Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
05-12-2021 06:52
Static task
static1
Behavioral task
behavioral1
Sample
758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe
Resource
win10-en-20211104
General
-
Target
758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe
-
Size
272KB
-
MD5
f5505eb7c39ad86f08d792639777e52e
-
SHA1
dc33ae95ffc6019a9fb2a08fb95293a29ecf2465
-
SHA256
758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021
-
SHA512
ae84205a826997a0cf2be5d9a40d8d69845e1bdaa0520e2c50c0d9de2dc901bfcb92594773830d6eefb19d0244efe55c01f80f0e94db38223bc3036d58e06326
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
http://planilhasvba.com.br/wp-admin/js/k/index.php
http://rpk32ubon.ac.th/backup/k/index.php
http://4urhappiness.com/app/k/index.php
http://swedenkhabar.com/wp-admin/js/k/index.php
http://cio.lankapanel.net/wp-admin/js/k/index.php
http://fcmsites.com.br/canal/wp-admin/js/k/index.php
http://lacoibipitanga.com.br/maxart/k/index.php
http://lacoibipitanga.com.br/cgi-bin/k/index.php
http://video.nalahotel.com/k/index.php
http://diving-phocea.com/wp-admin/k/index.php
http://phocea-sudan.com/cgi-bin/k/index.php
http://rpk32ubon.ac.th/wp-admin/js/k/index.php
https://www.twinrealty.com/vworker/k/index.php
Extracted
raccoon
1.8.3-hotfix
c14e8219a761194140b8dfc2abce3a8292dd059a
-
url4cnc
http://94.158.245.137/h_electricryptors2
http://91.219.236.27/h_electricryptors2
http://94.158.245.167/h_electricryptors2
http://185.163.204.216/h_electricryptors2
http://185.225.19.238/h_electricryptors2
http://185.163.204.218/h_electricryptors2
https://t.me/h_electricryptors2
Extracted
raccoon
1.8.3-hotfix
b620be4c85b4051a92040003edbc322be4eb082d
-
url4cnc
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Extracted
arkei
Default
http://153.92.210.92/lYWcN6H7B1.php
Extracted
raccoon
1.8.3-hotfix
a1fcef6b211f7efaa652483b438c193569359f50
-
url4cnc
http://94.158.245.137/duglassa1
http://91.219.236.27/duglassa1
http://94.158.245.167/duglassa1
http://185.163.204.216/duglassa1
http://185.225.19.238/duglassa1
http://185.163.204.218/duglassa1
https://t.me/duglassa1
Signatures
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 2596 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 2596 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3900 2596 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2168 2596 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1064 2596 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2596 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2596 schtasks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1940-191-0x0000000001250000-0x00000000013B4000-memory.dmp family_redline behavioral1/memory/1600-323-0x000000000043702E-mapping.dmp family_redline behavioral1/memory/2948-326-0x0000000000418EF2-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE DCRAT Activity (GET)
-
suricata: ET MALWARE Possible Malicous Macro DL EXE Jul 01 2016 (userdir dotted quad)
suricata: ET MALWARE Possible Malicous Macro DL EXE Jul 01 2016 (userdir dotted quad)
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
-
Arkei Stealer Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/748-173-0x0000000000BE0000-0x00000000010AA000-memory.dmp family_arkei behavioral1/memory/748-174-0x0000000000BE0000-0x00000000010AA000-memory.dmp family_arkei behavioral1/memory/748-181-0x0000000000BE0000-0x00000000010AA000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 42 IoCs
Processes:
EE97.exeEE97.exe2344.exe9180.exe950B.exe950B.exeA5F4.exeA7AB.exeD36F.exeE64C.exeF32E.exeFF74.exe5894_1638662046_7378.exe136-1.exeZEN.exeUserAccountBroker.exeD36F.exe5894_1638662046_7378.exeUserAccountBroker.exe136-1.exeZEN.exeFetlocked.exeTriads.exeFetlocked.exeTriads.exeUserAccountBroker.exesihost64.exeUserAccountBroker.exesihost64.exe8E37.exe46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe979F.exe7506633d-8812-42df-9c2b-02ed45459b55.exe7506633d-8812-42df-9c2b-02ed45459b55.exeA135.exefac844af-5446-44ec-89ae-e4c4fdd491ae.exefac844af-5446-44ec-89ae-e4c4fdd491ae.exeA8F6.exeA8F6.exefeseserer.exefeseserer.exepid process 3196 EE97.exe 1456 EE97.exe 1424 2344.exe 208 9180.exe 548 950B.exe 3936 950B.exe 748 A5F4.exe 1220 A7AB.exe 1940 D36F.exe 1984 E64C.exe 3616 F32E.exe 3744 FF74.exe 3424 5894_1638662046_7378.exe 864 136-1.exe 1580 ZEN.exe 1612 UserAccountBroker.exe 3268 D36F.exe 2360 5894_1638662046_7378.exe 1472 UserAccountBroker.exe 1920 136-1.exe 1936 ZEN.exe 3592 Fetlocked.exe 3532 Triads.exe 1600 Fetlocked.exe 2948 Triads.exe 616 UserAccountBroker.exe 2940 sihost64.exe 4080 UserAccountBroker.exe 3992 sihost64.exe 1764 8E37.exe 1376 46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe 2200 46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe 1124 979F.exe 1988 7506633d-8812-42df-9c2b-02ed45459b55.exe 1768 7506633d-8812-42df-9c2b-02ed45459b55.exe 3820 A135.exe 1592 fac844af-5446-44ec-89ae-e4c4fdd491ae.exe 220 fac844af-5446-44ec-89ae-e4c4fdd491ae.exe 600 A8F6.exe 632 A8F6.exe 3768 feseserer.exe 3316 feseserer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
A5F4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion A5F4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion A5F4.exe -
Deletes itself 1 IoCs
Processes:
pid process 2984 -
Loads dropped DLL 4 IoCs
Processes:
A5F4.exe136-1.exepid process 748 A5F4.exe 748 A5F4.exe 748 A5F4.exe 864 136-1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
ZEN.exeFF74.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\UsbNDriver = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SqlMonoDisplayMode\\Ushellg.exe" ZEN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\A7AB = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\DMI87E8\\A7AB.exe\"" FF74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Windows\\System32\\XpsDocumentTargetPrint\\sihost.exe\"" FF74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\System32\\NcdAutoSetup\\taskhostw.exe\"" FF74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\BingFilterDS\\dwm.exe\"" FF74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UserAccountBroker = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.5\\ja\\UserAccountBroker.exe\"" FF74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D36F = "\"C:\\Documents and Settings\\D36F.exe\"" FF74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Windows Defender Advanced Threat Protection\\sppsvc.exe\"" FF74.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
A5F4.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA A5F4.exe -
Drops file in System32 directory 6 IoCs
Processes:
FF74.exedescription ioc process File created C:\Windows\System32\NcdAutoSetup\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 FF74.exe File created C:\Windows\System32\BingFilterDS\dwm.exe FF74.exe File created C:\Windows\System32\BingFilterDS\6cb0b6c459d5d3455a3da700e713f2e2529862ff FF74.exe File created C:\Windows\System32\XpsDocumentTargetPrint\sihost.exe FF74.exe File created C:\Windows\System32\XpsDocumentTargetPrint\66fc9ff0ee96c2b21f0cfded48750ae9e3032bf3 FF74.exe File created C:\Windows\System32\NcdAutoSetup\taskhostw.exe FF74.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
A5F4.exeD36F.exeA8F6.exefeseserer.exepid process 748 A5F4.exe 748 A5F4.exe 1940 D36F.exe 600 A8F6.exe 600 A8F6.exe 600 A8F6.exe 600 A8F6.exe 600 A8F6.exe 600 A8F6.exe 3768 feseserer.exe 3768 feseserer.exe 3768 feseserer.exe 3768 feseserer.exe 3768 feseserer.exe 3768 feseserer.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exeEE97.exe950B.exeFetlocked.exeTriads.exeA8F6.exefeseserer.exedescription pid process target process PID 2500 set thread context of 2860 2500 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe PID 3196 set thread context of 1456 3196 EE97.exe EE97.exe PID 548 set thread context of 3936 548 950B.exe 950B.exe PID 3592 set thread context of 1600 3592 Fetlocked.exe Fetlocked.exe PID 3532 set thread context of 2948 3532 Triads.exe Triads.exe PID 600 set thread context of 632 600 A8F6.exe A8F6.exe PID 3768 set thread context of 3316 3768 feseserer.exe feseserer.exe -
Drops file in Program Files directory 4 IoCs
Processes:
FF74.exedescription ioc process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\UserAccountBroker.exe FF74.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\e6aa45fc20ba296f5cc59a5e42b5c8d1a3f60bfe FF74.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\sppsvc.exe FF74.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c FF74.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3620 1600 WerFault.exe Fetlocked.exe 1384 600 WerFault.exe A8F6.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2344.exe136-1.exe758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exeEE97.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2344.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 136-1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2344.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2344.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 136-1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 136-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE97.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE97.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
A7AB.exeA5F4.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 A7AB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString A7AB.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 A5F4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString A5F4.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1376 schtasks.exe 1064 schtasks.exe 3656 schtasks.exe 612 schtasks.exe 2128 schtasks.exe 1588 schtasks.exe 1732 schtasks.exe 1488 schtasks.exe 3900 schtasks.exe 2168 schtasks.exe 2436 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2324 timeout.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exepid process 2860 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 2860 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2984 -
Suspicious behavior: MapViewOfSection 12 IoCs
Processes:
758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exeEE97.exe2344.exe136-1.exepid process 2860 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 1456 EE97.exe 1424 2344.exe 2984 2984 2984 2984 864 136-1.exe 2984 2984 2984 2984 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
FF74.exeD36F.exeUserAccountBroker.exeD36F.exeUserAccountBroker.exedescription pid process Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeDebugPrivilege 3744 FF74.exe Token: SeDebugPrivilege 1940 D36F.exe Token: SeDebugPrivilege 1612 UserAccountBroker.exe Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeDebugPrivilege 3268 D36F.exe Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeDebugPrivilege 1472 UserAccountBroker.exe Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exeEE97.exe950B.exeFF74.exe5894_1638662046_7378.exedescription pid process target process PID 2500 wrote to memory of 2860 2500 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe PID 2500 wrote to memory of 2860 2500 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe PID 2500 wrote to memory of 2860 2500 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe PID 2500 wrote to memory of 2860 2500 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe PID 2500 wrote to memory of 2860 2500 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe PID 2500 wrote to memory of 2860 2500 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe 758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe PID 2984 wrote to memory of 3196 2984 EE97.exe PID 2984 wrote to memory of 3196 2984 EE97.exe PID 2984 wrote to memory of 3196 2984 EE97.exe PID 3196 wrote to memory of 1456 3196 EE97.exe EE97.exe PID 3196 wrote to memory of 1456 3196 EE97.exe EE97.exe PID 3196 wrote to memory of 1456 3196 EE97.exe EE97.exe PID 3196 wrote to memory of 1456 3196 EE97.exe EE97.exe PID 3196 wrote to memory of 1456 3196 EE97.exe EE97.exe PID 3196 wrote to memory of 1456 3196 EE97.exe EE97.exe PID 2984 wrote to memory of 1424 2984 2344.exe PID 2984 wrote to memory of 1424 2984 2344.exe PID 2984 wrote to memory of 1424 2984 2344.exe PID 2984 wrote to memory of 208 2984 9180.exe PID 2984 wrote to memory of 208 2984 9180.exe PID 2984 wrote to memory of 208 2984 9180.exe PID 2984 wrote to memory of 548 2984 950B.exe PID 2984 wrote to memory of 548 2984 950B.exe PID 2984 wrote to memory of 548 2984 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 548 wrote to memory of 3936 548 950B.exe 950B.exe PID 2984 wrote to memory of 748 2984 A5F4.exe PID 2984 wrote to memory of 748 2984 A5F4.exe PID 2984 wrote to memory of 748 2984 A5F4.exe PID 2984 wrote to memory of 1220 2984 A7AB.exe PID 2984 wrote to memory of 1220 2984 A7AB.exe PID 2984 wrote to memory of 1220 2984 A7AB.exe PID 2984 wrote to memory of 1600 2984 explorer.exe PID 2984 wrote to memory of 1600 2984 explorer.exe PID 2984 wrote to memory of 1600 2984 explorer.exe PID 2984 wrote to memory of 1600 2984 explorer.exe PID 2984 wrote to memory of 1660 2984 explorer.exe PID 2984 wrote to memory of 1660 2984 explorer.exe PID 2984 wrote to memory of 1660 2984 explorer.exe PID 2984 wrote to memory of 1940 2984 D36F.exe PID 2984 wrote to memory of 1940 2984 D36F.exe PID 2984 wrote to memory of 1940 2984 D36F.exe PID 2984 wrote to memory of 1984 2984 E64C.exe PID 2984 wrote to memory of 1984 2984 E64C.exe PID 2984 wrote to memory of 3616 2984 F32E.exe PID 2984 wrote to memory of 3616 2984 F32E.exe PID 2984 wrote to memory of 3616 2984 F32E.exe PID 2984 wrote to memory of 3744 2984 FF74.exe PID 2984 wrote to memory of 3744 2984 FF74.exe PID 3744 wrote to memory of 3424 3744 FF74.exe 5894_1638662046_7378.exe PID 3744 wrote to memory of 3424 3744 FF74.exe 5894_1638662046_7378.exe PID 3744 wrote to memory of 3424 3744 FF74.exe 5894_1638662046_7378.exe PID 3424 wrote to memory of 360 3424 5894_1638662046_7378.exe cmd.exe PID 3424 wrote to memory of 360 3424 5894_1638662046_7378.exe cmd.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe"C:\Users\Admin\AppData\Local\Temp\758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe"C:\Users\Admin\AppData\Local\Temp\758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EE97.exeC:\Users\Admin\AppData\Local\Temp\EE97.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\EE97.exeC:\Users\Admin\AppData\Local\Temp\EE97.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\2344.exeC:\Users\Admin\AppData\Local\Temp\2344.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\9180.exeC:\Users\Admin\AppData\Local\Temp\9180.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\950B.exeC:\Users\Admin\AppData\Local\Temp\950B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\950B.exeC:\Users\Admin\AppData\Local\Temp\950B.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\A5F4.exeC:\Users\Admin\AppData\Local\Temp\A5F4.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\A7AB.exeC:\Users\Admin\AppData\Local\Temp\A7AB.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\cOAghBLe & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\A7AB.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\D36F.exeC:\Users\Admin\AppData\Local\Temp\D36F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\E64C.exeC:\Users\Admin\AppData\Local\Temp\E64C.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exe"C:\Users\Admin\AppData\Local\Temp\Fetlocked.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeC:\Users\Admin\AppData\Local\Temp\Fetlocked.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 244⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\Triads.exe"C:\Users\Admin\AppData\Local\Temp\Triads.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\Triads.exeC:\Users\Admin\AppData\Local\Temp\Triads.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\F32E.exeC:\Users\Admin\AppData\Local\Temp\F32E.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FF74.exeC:\Users\Admin\AppData\Local\Temp\FF74.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\5894_1638662046_7378.exe"C:\ProgramData\5894_1638662046_7378.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\136-1.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\136-1.exeC:\Users\Admin\AppData\Local\Temp\136-1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\ZEN.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\ZEN.exeC:\Users\Admin\AppData\Local\Temp\ZEN.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /tn UsbDriver /f5⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /rl highest /tn UsbDriver /tr "C:\Users\Admin\AppData\Roaming\Microsoft\SqlMonoDisplayMode\Ushellg.exe" /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Self.bat" "5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "ZEN.exe5⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 16⤵
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Roaming\UserAccountBroker.exe3⤵
-
C:\Users\Admin\AppData\Roaming\UserAccountBroker.exeC:\Users\Admin\AppData\Roaming\UserAccountBroker.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "UserAccountBroker" /tr "C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe"5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "UserAccountBroker" /tr "C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exeC:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"7⤵
- Executes dropped EXE
-
C:\Documents and Settings\D36F.exe"C:\Documents and Settings\D36F.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\5894_1638662046_7378.exe"C:\ProgramData\5894_1638662046_7378.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\136-1.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\136-1.exeC:\Users\Admin\AppData\Local\Temp\136-1.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Roaming\UserAccountBroker.exe4⤵
-
C:\Users\Admin\AppData\Roaming\UserAccountBroker.exeC:\Users\Admin\AppData\Roaming\UserAccountBroker.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "UserAccountBroker" /tr "C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "UserAccountBroker" /tr "C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe"7⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exeC:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\ZEN.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\ZEN.exeC:\Users\Admin\AppData\Local\Temp\ZEN.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /tn UsbDriver /f6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Self.bat" "6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "ZEN.exe6⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 17⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "A7AB" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\DMI87E8\A7AB.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\XpsDocumentTargetPrint\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\NcdAutoSetup\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "UserAccountBroker" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\UserAccountBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\BingFilterDS\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "D36F" /sc ONLOGON /tr "'C:\Documents and Settings\D36F.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\8E37.exeC:\Users\Admin\AppData\Local\Temp\8E37.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ac142635-d618-4421-8458-373e3608e316\46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe"C:\Users\Admin\AppData\Local\Temp\ac142635-d618-4421-8458-373e3608e316\46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\8E37.exe" /WindowState ""1"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ac142635-d618-4421-8458-373e3608e316\46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe"C:\Users\Admin\AppData\Local\Temp\ac142635-d618-4421-8458-373e3608e316\46a40dbf-9cc0-430d-9be4-2ee998e4db9d.exe" /SpecialRun 4101d8 13763⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\979F.exeC:\Users\Admin\AppData\Local\Temp\979F.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5d4fe039-9b03-4d94-9ed9-2b729fac7a39\7506633d-8812-42df-9c2b-02ed45459b55.exe"C:\Users\Admin\AppData\Local\Temp\5d4fe039-9b03-4d94-9ed9-2b729fac7a39\7506633d-8812-42df-9c2b-02ed45459b55.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\979F.exe" /WindowState ""1"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5d4fe039-9b03-4d94-9ed9-2b729fac7a39\7506633d-8812-42df-9c2b-02ed45459b55.exe"C:\Users\Admin\AppData\Local\Temp\5d4fe039-9b03-4d94-9ed9-2b729fac7a39\7506633d-8812-42df-9c2b-02ed45459b55.exe" /SpecialRun 4101d8 19883⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\A135.exeC:\Users\Admin\AppData\Local\Temp\A135.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b5fd16d3-bb21-4813-a16c-077b4c99faa7\fac844af-5446-44ec-89ae-e4c4fdd491ae.exe"C:\Users\Admin\AppData\Local\Temp\b5fd16d3-bb21-4813-a16c-077b4c99faa7\fac844af-5446-44ec-89ae-e4c4fdd491ae.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\A135.exe" /WindowState ""1"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b5fd16d3-bb21-4813-a16c-077b4c99faa7\fac844af-5446-44ec-89ae-e4c4fdd491ae.exe"C:\Users\Admin\AppData\Local\Temp\b5fd16d3-bb21-4813-a16c-077b4c99faa7\fac844af-5446-44ec-89ae-e4c4fdd491ae.exe" /SpecialRun 4101d8 15923⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\A8F6.exeC:\Users\Admin\AppData\Local\Temp\A8F6.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\A8F6.exe"C:\Users\Admin\AppData\Local\Temp\A8F6.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\feseserer.exe'"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\feseserer.exe"C:\Users\Admin\AppData\Roaming\feseserer.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\feseserer.exe"C:\Users\Admin\AppData\Roaming\feseserer.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 9402⤵
- Program crash
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Documents and Settings\D36F.exeMD5
54a2b455a1c66a105a4c47f4780e4fe3
SHA1d737551855b9d38fa68af5f1eac005b31de13848
SHA25638dbfe3e95b603dcde4eb8b64015bf2548dda4f56611d873a12d94c5dd4af2b2
SHA51225b02afd407d0cdb73e667a4fedac1fc41fcebc9cedea71a0647e89559492eae63956e06a856699053745f021dbe2722f8f00f9e844e635827198bea8c928327
-
C:\ProgramData\5894_1638662046_7378.exeMD5
9e900e1e67f18c994f83754cdb675977
SHA19fa8847ba8a5eb721ca69bc11d874648ed0e2647
SHA256dac0453a1239f16a52f2b6697b3a13bac8cf4d9bb6f4a0e622e354e4b25275e3
SHA5120a992dce28acb33fc682a741dfc39340c9a9fd4fbbd9d992ef65e5e8bdb7ada157d21b9ca1c87720fbfe7e5d645b01960e2ece2763f386d772833793e2229c39
-
C:\ProgramData\5894_1638662046_7378.exeMD5
9e900e1e67f18c994f83754cdb675977
SHA19fa8847ba8a5eb721ca69bc11d874648ed0e2647
SHA256dac0453a1239f16a52f2b6697b3a13bac8cf4d9bb6f4a0e622e354e4b25275e3
SHA5120a992dce28acb33fc682a741dfc39340c9a9fd4fbbd9d992ef65e5e8bdb7ada157d21b9ca1c87720fbfe7e5d645b01960e2ece2763f386d772833793e2229c39
-
C:\ProgramData\5894_1638662046_7378.exeMD5
9e900e1e67f18c994f83754cdb675977
SHA19fa8847ba8a5eb721ca69bc11d874648ed0e2647
SHA256dac0453a1239f16a52f2b6697b3a13bac8cf4d9bb6f4a0e622e354e4b25275e3
SHA5120a992dce28acb33fc682a741dfc39340c9a9fd4fbbd9d992ef65e5e8bdb7ada157d21b9ca1c87720fbfe7e5d645b01960e2ece2763f386d772833793e2229c39
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UserAccountBroker.exe.logMD5
ccab855674fc209084a77e39bb2d0e4a
SHA1b650dd0c67a9af9944ea8379104e2d3ad7cfdd83
SHA256a105106a58b72abea9c6c73700c88c95aff096b6eda3d9fd396bbd9db67f8be7
SHA512b79a21f8aeaf948fa4665c90a85a1edc754666e7ebfb15255e58bc6ab827a36c93f11822105e42a3565e797dd318ccc97f8f0671508480955440eff8ed5e7fd6
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Triads.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZEN.exe.logMD5
957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
C:\Users\Admin\AppData\Local\Temp\136-1.exeMD5
db9a089c112621e85cc2d4c80fed0f18
SHA1da57e61cdd11fb924f5db5a4b093c25d37f040cf
SHA2569c53ac5c4df5af245263ee0d01c159378b285911fe85e10b7669b9224570a5dd
SHA512a853e2e559a521b5cc273cd170cacbe81fed256547c0174a2b8e5d9aadc5f78ef6b6b9ea90f879fbdfd9db9ab98a702ec2dc048d48db754360cfe5c8031e7a5d
-
C:\Users\Admin\AppData\Local\Temp\136-1.exeMD5
db9a089c112621e85cc2d4c80fed0f18
SHA1da57e61cdd11fb924f5db5a4b093c25d37f040cf
SHA2569c53ac5c4df5af245263ee0d01c159378b285911fe85e10b7669b9224570a5dd
SHA512a853e2e559a521b5cc273cd170cacbe81fed256547c0174a2b8e5d9aadc5f78ef6b6b9ea90f879fbdfd9db9ab98a702ec2dc048d48db754360cfe5c8031e7a5d
-
C:\Users\Admin\AppData\Local\Temp\136-1.exeMD5
db9a089c112621e85cc2d4c80fed0f18
SHA1da57e61cdd11fb924f5db5a4b093c25d37f040cf
SHA2569c53ac5c4df5af245263ee0d01c159378b285911fe85e10b7669b9224570a5dd
SHA512a853e2e559a521b5cc273cd170cacbe81fed256547c0174a2b8e5d9aadc5f78ef6b6b9ea90f879fbdfd9db9ab98a702ec2dc048d48db754360cfe5c8031e7a5d
-
C:\Users\Admin\AppData\Local\Temp\2344.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\2344.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\9180.exeMD5
ef7c513d3695a4b54a42b9da519b7d6d
SHA18127b36a2856b29f73d32322e5d61c7277caad20
SHA2566d6f4dead6e8c49fad1b5316cc14190f42fdf86a3f7c549bf24abc5a1683e78b
SHA512bf89b2398bbc6e7f8d498259197617f18d3ccf8a15a8841682125ae32664094cf3c0872e9b539553376f46c8d7c94c59615a02c2fc4c4eefe768653e66d9d0df
-
C:\Users\Admin\AppData\Local\Temp\9180.exeMD5
ef7c513d3695a4b54a42b9da519b7d6d
SHA18127b36a2856b29f73d32322e5d61c7277caad20
SHA2566d6f4dead6e8c49fad1b5316cc14190f42fdf86a3f7c549bf24abc5a1683e78b
SHA512bf89b2398bbc6e7f8d498259197617f18d3ccf8a15a8841682125ae32664094cf3c0872e9b539553376f46c8d7c94c59615a02c2fc4c4eefe768653e66d9d0df
-
C:\Users\Admin\AppData\Local\Temp\950B.exeMD5
45cf4ea0f9268e7306da20dea9d14210
SHA13574746d1d089f9989ee2c9e2048f014a61100ca
SHA256919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281
SHA5123996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d
-
C:\Users\Admin\AppData\Local\Temp\950B.exeMD5
45cf4ea0f9268e7306da20dea9d14210
SHA13574746d1d089f9989ee2c9e2048f014a61100ca
SHA256919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281
SHA5123996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d
-
C:\Users\Admin\AppData\Local\Temp\950B.exeMD5
45cf4ea0f9268e7306da20dea9d14210
SHA13574746d1d089f9989ee2c9e2048f014a61100ca
SHA256919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281
SHA5123996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d
-
C:\Users\Admin\AppData\Local\Temp\A5F4.exeMD5
1b207ddcd4c46699ff46c7fa7ed2de4b
SHA164fe034264b3aad0c5b803a4c0e6a9ff33659a9c
SHA25611144b039458f096d493a47411c028996236b8a75ed4264558f3edeb22af88f5
SHA5124e51c4ea346c7ee05d7f67472efa6bd24fdb412be305ab2205ce8ae9a9813c06c4577433ad6fad115eed23f027bda69536fea69d89862b023b7924597f2ddc3d
-
C:\Users\Admin\AppData\Local\Temp\A5F4.exeMD5
1b207ddcd4c46699ff46c7fa7ed2de4b
SHA164fe034264b3aad0c5b803a4c0e6a9ff33659a9c
SHA25611144b039458f096d493a47411c028996236b8a75ed4264558f3edeb22af88f5
SHA5124e51c4ea346c7ee05d7f67472efa6bd24fdb412be305ab2205ce8ae9a9813c06c4577433ad6fad115eed23f027bda69536fea69d89862b023b7924597f2ddc3d
-
C:\Users\Admin\AppData\Local\Temp\A7AB.exeMD5
14e37112d0d3164e771ad7e97bc7a593
SHA1cbd7cc78bbfb1906e81c556e83cf2ec0d2e47391
SHA256eadcbf022876f82b9037944e2f48b035ec492cc6782c6afca7b0a5cd6895ed55
SHA512bdc42398b5548e01d1588539b23091869658a579334327ba017470cdb95b734e22faeb05a6a9464e7a8a9505ef0f5f0fd609e12e646df6307cc0ffcbd5212a5f
-
C:\Users\Admin\AppData\Local\Temp\A7AB.exeMD5
14e37112d0d3164e771ad7e97bc7a593
SHA1cbd7cc78bbfb1906e81c556e83cf2ec0d2e47391
SHA256eadcbf022876f82b9037944e2f48b035ec492cc6782c6afca7b0a5cd6895ed55
SHA512bdc42398b5548e01d1588539b23091869658a579334327ba017470cdb95b734e22faeb05a6a9464e7a8a9505ef0f5f0fd609e12e646df6307cc0ffcbd5212a5f
-
C:\Users\Admin\AppData\Local\Temp\BC84.tmpMD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
C:\Users\Admin\AppData\Local\Temp\D36F.exeMD5
31eabb669dbd8262f6366b89b7b390be
SHA1938aeea46b76f375afd85a22a3edbafe6db7a8b4
SHA2566d6db3d2350de0ba05603b3ed3238bb5022ca300882fd4e709a6f424e9902c2e
SHA5124e281da8f422f413e27c6465c18d3889958cb9339bc18c8b482749d93ef262ca91a8c1275117ad7060fc8a02a6e118d79fa6eaf96a97face8283c3203c1b9060
-
C:\Users\Admin\AppData\Local\Temp\D36F.exeMD5
31eabb669dbd8262f6366b89b7b390be
SHA1938aeea46b76f375afd85a22a3edbafe6db7a8b4
SHA2566d6db3d2350de0ba05603b3ed3238bb5022ca300882fd4e709a6f424e9902c2e
SHA5124e281da8f422f413e27c6465c18d3889958cb9339bc18c8b482749d93ef262ca91a8c1275117ad7060fc8a02a6e118d79fa6eaf96a97face8283c3203c1b9060
-
C:\Users\Admin\AppData\Local\Temp\E64C.exeMD5
48d12265892dd2762c0a435fe33f17f8
SHA1fe7d3f83780f6bfdc7af55b2d2aa672bb4808ea6
SHA256466c4a9f01e7b04499eafee7a9283df00ed06c00134cc3dc37ef9515881c525a
SHA512b674b81ec745a7e4c91fc957fda267510eee65452593bfe4b5afcd25d7e6de50d678b9f1a5d5d4a966cb64a3113a58460db8eb2dec0c117400fd4f9d6ffc7394
-
C:\Users\Admin\AppData\Local\Temp\E64C.exeMD5
48d12265892dd2762c0a435fe33f17f8
SHA1fe7d3f83780f6bfdc7af55b2d2aa672bb4808ea6
SHA256466c4a9f01e7b04499eafee7a9283df00ed06c00134cc3dc37ef9515881c525a
SHA512b674b81ec745a7e4c91fc957fda267510eee65452593bfe4b5afcd25d7e6de50d678b9f1a5d5d4a966cb64a3113a58460db8eb2dec0c117400fd4f9d6ffc7394
-
C:\Users\Admin\AppData\Local\Temp\EE97.exeMD5
f5505eb7c39ad86f08d792639777e52e
SHA1dc33ae95ffc6019a9fb2a08fb95293a29ecf2465
SHA256758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021
SHA512ae84205a826997a0cf2be5d9a40d8d69845e1bdaa0520e2c50c0d9de2dc901bfcb92594773830d6eefb19d0244efe55c01f80f0e94db38223bc3036d58e06326
-
C:\Users\Admin\AppData\Local\Temp\EE97.exeMD5
f5505eb7c39ad86f08d792639777e52e
SHA1dc33ae95ffc6019a9fb2a08fb95293a29ecf2465
SHA256758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021
SHA512ae84205a826997a0cf2be5d9a40d8d69845e1bdaa0520e2c50c0d9de2dc901bfcb92594773830d6eefb19d0244efe55c01f80f0e94db38223bc3036d58e06326
-
C:\Users\Admin\AppData\Local\Temp\EE97.exeMD5
f5505eb7c39ad86f08d792639777e52e
SHA1dc33ae95ffc6019a9fb2a08fb95293a29ecf2465
SHA256758c13d826f252d3bf62db08900519f34bca0ffebf4c8ef0d86a1f624e967021
SHA512ae84205a826997a0cf2be5d9a40d8d69845e1bdaa0520e2c50c0d9de2dc901bfcb92594773830d6eefb19d0244efe55c01f80f0e94db38223bc3036d58e06326
-
C:\Users\Admin\AppData\Local\Temp\F32E.exeMD5
1ac477e104183f2033ad5caabd8b9a76
SHA1e1f62d9cd12c2f3bd4338791090315fa3bda4e20
SHA25623e3ab4aa0841cf162fb7b324aa458ce04d47c325fe5ca47ccd3abc77ccbd86b
SHA51261e1d6e4a58fecddddb8aae1883439ebba1109ec900ef9a2fbcbb970829d67375347965933bf74d4915cf6dbc8ad2ea4d4d460d463c62f8f7ade1e421843b848
-
C:\Users\Admin\AppData\Local\Temp\F32E.exeMD5
1ac477e104183f2033ad5caabd8b9a76
SHA1e1f62d9cd12c2f3bd4338791090315fa3bda4e20
SHA25623e3ab4aa0841cf162fb7b324aa458ce04d47c325fe5ca47ccd3abc77ccbd86b
SHA51261e1d6e4a58fecddddb8aae1883439ebba1109ec900ef9a2fbcbb970829d67375347965933bf74d4915cf6dbc8ad2ea4d4d460d463c62f8f7ade1e421843b848
-
C:\Users\Admin\AppData\Local\Temp\FF74.exeMD5
54a2b455a1c66a105a4c47f4780e4fe3
SHA1d737551855b9d38fa68af5f1eac005b31de13848
SHA25638dbfe3e95b603dcde4eb8b64015bf2548dda4f56611d873a12d94c5dd4af2b2
SHA51225b02afd407d0cdb73e667a4fedac1fc41fcebc9cedea71a0647e89559492eae63956e06a856699053745f021dbe2722f8f00f9e844e635827198bea8c928327
-
C:\Users\Admin\AppData\Local\Temp\FF74.exeMD5
54a2b455a1c66a105a4c47f4780e4fe3
SHA1d737551855b9d38fa68af5f1eac005b31de13848
SHA25638dbfe3e95b603dcde4eb8b64015bf2548dda4f56611d873a12d94c5dd4af2b2
SHA51225b02afd407d0cdb73e667a4fedac1fc41fcebc9cedea71a0647e89559492eae63956e06a856699053745f021dbe2722f8f00f9e844e635827198bea8c928327
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeMD5
399289fefce9004754aa98ca823ebc14
SHA1402220a50be951b176d233a49e1f302a08857ba7
SHA256557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
SHA512e088867327e025a03ffeda5cbc766ae5e7ceef01a25ec6c96a0632f8814126b232d41d2b7027ae129c0a2284a8fdeec84a4beeb73996bf1a4d704665ab3f6e4f
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeMD5
399289fefce9004754aa98ca823ebc14
SHA1402220a50be951b176d233a49e1f302a08857ba7
SHA256557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
SHA512e088867327e025a03ffeda5cbc766ae5e7ceef01a25ec6c96a0632f8814126b232d41d2b7027ae129c0a2284a8fdeec84a4beeb73996bf1a4d704665ab3f6e4f
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeMD5
399289fefce9004754aa98ca823ebc14
SHA1402220a50be951b176d233a49e1f302a08857ba7
SHA256557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
SHA512e088867327e025a03ffeda5cbc766ae5e7ceef01a25ec6c96a0632f8814126b232d41d2b7027ae129c0a2284a8fdeec84a4beeb73996bf1a4d704665ab3f6e4f
-
C:\Users\Admin\AppData\Local\Temp\Self.batMD5
7c9933e0cb793bc5d1b831ba5ea5c5f9
SHA1d0c57eff8f6a7779302d2bf154aff349f23ff91f
SHA2561c25062b7b8a9b199cc086481f7c554d33e9040a87de632ad0fe353e6bb29a59
SHA5125f52eba9fb5c9e28db607b282149714c08e64538e71a5ec4bdf049a138fdbf9911bd6dfd5083457ec0f979bea6abccc57875b631dbf61d3308d30e76dd623253
-
C:\Users\Admin\AppData\Local\Temp\Self.batMD5
7c9933e0cb793bc5d1b831ba5ea5c5f9
SHA1d0c57eff8f6a7779302d2bf154aff349f23ff91f
SHA2561c25062b7b8a9b199cc086481f7c554d33e9040a87de632ad0fe353e6bb29a59
SHA5125f52eba9fb5c9e28db607b282149714c08e64538e71a5ec4bdf049a138fdbf9911bd6dfd5083457ec0f979bea6abccc57875b631dbf61d3308d30e76dd623253
-
C:\Users\Admin\AppData\Local\Temp\Triads.exeMD5
402577e230849f875d8e0aa2a82c70d9
SHA147ae78b445c1da9b8192eac263a19eacce64b39e
SHA256348fb27248310d8a6984bdb66796cf2cbc8871adc4ade19a9b3d8324cd2a2f02
SHA512daefd105d8f981b09722b4e752bdd5896b568d4634d75b60bc1f9420fcc948c7d5dd6b2e9f3a914a269cfc86fdeedecb9469b3aa6aadd99cc03a7b77ee565138
-
C:\Users\Admin\AppData\Local\Temp\Triads.exeMD5
402577e230849f875d8e0aa2a82c70d9
SHA147ae78b445c1da9b8192eac263a19eacce64b39e
SHA256348fb27248310d8a6984bdb66796cf2cbc8871adc4ade19a9b3d8324cd2a2f02
SHA512daefd105d8f981b09722b4e752bdd5896b568d4634d75b60bc1f9420fcc948c7d5dd6b2e9f3a914a269cfc86fdeedecb9469b3aa6aadd99cc03a7b77ee565138
-
C:\Users\Admin\AppData\Local\Temp\Triads.exeMD5
402577e230849f875d8e0aa2a82c70d9
SHA147ae78b445c1da9b8192eac263a19eacce64b39e
SHA256348fb27248310d8a6984bdb66796cf2cbc8871adc4ade19a9b3d8324cd2a2f02
SHA512daefd105d8f981b09722b4e752bdd5896b568d4634d75b60bc1f9420fcc948c7d5dd6b2e9f3a914a269cfc86fdeedecb9469b3aa6aadd99cc03a7b77ee565138
-
C:\Users\Admin\AppData\Local\Temp\ZEN.exeMD5
d4d576e097c6fb009f95193e2d35a8eb
SHA138f26fe4861211236dd711b21442ba6ef3b1255b
SHA2560db766e30bb49b971b5bdd20341e4953615f1aa671e0fa36d94639d374b2be00
SHA51268430f4e5d30eab12581fb6bcec31395296ef5969569661fbf2c3ee6a5e7964dd3055b4741865423daaa677e342cb4a2ad5b9de401516f6cf8aeb47009c387c7
-
C:\Users\Admin\AppData\Local\Temp\ZEN.exeMD5
d4d576e097c6fb009f95193e2d35a8eb
SHA138f26fe4861211236dd711b21442ba6ef3b1255b
SHA2560db766e30bb49b971b5bdd20341e4953615f1aa671e0fa36d94639d374b2be00
SHA51268430f4e5d30eab12581fb6bcec31395296ef5969569661fbf2c3ee6a5e7964dd3055b4741865423daaa677e342cb4a2ad5b9de401516f6cf8aeb47009c387c7
-
C:\Users\Admin\AppData\Local\Temp\ZEN.exeMD5
d4d576e097c6fb009f95193e2d35a8eb
SHA138f26fe4861211236dd711b21442ba6ef3b1255b
SHA2560db766e30bb49b971b5bdd20341e4953615f1aa671e0fa36d94639d374b2be00
SHA51268430f4e5d30eab12581fb6bcec31395296ef5969569661fbf2c3ee6a5e7964dd3055b4741865423daaa677e342cb4a2ad5b9de401516f6cf8aeb47009c387c7
-
C:\Users\Admin\AppData\Local\Temp\ZEN.exeMD5
d4d576e097c6fb009f95193e2d35a8eb
SHA138f26fe4861211236dd711b21442ba6ef3b1255b
SHA2560db766e30bb49b971b5bdd20341e4953615f1aa671e0fa36d94639d374b2be00
SHA51268430f4e5d30eab12581fb6bcec31395296ef5969569661fbf2c3ee6a5e7964dd3055b4741865423daaa677e342cb4a2ad5b9de401516f6cf8aeb47009c387c7
-
C:\Users\Admin\AppData\Local\Temp\cOAghBLe\DDRNJH~1.ZIPMD5
dbdfeed587457763abc91bec508306ff
SHA1252e0bb11e44861f608bff5edee44b269fca6303
SHA2569945d3d0de3736615cf4a1a6e721e70a06aa89e0714c8fbf6c4e1672178a4223
SHA512beb426f7f1e3b45a0707c5040d2deed97924c390b5fd0504abf1b1fb8939e7ce147ca02adf4151363cda04a3758a6f0ccc638287a5d0119843da49803c2f7eed
-
C:\Users\Admin\AppData\Local\Temp\cOAghBLe\files_\SCREEN~1.JPGMD5
42fb1407c16838842652e72006080b48
SHA12c42c529477eda7b3e45b02cbf3dfe1f67f34506
SHA256b00835df257db84049faf542b9b058071c4c33fb975265684d0f2c376731350a
SHA512c71a9cb28a0a4dd822c4283306bf5391d6d247cf8b731007fbf62eedb1721bc91045933c957cbc20eda8808077f28fead31969b5aff74eadc03e203bdb2ebfb8
-
C:\Users\Admin\AppData\Local\Temp\cOAghBLe\files_\SYSTEM~1.TXTMD5
905dd4c12366471ef10e6ec70705d665
SHA1c7b8e93ce00cef50acc7fbfe4a8910cabf85254e
SHA25653a002c831f3bfdaa4fd2cc7c24f66276f2d554c0f41a754f0df7fec9baccf21
SHA51240a69c061ca49cdb89713a01f2bb59067206e9b0f35ed4c40a70b950b4bb68cece33dfa6fcddaf324412314f1bfe7beed2b747be4102ee2ba0ff9f93b1739d07
-
C:\Users\Admin\AppData\Local\Temp\cOAghBLe\files_\_Chrome\DEFAUL~1.BINMD5
b963abf9a7967b3a22da64c9193fc932
SHA10831556392b56c00b07f04deb5474c4202c545e8
SHA2566c0930a55e2b55dc01dbbcf1b43f4ceae3bd4b25bdde062953292427bdcb18f5
SHA51264514a43b52786e09676bec07e15bc7224309c06c0ea5f691933ca3164c57a3e33d748fa8bd4596cf7deb64cbcd1e49ca75be4c22d79789d7ac3b1df45c19af2
-
C:\Users\Admin\AppData\Local\Temp\cOAghBLe\files_\_Chrome\DEFAUL~1.DBMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\cOAghBLe\files_\_Chrome\DEFAUL~2.DBMD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
C:\Users\Admin\AppData\Local\Temp\cOAghBLe\files_\_Chrome\DEFAUL~3.DBMD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exeMD5
26787f94fb110faa1c03d0edc5898cf7
SHA1fe8c82fdf2a6ce8633d2c1ec92f44210f05e7611
SHA256e801961be6ac9b2b2c27c8bf87d24114207bb0d68c8fd3aaec390ec5f0ca2629
SHA51278a8b3d780b4e2db1feda9b301556133674c36c98347833e576238cbec4631d290b76ec116c478ccd26b4b3460bf99647e6cd38340b5cb5047123f2251d34dfc
-
C:\Users\Admin\AppData\Roaming\MicrosoftEgdeUpdate\UserAccountBroker.exeMD5
26787f94fb110faa1c03d0edc5898cf7
SHA1fe8c82fdf2a6ce8633d2c1ec92f44210f05e7611
SHA256e801961be6ac9b2b2c27c8bf87d24114207bb0d68c8fd3aaec390ec5f0ca2629
SHA51278a8b3d780b4e2db1feda9b301556133674c36c98347833e576238cbec4631d290b76ec116c478ccd26b4b3460bf99647e6cd38340b5cb5047123f2251d34dfc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exeMD5
134df0d7cb3964e8cbb9b0fa0637ccb5
SHA10ca097308d78b44e0c2c98ab856b67679c8de5b6
SHA256b258dcdfe6b5f4c7557b324e5139fbd72882ecff319f9c3811ef05f2ebff4b46
SHA5128a268213fff458f41206d0b6a083b06ce393b0f8bb9489185a6a012a20b30f21db61bf40f4c8532079dd7838c6cb40e3a113611f04ec9efd2b148647ae55923e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exeMD5
134df0d7cb3964e8cbb9b0fa0637ccb5
SHA10ca097308d78b44e0c2c98ab856b67679c8de5b6
SHA256b258dcdfe6b5f4c7557b324e5139fbd72882ecff319f9c3811ef05f2ebff4b46
SHA5128a268213fff458f41206d0b6a083b06ce393b0f8bb9489185a6a012a20b30f21db61bf40f4c8532079dd7838c6cb40e3a113611f04ec9efd2b148647ae55923e
-
C:\Users\Admin\AppData\Roaming\UserAccountBroker.exeMD5
26787f94fb110faa1c03d0edc5898cf7
SHA1fe8c82fdf2a6ce8633d2c1ec92f44210f05e7611
SHA256e801961be6ac9b2b2c27c8bf87d24114207bb0d68c8fd3aaec390ec5f0ca2629
SHA51278a8b3d780b4e2db1feda9b301556133674c36c98347833e576238cbec4631d290b76ec116c478ccd26b4b3460bf99647e6cd38340b5cb5047123f2251d34dfc
-
C:\Users\Admin\AppData\Roaming\UserAccountBroker.exeMD5
26787f94fb110faa1c03d0edc5898cf7
SHA1fe8c82fdf2a6ce8633d2c1ec92f44210f05e7611
SHA256e801961be6ac9b2b2c27c8bf87d24114207bb0d68c8fd3aaec390ec5f0ca2629
SHA51278a8b3d780b4e2db1feda9b301556133674c36c98347833e576238cbec4631d290b76ec116c478ccd26b4b3460bf99647e6cd38340b5cb5047123f2251d34dfc
-
C:\Users\Admin\AppData\Roaming\UserAccountBroker.exeMD5
26787f94fb110faa1c03d0edc5898cf7
SHA1fe8c82fdf2a6ce8633d2c1ec92f44210f05e7611
SHA256e801961be6ac9b2b2c27c8bf87d24114207bb0d68c8fd3aaec390ec5f0ca2629
SHA51278a8b3d780b4e2db1feda9b301556133674c36c98347833e576238cbec4631d290b76ec116c478ccd26b4b3460bf99647e6cd38340b5cb5047123f2251d34dfc
-
C:\Users\D36F.exeMD5
54a2b455a1c66a105a4c47f4780e4fe3
SHA1d737551855b9d38fa68af5f1eac005b31de13848
SHA25638dbfe3e95b603dcde4eb8b64015bf2548dda4f56611d873a12d94c5dd4af2b2
SHA51225b02afd407d0cdb73e667a4fedac1fc41fcebc9cedea71a0647e89559492eae63956e06a856699053745f021dbe2722f8f00f9e844e635827198bea8c928327
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
\Users\Admin\AppData\Local\Temp\BC84.tmpMD5
50741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
memory/208-139-0x0000000000000000-mapping.dmp
-
memory/208-146-0x0000000002100000-0x000000000218F000-memory.dmpFilesize
572KB
-
memory/208-145-0x00000000005C9000-0x0000000000618000-memory.dmpFilesize
316KB
-
memory/208-147-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/220-407-0x0000000000000000-mapping.dmp
-
memory/360-239-0x0000000000000000-mapping.dmp
-
memory/548-142-0x0000000000000000-mapping.dmp
-
memory/548-148-0x0000000000858000-0x00000000008C8000-memory.dmpFilesize
448KB
-
memory/548-152-0x00000000021E0000-0x0000000002262000-memory.dmpFilesize
520KB
-
memory/600-415-0x00000000053F0000-0x00000000053F1000-memory.dmpFilesize
4KB
-
memory/612-298-0x0000000000000000-mapping.dmp
-
memory/616-338-0x0000000000000000-mapping.dmp
-
memory/616-350-0x000000001C440000-0x000000001C442000-memory.dmpFilesize
8KB
-
memory/632-424-0x0000000005040000-0x00000000050DC000-memory.dmpFilesize
624KB
-
memory/748-181-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-157-0x0000000000000000-mapping.dmp
-
memory/748-161-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-165-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-167-0x00000000011B0000-0x00000000011F5000-memory.dmpFilesize
276KB
-
memory/748-169-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-172-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-176-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-164-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-174-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-170-0x00000000768B0000-0x0000000076A72000-memory.dmpFilesize
1.8MB
-
memory/748-166-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/748-178-0x0000000077160000-0x00000000772EE000-memory.dmpFilesize
1.6MB
-
memory/748-171-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-173-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-175-0x0000000000BE0000-0x00000000010AA000-memory.dmpFilesize
4.8MB
-
memory/748-336-0x0000000000000000-mapping.dmp
-
memory/864-243-0x0000000000000000-mapping.dmp
-
memory/956-241-0x0000000000000000-mapping.dmp
-
memory/1068-258-0x0000000000000000-mapping.dmp
-
memory/1124-394-0x0000000006BB0000-0x0000000006BB1000-memory.dmpFilesize
4KB
-
memory/1124-389-0x0000000000000000-mapping.dmp
-
memory/1212-296-0x0000000000000000-mapping.dmp
-
memory/1220-180-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1220-179-0x0000000000470000-0x000000000051E000-memory.dmpFilesize
696KB
-
memory/1220-160-0x0000000000000000-mapping.dmp
-
memory/1220-177-0x0000000000688000-0x00000000006AE000-memory.dmpFilesize
152KB
-
memory/1320-240-0x0000000000000000-mapping.dmp
-
memory/1360-319-0x0000000000000000-mapping.dmp
-
memory/1376-387-0x0000000000000000-mapping.dmp
-
memory/1380-278-0x0000000000000000-mapping.dmp
-
memory/1424-137-0x0000000000400000-0x0000000002B64000-memory.dmpFilesize
39.4MB
-
memory/1424-136-0x0000000002C70000-0x0000000002DBA000-memory.dmpFilesize
1.3MB
-
memory/1424-132-0x0000000000000000-mapping.dmp
-
memory/1424-135-0x0000000002C50000-0x0000000002C59000-memory.dmpFilesize
36KB
-
memory/1440-259-0x0000000000000000-mapping.dmp
-
memory/1456-128-0x0000000000402F47-mapping.dmp
-
memory/1472-280-0x0000000000000000-mapping.dmp
-
memory/1472-288-0x000000001C5F0000-0x000000001C5F2000-memory.dmpFilesize
8KB
-
memory/1580-254-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/1580-244-0x0000000000000000-mapping.dmp
-
memory/1592-406-0x0000000000000000-mapping.dmp
-
memory/1596-422-0x00000000003E0000-0x00000000003EC000-memory.dmpFilesize
48KB
-
memory/1596-421-0x00000000003F0000-0x00000000003F7000-memory.dmpFilesize
28KB
-
memory/1600-184-0x0000000002880000-0x00000000028F4000-memory.dmpFilesize
464KB
-
memory/1600-182-0x0000000000000000-mapping.dmp
-
memory/1600-323-0x000000000043702E-mapping.dmp
-
memory/1600-185-0x0000000002810000-0x000000000287B000-memory.dmpFilesize
428KB
-
memory/1612-252-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/1612-242-0x0000000000000000-mapping.dmp
-
memory/1612-261-0x0000000002FA0000-0x0000000002FA2000-memory.dmpFilesize
8KB
-
memory/1612-257-0x0000000000FD0000-0x0000000000FD1000-memory.dmpFilesize
4KB
-
memory/1660-187-0x0000000000740000-0x000000000074C000-memory.dmpFilesize
48KB
-
memory/1660-186-0x0000000000750000-0x0000000000757000-memory.dmpFilesize
28KB
-
memory/1660-183-0x0000000000000000-mapping.dmp
-
memory/1720-297-0x0000000000000000-mapping.dmp
-
memory/1732-262-0x0000000000000000-mapping.dmp
-
memory/1764-386-0x0000000006A90000-0x0000000006A91000-memory.dmpFilesize
4KB
-
memory/1764-379-0x0000000000000000-mapping.dmp
-
memory/1768-398-0x0000000000000000-mapping.dmp
-
memory/1920-281-0x0000000000000000-mapping.dmp
-
memory/1936-289-0x0000000000000000-mapping.dmp
-
memory/1936-293-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/1940-207-0x0000000076310000-0x0000000076894000-memory.dmpFilesize
5.5MB
-
memory/1940-203-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/1940-192-0x0000000000650000-0x0000000000651000-memory.dmpFilesize
4KB
-
memory/1940-195-0x0000000001250000-0x0000000001251000-memory.dmpFilesize
4KB
-
memory/1940-191-0x0000000001250000-0x00000000013B4000-memory.dmpFilesize
1.4MB
-
memory/1940-198-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/1940-201-0x0000000000EB0000-0x0000000000EF5000-memory.dmpFilesize
276KB
-
memory/1940-200-0x0000000004E50000-0x0000000004E51000-memory.dmpFilesize
4KB
-
memory/1940-193-0x00000000768B0000-0x0000000076A72000-memory.dmpFilesize
1.8MB
-
memory/1940-197-0x0000000070A30000-0x0000000070AB0000-memory.dmpFilesize
512KB
-
memory/1940-213-0x000000006F250000-0x000000006F29B000-memory.dmpFilesize
300KB
-
memory/1940-210-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/1940-202-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/1940-188-0x0000000000000000-mapping.dmp
-
memory/1940-205-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/1940-235-0x00000000071C0000-0x00000000071C1000-memory.dmpFilesize
4KB
-
memory/1940-234-0x0000000006AC0000-0x0000000006AC1000-memory.dmpFilesize
4KB
-
memory/1940-233-0x00000000061E0000-0x00000000061E1000-memory.dmpFilesize
4KB
-
memory/1940-208-0x0000000074F70000-0x00000000762B8000-memory.dmpFilesize
19.3MB
-
memory/1940-232-0x0000000006130000-0x0000000006131000-memory.dmpFilesize
4KB
-
memory/1940-231-0x00000000063F0000-0x00000000063F1000-memory.dmpFilesize
4KB
-
memory/1940-230-0x0000000005E50000-0x0000000005E51000-memory.dmpFilesize
4KB
-
memory/1940-229-0x0000000005C30000-0x0000000005C31000-memory.dmpFilesize
4KB
-
memory/1940-228-0x00000000051C0000-0x00000000051C1000-memory.dmpFilesize
4KB
-
memory/1940-194-0x0000000074830000-0x0000000074921000-memory.dmpFilesize
964KB
-
memory/1984-209-0x0000000000000000-mapping.dmp
-
memory/1984-214-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/1988-397-0x0000000000000000-mapping.dmp
-
memory/2200-388-0x0000000000000000-mapping.dmp
-
memory/2208-279-0x0000000000000000-mapping.dmp
-
memory/2220-271-0x0000000000000000-mapping.dmp
-
memory/2296-318-0x0000000000000000-mapping.dmp
-
memory/2324-416-0x0000000002880000-0x00000000028F5000-memory.dmpFilesize
468KB
-
memory/2324-360-0x0000000000000000-mapping.dmp
-
memory/2324-419-0x0000000002810000-0x000000000287B000-memory.dmpFilesize
428KB
-
memory/2360-275-0x0000000000000000-mapping.dmp
-
memory/2492-320-0x0000000000000000-mapping.dmp
-
memory/2500-118-0x00000000006E9000-0x00000000006F2000-memory.dmpFilesize
36KB
-
memory/2500-121-0x0000000000580000-0x00000000006CA000-memory.dmpFilesize
1.3MB
-
memory/2512-277-0x0000000000000000-mapping.dmp
-
memory/2860-119-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2860-120-0x0000000000402F47-mapping.dmp
-
memory/2884-274-0x0000000000000000-mapping.dmp
-
memory/2940-345-0x0000000000000000-mapping.dmp
-
memory/2940-351-0x000000001CD00000-0x000000001CD02000-memory.dmpFilesize
8KB
-
memory/2948-326-0x0000000000418EF2-mapping.dmp
-
memory/2948-337-0x0000000004D30000-0x0000000005336000-memory.dmpFilesize
6.0MB
-
memory/2984-138-0x0000000002D20000-0x0000000002D36000-memory.dmpFilesize
88KB
-
memory/2984-272-0x0000000005250000-0x0000000005266000-memory.dmpFilesize
88KB
-
memory/2984-122-0x0000000000C70000-0x0000000000C86000-memory.dmpFilesize
88KB
-
memory/2984-131-0x0000000002660000-0x0000000002676000-memory.dmpFilesize
88KB
-
memory/3196-130-0x00000000004A0000-0x00000000004A9000-memory.dmpFilesize
36KB
-
memory/3196-123-0x0000000000000000-mapping.dmp
-
memory/3196-126-0x00000000006D8000-0x00000000006E1000-memory.dmpFilesize
36KB
-
memory/3256-270-0x0000000000000000-mapping.dmp
-
memory/3268-263-0x0000000000000000-mapping.dmp
-
memory/3268-268-0x000000001B890000-0x000000001B892000-memory.dmpFilesize
8KB
-
memory/3316-437-0x0000000005530000-0x0000000005531000-memory.dmpFilesize
4KB
-
memory/3424-236-0x0000000000000000-mapping.dmp
-
memory/3532-302-0x0000000000000000-mapping.dmp
-
memory/3532-315-0x0000000005050000-0x0000000005051000-memory.dmpFilesize
4KB
-
memory/3532-308-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB
-
memory/3592-299-0x0000000000000000-mapping.dmp
-
memory/3592-314-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/3592-366-0x0000000000000000-mapping.dmp
-
memory/3592-305-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/3616-216-0x0000000000000000-mapping.dmp
-
memory/3616-220-0x00000000020D0000-0x000000000215F000-memory.dmpFilesize
572KB
-
memory/3616-221-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/3652-352-0x0000000000000000-mapping.dmp
-
memory/3656-269-0x0000000000000000-mapping.dmp
-
memory/3744-222-0x0000000000000000-mapping.dmp
-
memory/3744-260-0x000000001B380000-0x000000001B3E1000-memory.dmpFilesize
388KB
-
memory/3744-227-0x000000001B440000-0x000000001B442000-memory.dmpFilesize
8KB
-
memory/3744-225-0x0000000000740000-0x0000000000741000-memory.dmpFilesize
4KB
-
memory/3768-435-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/3820-399-0x0000000000000000-mapping.dmp
-
memory/3820-408-0x00000000030D0000-0x00000000030D1000-memory.dmpFilesize
4KB
-
memory/3936-153-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/3936-155-0x0000000002BC0000-0x0000000002C6E000-memory.dmpFilesize
696KB
-
memory/3936-149-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/3936-150-0x0000000000401E7A-mapping.dmp
-
memory/3936-168-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/3936-156-0x0000000004850000-0x00000000048DF000-memory.dmpFilesize
572KB
-
memory/3936-154-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/3992-371-0x0000000000000000-mapping.dmp
-
memory/3992-375-0x0000000001630000-0x0000000001632000-memory.dmpFilesize
8KB
-
memory/4080-374-0x000000001C230000-0x000000001C232000-memory.dmpFilesize
8KB
-
memory/4080-367-0x0000000000000000-mapping.dmp