA2560fc853cdddb7195dbf6052a7970add6d5cb57f6b7f2478f6e3de20ff87fc890f
SHA512dc4f05debf4e41b52412b6681efd3ad2622cd9d2f401df317bfbb525797e3fb6000536e78d9dbff67f7149ee5b2db94ba723cff7315816c92095e551974a0038
-
C:\Users\Admin\AppData\Local\Temp\5CC8.exeMD5
738f696f228f13c18454c013926b38b2
SHA104c1ea711ed7077cee2b67c33577caadc24b97e8
SHA2560fc853cdddb7195dbf6052a7970add6d5cb57f6b7f2478f6e3de20ff87fc890f
SHA512dc4f05debf4e41b52412b6681efd3ad2622cd9d2f401df317bfbb525797e3fb6000536e78d9dbff67f7149ee5b2db94ba723cff7315816c92095e551974a0038
-
C:\Users\Admin\AppData\Local\Temp\5D4.exeMD5
44d57bd9b9006ac10bdf35f7d347037f
SHA17a4e7d527f0dd67d00b38c4893800998ed2ca4df
SHA256515d537093956f134ef3bc3037b609afc47dc225964ffa527bec9c1be7243d1b
SHA5124183c2d42229f7ddc9233f5bcd05fbc21fff7f483cc228e567606726d6fd1ce5cbd66edf5e232f0d05b97da42ee9124e956b0d15adc7d2c404abc6c0936f8cfb
-
C:\Users\Admin\AppData\Local\Temp\5D4.exeMD5
44d57bd9b9006ac10bdf35f7d347037f
SHA17a4e7d527f0dd67d00b38c4893800998ed2ca4df
SHA256515d537093956f134ef3bc3037b609afc47dc225964ffa527bec9c1be7243d1b
SHA5124183c2d42229f7ddc9233f5bcd05fbc21fff7f483cc228e567606726d6fd1ce5cbd66edf5e232f0d05b97da42ee9124e956b0d15adc7d2c404abc6c0936f8cfb
-
C:\Users\Admin\AppData\Local\Temp\A9BE.exeMD5
537cde5b14a29b97576f3d7e62c651d8
SHA18e64a6c09949ce519acc87c17ea5458485375fa7
SHA256ec013210fe7be183315cd371fb3ca19c39431f68bd323a7cafef835463f00361
SHA512a9ccebdf0f466e810291c0b54b5ff8d9ecd6b90214a0ec46bedddc4fd4ef03cce69916d8b315d63a3054ce948c20001ba73bfc1fc2445c04888a4794811d15c2
-
C:\Users\Admin\AppData\Local\Temp\A9BE.exeMD5
537cde5b14a29b97576f3d7e62c651d8
SHA18e64a6c09949ce519acc87c17ea5458485375fa7
SHA256ec013210fe7be183315cd371fb3ca19c39431f68bd323a7cafef835463f00361
SHA512a9ccebdf0f466e810291c0b54b5ff8d9ecd6b90214a0ec46bedddc4fd4ef03cce69916d8b315d63a3054ce948c20001ba73bfc1fc2445c04888a4794811d15c2
-
C:\Users\Admin\AppData\Local\Temp\AF42.exeMD5
1bef6a1a0d0cdcb868aaa9fffd513f25
SHA1769fce57adacbfca686118f9a45fce099abf2a20
SHA256a36434a7f29255e4053d5593765e3eb27a4f257581f0a10f76ea8bec24850ab4
SHA5129cc963e386a8f7c2dcf0369987ebd60b7f45a9cd51d085505edc98aebc1d3e3a0591c32c5d193e9f9d1345780fb79cafbb21e1988a96d9b6fa4fef9cdbe1521a
-
C:\Users\Admin\AppData\Local\Temp\AF42.exeMD5
1bef6a1a0d0cdcb868aaa9fffd513f25
SHA1769fce57adacbfca686118f9a45fce099abf2a20
SHA256a36434a7f29255e4053d5593765e3eb27a4f257581f0a10f76ea8bec24850ab4
SHA5129cc963e386a8f7c2dcf0369987ebd60b7f45a9cd51d085505edc98aebc1d3e3a0591c32c5d193e9f9d1345780fb79cafbb21e1988a96d9b6fa4fef9cdbe1521a
-
C:\Users\Admin\AppData\Local\Temp\FE38.exeMD5
a55b2ebe63ac0e6111edb879d7beee08
SHA104e9a7a5934103d6d78962fa8515b27763a3b707
SHA2564bf6dc98acb84cd572bc44f590b3660107869e2acb0fe6431fd908863d186e84
SHA5125c6f735d8b48377fc67614ad4f01eeb0cc409e1e929ee3f3a94da2238c89ac782f617f7f1c95fe3d1185c3b2bdfc12b3b98a7d7ae7321214194db9ddeaaa42bb
-
C:\Users\Admin\AppData\Local\Temp\FE38.exeMD5
a55b2ebe63ac0e6111edb879d7beee08
SHA104e9a7a5934103d6d78962fa8515b27763a3b707
SHA2564bf6dc98acb84cd572bc44f590b3660107869e2acb0fe6431fd908863d186e84
SHA5125c6f735d8b48377fc67614ad4f01eeb0cc409e1e929ee3f3a94da2238c89ac782f617f7f1c95fe3d1185c3b2bdfc12b3b98a7d7ae7321214194db9ddeaaa42bb
-
C:\Users\Admin\AppData\Local\Temp\FFCF.exeMD5
cd9451e417835fa1447aff560ee9da73
SHA151e2c4483795c7717f342556f6f23d1567b614a2
SHA25670616f9e69227bdc705494fa961e3b30049d14c03893c36bb66851053287fea7
SHA512bb9f41bbeb161f589dbcd665b01272e28d10ff2467d4099cce90d92ba62c8f0931e04b0e3a722da964b895361bf1c3266bee2342f1a79392d3efb69fb978ab78
-
C:\Users\Admin\AppData\Local\Temp\FFCF.exeMD5
cd9451e417835fa1447aff560ee9da73
SHA151e2c4483795c7717f342556f6f23d1567b614a2
SHA25670616f9e69227bdc705494fa961e3b30049d14c03893c36bb66851053287fea7
SHA512bb9f41bbeb161f589dbcd665b01272e28d10ff2467d4099cce90d92ba62c8f0931e04b0e3a722da964b895361bf1c3266bee2342f1a79392d3efb69fb978ab78
-
memory/444-263-0x00000000024B0000-0x00000000024D1000-memory.dmpFilesize
132KB
-
memory/444-259-0x0000000000000000-mapping.dmp
-
memory/1016-199-0x0000000000000000-mapping.dmp
-
memory/1016-205-0x0000000002940000-0x00000000029A3000-memory.dmpFilesize
396KB
-
memory/1596-173-0x0000000000000000-mapping.dmp
-
memory/1596-181-0x00000000005D0000-0x00000000005D8000-memory.dmpFilesize
32KB
-
memory/1596-182-0x00000000005E0000-0x00000000005E9000-memory.dmpFilesize
36KB
-
memory/1612-236-0x0000000000000000-mapping.dmp
-
memory/1700-197-0x0000000000710000-0x0000000000718000-memory.dmpFilesize
32KB
-
memory/1700-198-0x0000000000720000-0x0000000000729000-memory.dmpFilesize
36KB
-
memory/1700-191-0x0000000000000000-mapping.dmp
-
memory/2184-171-0x0000000005720000-0x0000000005721000-memory.dmpFilesize
4KB
-
memory/2184-164-0x0000000000000000-mapping.dmp
-
memory/2184-179-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/2184-180-0x00000000055A0000-0x0000000005BB8000-memory.dmpFilesize
6.1MB
-
memory/2184-177-0x00000000061E0000-0x00000000061E1000-memory.dmpFilesize
4KB
-
memory/2184-176-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/2184-183-0x00000000064F0000-0x00000000064F1000-memory.dmpFilesize
4KB
-
memory/2184-184-0x0000000006610000-0x0000000006611000-memory.dmpFilesize
4KB
-
memory/2184-185-0x0000000006C60000-0x0000000006C61000-memory.dmpFilesize
4KB
-
memory/2184-186-0x00000000068B0000-0x00000000068B1000-memory.dmpFilesize
4KB
-
memory/2184-187-0x0000000006A50000-0x0000000006A51000-memory.dmpFilesize
4KB
-
memory/2184-188-0x0000000007620000-0x0000000007621000-memory.dmpFilesize
4KB
-
memory/2184-189-0x0000000007D20000-0x0000000007D21000-memory.dmpFilesize
4KB
-
memory/2184-190-0x00000000075C0000-0x00000000075C1000-memory.dmpFilesize
4KB
-
memory/2184-172-0x0000000005830000-0x0000000005831000-memory.dmpFilesize
4KB
-
memory/2184-178-0x0000000005930000-0x0000000005931000-memory.dmpFilesize
4KB
-
memory/2184-170-0x00000000055F0000-0x00000000055F1000-memory.dmpFilesize
4KB
-
memory/2184-169-0x0000000005BC0000-0x0000000005BC1000-memory.dmpFilesize
4KB
-
memory/2184-167-0x0000000000B90000-0x0000000000B91000-memory.dmpFilesize
4KB
-
memory/2364-151-0x0000021121B20000-0x0000021121B30000-memory.dmpFilesize
64KB
-
memory/2364-152-0x0000021121BA0000-0x0000021121BB0000-memory.dmpFilesize
64KB
-
memory/2364-240-0x0000021124170000-0x0000021124171000-memory.dmpFilesize
4KB
-
memory/2364-158-0x0000021124CE0000-0x0000021124CE1000-memory.dmpFilesize
4KB
-
memory/2364-238-0x00000211241B0000-0x00000211241B1000-memory.dmpFilesize
4KB
-
memory/2364-157-0x0000021124CF0000-0x0000021124CF4000-memory.dmpFilesize
16KB
-
memory/2364-237-0x0000021124290000-0x0000021124294000-memory.dmpFilesize
16KB
-
memory/2364-155-0x00000211243F0000-0x00000211243F1000-memory.dmpFilesize
4KB
-
memory/2364-153-0x0000021124270000-0x0000021124274000-memory.dmpFilesize
16KB
-
memory/2364-154-0x0000021124750000-0x0000021124754000-memory.dmpFilesize
16KB
-
memory/2868-221-0x00000000025E0000-0x0000000002610000-memory.dmpFilesize
192KB
-
memory/2868-194-0x0000000000000000-mapping.dmp
-
memory/2868-206-0x0000000000A8C000-0x0000000000AAE000-memory.dmpFilesize
136KB
-
memory/2896-247-0x0000000000D20000-0x0000000000D50000-memory.dmpFilesize
192KB
-
memory/2896-251-0x000000001C360000-0x000000001C361000-memory.dmpFilesize
4KB
-
memory/2896-241-0x0000000000000000-mapping.dmp
-
memory/2896-244-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2896-258-0x000000001C4C2000-0x000000001C4C4000-memory.dmpFilesize
8KB
-
memory/2896-255-0x000000001F750000-0x000000001F751000-memory.dmpFilesize
4KB
-
memory/2896-254-0x0000000001570000-0x0000000001571000-memory.dmpFilesize
4KB
-
memory/2896-253-0x000000001E550000-0x000000001E551000-memory.dmpFilesize
4KB
-
memory/2896-252-0x000000001C4C0000-0x000000001C4C2000-memory.dmpFilesize
8KB
-
memory/2896-246-0x0000000000CE0000-0x0000000000D20000-memory.dmpFilesize
256KB
-
memory/2896-250-0x0000000001550000-0x0000000001551000-memory.dmpFilesize
4KB
-
memory/2896-249-0x000000001E5E0000-0x000000001E5E1000-memory.dmpFilesize
4KB
-
memory/2896-248-0x0000000000D50000-0x0000000000D6B000-memory.dmpFilesize
108KB
-
memory/2984-156-0x0000000000000000-mapping.dmp
-
memory/3208-150-0x0000000002E20000-0x0000000002E36000-memory.dmpFilesize
88KB
-
memory/3632-146-0x00000000009BC000-0x00000000009CC000-memory.dmpFilesize
64KB
-
memory/3632-149-0x00000000025B0000-0x00000000025B9000-memory.dmpFilesize
36KB
-
memory/3764-226-0x00000000024F4000-0x00000000024F6000-memory.dmpFilesize
8KB
-
memory/3764-225-0x00000000024F3000-0x00000000024F4000-memory.dmpFilesize
4KB
-
memory/3764-212-0x0000000002500000-0x000000000251B000-memory.dmpFilesize
108KB
-
memory/3764-220-0x0000000005E20000-0x0000000005E21000-memory.dmpFilesize
4KB
-
memory/3764-208-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3764-207-0x0000000000000000-mapping.dmp
-
memory/3764-222-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/3764-223-0x00000000024F0000-0x00000000024F1000-memory.dmpFilesize
4KB
-
memory/3764-210-0x0000000002150000-0x000000000216C000-memory.dmpFilesize
112KB
-
memory/3764-224-0x00000000024F2000-0x00000000024F3000-memory.dmpFilesize
4KB
-
memory/4220-148-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4220-147-0x0000000000000000-mapping.dmp
-
memory/4636-227-0x0000000000C2C000-0x0000000000C63000-memory.dmpFilesize
220KB
-
memory/4636-228-0x0000000000B60000-0x0000000000BAF000-memory.dmpFilesize
316KB
-
memory/4636-202-0x0000000000000000-mapping.dmp
-
memory/5100-162-0x00000000009CD000-0x00000000009DD000-memory.dmpFilesize
64KB
-
memory/5100-163-0x00000000025B0000-0x00000000025C3000-memory.dmpFilesize
76KB
-
memory/5100-159-0x0000000000000000-mapping.dmp