Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
10-06-2022 08:42
Static task
static1
Behavioral task
behavioral1
Sample
07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe
Resource
win7-20220414-en
General
-
Target
07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe
-
Size
441KB
-
MD5
640d463147a42e2ebadf1b854d42dec6
-
SHA1
ac01be640d2cdccdf69ae9b6c03e66157aa285b0
-
SHA256
07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0
-
SHA512
6b78ef7b582a5a6985c6e52a8c71369cecbeb348bd36b8eac122a1904d16f3e8b4b7b5f322f458ed16af7538fa3e73701ec91bb855a3d69730a05970823afa05
Malware Config
Extracted
djvu
http://zfko.org/test3/get.php
-
extension
.rrcc
-
offline_id
k2oZMtQS0H2U97b2eKTMJpROwYzEzq6KcWbdOut1
-
payload_url
http://zerit.top/dl/build2.exe
http://zfko.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-5JlAL7HXIu Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@bestyourmail.ch Reserve e-mail address to contact us: supportsys@airmail.cc Your personal ID: 0492JIjdm
Extracted
vidar
52.5
937
https://t.me/tg_randomacc
https://indieweb.social/@ronxik333
-
profile_id
937
Extracted
vidar
52.4
517
https://t.me/foreigndocs
https://c.im/@ronxik31
-
profile_id
517
Signatures
-
Detected Djvu ransomware 9 IoCs
Processes:
resource yara_rule behavioral2/memory/4284-172-0x00000000026F0000-0x000000000280B000-memory.dmp family_djvu behavioral2/memory/4280-175-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4280-178-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4280-179-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4280-182-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4280-223-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-255-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-259-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1248-272-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Processes:
07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe -
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Generic Stealer Sending System Information M1
suricata: ET MALWARE Generic Stealer Sending System Information M1
-
suricata: ET MALWARE Generic Stealer Sending System Information M2
suricata: ET MALWARE Generic Stealer Sending System Information M2
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
-
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
-
suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download
suricata: ET MALWARE Win32/Filecoder.STOP Variant Public Key Download
-
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Fenix_1.bmp.exe7FCA.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fenix_1.bmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7FCA.exe -
Vidar Stealer 8 IoCs
Processes:
resource yara_rule behavioral2/memory/3112-176-0x0000000000B90000-0x0000000000BD9000-memory.dmp family_vidar behavioral2/memory/3112-181-0x0000000000400000-0x0000000000917000-memory.dmp family_vidar behavioral2/memory/3112-285-0x0000000000400000-0x0000000000917000-memory.dmp family_vidar behavioral2/memory/3112-302-0x0000000000400000-0x0000000000917000-memory.dmp family_vidar behavioral2/memory/1452-315-0x0000000000400000-0x0000000000447000-memory.dmp family_vidar behavioral2/memory/1240-321-0x0000000002450000-0x0000000002495000-memory.dmp family_vidar behavioral2/memory/1452-319-0x0000000000400000-0x0000000000447000-memory.dmp family_vidar behavioral2/memory/1452-317-0x0000000000400000-0x0000000000447000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 26 IoCs
Processes:
mixinte0701.bmp.exehg45iugniu5hgi54hgui45.bmp.exeSetupMEXX.exe.exeFenix_1.bmp.exereal1001.bmp.exeTrdngAnlzr649.exe.exe6523.exe.exeburger.exe.exetest30206.bmp.exewam.exe.exetest30206.bmp.exeLF185.exe7z.exetest30206.bmp.exeH10CF.exetest30206.bmp.exe7z.exe7z.exe7z.exe7z.exe2.0.0-beta1.exebuild2.exebuild2.exeKBKEA.exeB8LH9H5DMABDC08.exe7FCA.exepid process 3204 mixinte0701.bmp.exe 3192 hg45iugniu5hgi54hgui45.bmp.exe 1384 SetupMEXX.exe.exe 64 Fenix_1.bmp.exe 3112 real1001.bmp.exe 2216 TrdngAnlzr649.exe.exe 2200 6523.exe.exe 4348 burger.exe.exe 4284 test30206.bmp.exe 2072 wam.exe.exe 4280 test30206.bmp.exe 4860 LF185.exe 4816 7z.exe 3300 test30206.bmp.exe 2232 H10CF.exe 1248 test30206.bmp.exe 4572 7z.exe 4900 7z.exe 1856 7z.exe 3064 7z.exe 860 2.0.0-beta1.exe 1240 build2.exe 1452 build2.exe 1588 KBKEA.exe 4188 B8LH9H5DMABDC08.exe 2188 7FCA.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Fenix_1.bmp.exe7FCA.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fenix_1.bmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fenix_1.bmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7FCA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7FCA.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
test30206.bmp.exemixinte0701.bmp.exewam.exe.exeKBKEA.exe07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exehg45iugniu5hgi54hgui45.bmp.exetest30206.bmp.exereal1001.bmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation test30206.bmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation mixinte0701.bmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation wam.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation KBKEA.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation hg45iugniu5hgi54hgui45.bmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation test30206.bmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation real1001.bmp.exe -
Loads dropped DLL 14 IoCs
Processes:
7z.exereal1001.bmp.exe7z.exe7z.exe7z.exe7z.exeLF185.exeregsvr32.exebuild2.exepid process 4816 7z.exe 3112 real1001.bmp.exe 3112 real1001.bmp.exe 4572 7z.exe 4900 7z.exe 1856 7z.exe 3064 7z.exe 4860 LF185.exe 4860 LF185.exe 4860 LF185.exe 4420 regsvr32.exe 4420 regsvr32.exe 1452 build2.exe 1452 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exe themida C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exe themida behavioral2/memory/64-158-0x0000000000400000-0x0000000000DBA000-memory.dmp themida behavioral2/memory/64-160-0x0000000000400000-0x0000000000DBA000-memory.dmp themida behavioral2/memory/64-165-0x0000000000400000-0x0000000000DBA000-memory.dmp themida behavioral2/memory/64-225-0x0000000000400000-0x0000000000DBA000-memory.dmp themida behavioral2/memory/64-312-0x0000000000400000-0x0000000000DBA000-memory.dmp themida behavioral2/memory/2188-368-0x0000000000400000-0x0000000000CCA000-memory.dmp themida behavioral2/memory/2188-370-0x0000000000400000-0x0000000000CCA000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
test30206.bmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\229d8245-1926-434e-822b-b0b75504409c\\test30206.bmp.exe\" --AutoStart" test30206.bmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Fenix_1.bmp.exe7FCA.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Fenix_1.bmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7FCA.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ipinfo.io 19 ipinfo.io 92 api.2ip.ua 94 api.2ip.ua 116 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Fenix_1.bmp.exe7FCA.exepid process 64 Fenix_1.bmp.exe 2188 7FCA.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
test30206.bmp.exetest30206.bmp.exebuild2.exedescription pid process target process PID 4284 set thread context of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 3300 set thread context of 1248 3300 test30206.bmp.exe test30206.bmp.exe PID 1240 set thread context of 1452 1240 build2.exe build2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3500 3204 WerFault.exe mixinte0701.bmp.exe 2276 3204 WerFault.exe mixinte0701.bmp.exe 4188 3204 WerFault.exe mixinte0701.bmp.exe 1116 3204 WerFault.exe mixinte0701.bmp.exe 4644 3204 WerFault.exe mixinte0701.bmp.exe 2396 3204 WerFault.exe mixinte0701.bmp.exe 1196 3204 WerFault.exe mixinte0701.bmp.exe 3520 3204 WerFault.exe mixinte0701.bmp.exe 1068 3112 WerFault.exe real1001.bmp.exe 2624 1384 WerFault.exe SetupMEXX.exe.exe 4232 3204 WerFault.exe mixinte0701.bmp.exe 4400 4348 WerFault.exe burger.exe.exe 4300 2216 WerFault.exe TrdngAnlzr649.exe.exe 4404 3048 WerFault.exe explorer.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
7FCA.exe6523.exe.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FCA.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FCA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6523.exe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6523.exe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6523.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FCA.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real1001.bmp.exebuild2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real1001.bmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real1001.bmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 436 timeout.exe 2396 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 2256 taskkill.exe 1328 taskkill.exe -
Processes:
B8LH9H5DMABDC08.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch B8LH9H5DMABDC08.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" B8LH9H5DMABDC08.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\IESettingSync B8LH9H5DMABDC08.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" B8LH9H5DMABDC08.exe -
Processes:
07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exeFenix_1.bmp.exe6523.exe.exetest30206.bmp.exepid process 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe 64 Fenix_1.bmp.exe 64 Fenix_1.bmp.exe 2200 6523.exe.exe 2200 6523.exe.exe 4280 test30206.bmp.exe 4280 test30206.bmp.exe 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 796 -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
6523.exe.exe7FCA.exepid process 2200 6523.exe.exe 796 796 796 796 2188 7FCA.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SetupMEXX.exe.exeburger.exe.exe7z.exe7z.exeFenix_1.bmp.exe7z.exe7z.exe7z.exetaskkill.exewam.exe.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1384 SetupMEXX.exe.exe Token: SeDebugPrivilege 4348 burger.exe.exe Token: SeRestorePrivilege 4816 7z.exe Token: 35 4816 7z.exe Token: SeSecurityPrivilege 4816 7z.exe Token: SeSecurityPrivilege 4816 7z.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeRestorePrivilege 4572 7z.exe Token: 35 4572 7z.exe Token: SeSecurityPrivilege 4572 7z.exe Token: SeSecurityPrivilege 4572 7z.exe Token: SeDebugPrivilege 64 Fenix_1.bmp.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeRestorePrivilege 4900 7z.exe Token: 35 4900 7z.exe Token: SeSecurityPrivilege 4900 7z.exe Token: SeSecurityPrivilege 4900 7z.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeRestorePrivilege 1856 7z.exe Token: 35 1856 7z.exe Token: SeSecurityPrivilege 1856 7z.exe Token: SeSecurityPrivilege 1856 7z.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeRestorePrivilege 3064 7z.exe Token: 35 3064 7z.exe Token: SeSecurityPrivilege 3064 7z.exe Token: SeSecurityPrivilege 3064 7z.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeDebugPrivilege 2256 taskkill.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeDebugPrivilege 2072 wam.exe.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeDebugPrivilege 1328 taskkill.exe Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 Token: SeShutdownPrivilege 796 Token: SeCreatePagefilePrivilege 796 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
B8LH9H5DMABDC08.exepid process 4188 B8LH9H5DMABDC08.exe 4188 B8LH9H5DMABDC08.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exetest30206.bmp.exehg45iugniu5hgi54hgui45.bmp.exeTrdngAnlzr649.exe.exetest30206.bmp.execmd.exetest30206.bmp.exedescription pid process target process PID 1956 wrote to memory of 1384 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe SetupMEXX.exe.exe PID 1956 wrote to memory of 1384 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe SetupMEXX.exe.exe PID 1956 wrote to memory of 1384 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe SetupMEXX.exe.exe PID 1956 wrote to memory of 3204 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe mixinte0701.bmp.exe PID 1956 wrote to memory of 3204 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe mixinte0701.bmp.exe PID 1956 wrote to memory of 3204 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe mixinte0701.bmp.exe PID 1956 wrote to memory of 3192 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe hg45iugniu5hgi54hgui45.bmp.exe PID 1956 wrote to memory of 3192 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe hg45iugniu5hgi54hgui45.bmp.exe PID 1956 wrote to memory of 3192 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe hg45iugniu5hgi54hgui45.bmp.exe PID 1956 wrote to memory of 64 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Fenix_1.bmp.exe PID 1956 wrote to memory of 64 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Fenix_1.bmp.exe PID 1956 wrote to memory of 64 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe Fenix_1.bmp.exe PID 1956 wrote to memory of 3112 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe real1001.bmp.exe PID 1956 wrote to memory of 3112 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe real1001.bmp.exe PID 1956 wrote to memory of 3112 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe real1001.bmp.exe PID 1956 wrote to memory of 2216 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe TrdngAnlzr649.exe.exe PID 1956 wrote to memory of 2216 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe TrdngAnlzr649.exe.exe PID 1956 wrote to memory of 2216 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe TrdngAnlzr649.exe.exe PID 1956 wrote to memory of 2200 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe 6523.exe.exe PID 1956 wrote to memory of 2200 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe 6523.exe.exe PID 1956 wrote to memory of 2200 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe 6523.exe.exe PID 1956 wrote to memory of 4348 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe burger.exe.exe PID 1956 wrote to memory of 4348 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe burger.exe.exe PID 1956 wrote to memory of 4348 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe burger.exe.exe PID 1956 wrote to memory of 4284 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe test30206.bmp.exe PID 1956 wrote to memory of 4284 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe test30206.bmp.exe PID 1956 wrote to memory of 4284 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe test30206.bmp.exe PID 1956 wrote to memory of 2072 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe wam.exe.exe PID 1956 wrote to memory of 2072 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe wam.exe.exe PID 1956 wrote to memory of 2072 1956 07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe wam.exe.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 4284 wrote to memory of 4280 4284 test30206.bmp.exe test30206.bmp.exe PID 3192 wrote to memory of 2596 3192 hg45iugniu5hgi54hgui45.bmp.exe cmd.exe PID 3192 wrote to memory of 2596 3192 hg45iugniu5hgi54hgui45.bmp.exe cmd.exe PID 2216 wrote to memory of 4860 2216 TrdngAnlzr649.exe.exe LF185.exe PID 2216 wrote to memory of 4860 2216 TrdngAnlzr649.exe.exe LF185.exe PID 2216 wrote to memory of 4860 2216 TrdngAnlzr649.exe.exe LF185.exe PID 4280 wrote to memory of 5036 4280 test30206.bmp.exe icacls.exe PID 4280 wrote to memory of 5036 4280 test30206.bmp.exe icacls.exe PID 4280 wrote to memory of 5036 4280 test30206.bmp.exe icacls.exe PID 2596 wrote to memory of 1016 2596 cmd.exe WerFault.exe PID 2596 wrote to memory of 1016 2596 cmd.exe WerFault.exe PID 2596 wrote to memory of 4816 2596 cmd.exe 7z.exe PID 2596 wrote to memory of 4816 2596 cmd.exe 7z.exe PID 4280 wrote to memory of 3300 4280 test30206.bmp.exe test30206.bmp.exe PID 4280 wrote to memory of 3300 4280 test30206.bmp.exe test30206.bmp.exe PID 4280 wrote to memory of 3300 4280 test30206.bmp.exe test30206.bmp.exe PID 2216 wrote to memory of 2232 2216 TrdngAnlzr649.exe.exe H10CF.exe PID 2216 wrote to memory of 2232 2216 TrdngAnlzr649.exe.exe H10CF.exe PID 2216 wrote to memory of 2232 2216 TrdngAnlzr649.exe.exe H10CF.exe PID 3300 wrote to memory of 1248 3300 test30206.bmp.exe test30206.bmp.exe PID 3300 wrote to memory of 1248 3300 test30206.bmp.exe test30206.bmp.exe PID 3300 wrote to memory of 1248 3300 test30206.bmp.exe test30206.bmp.exe PID 3300 wrote to memory of 1248 3300 test30206.bmp.exe test30206.bmp.exe PID 3300 wrote to memory of 1248 3300 test30206.bmp.exe test30206.bmp.exe PID 3300 wrote to memory of 1248 3300 test30206.bmp.exe test30206.bmp.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe"C:\Users\Admin\AppData\Local\Temp\07bd0c69a1332c507b85bf45eaaab62012d5a85410f8c6934636f89421f4b9f0.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\hg45iugniu5hgi54hgui45.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\hg45iugniu5hgi54hgui45.bmp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode 65,104⤵
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p80892603317504287031777527652 -oextracted4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\attrib.exeattrib +H "2.0.0-beta1.exe"4⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\main\2.0.0-beta1.exe"2.0.0-beta1.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\mixinte0701.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\mixinte0701.bmp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 4563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 7883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 8003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 8283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 9843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 10123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 13563⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "mixinte0701.bmp.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\mixinte0701.bmp.exe" & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "mixinte0701.bmp.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 5003⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe"C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 18083⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr649.exe.exe"C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr649.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\LF185.exe"C:\Users\Admin\AppData\Local\Temp\LF185.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\H10CF.exe"C:\Users\Admin\AppData\Local\Temp\H10CF.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\KBKEA.exe"C:\Users\Admin\AppData\Local\Temp\KBKEA.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -S .\e~IYmd.UY /U4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\B8LH9H5DMABDC08.exehttps://iplogger.org/1x4az73⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 4523⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\real1001.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\real1001.bmp.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im real1001.bmp.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\real1001.bmp.exe" & del C:\ProgramData\*.dll & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im real1001.bmp.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 16123⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\229d8245-1926-434e-822b-b0b75504409c" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe"C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\c7897061-d4d3-4548-8ba8-3134461b7892\build2.exe"C:\Users\Admin\AppData\Local\c7897061-d4d3-4548-8ba8-3134461b7892\build2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\c7897061-d4d3-4548-8ba8-3134461b7892\build2.exe"C:\Users\Admin\AppData\Local\c7897061-d4d3-4548-8ba8-3134461b7892\build2.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Users\Admin\Pictures\Adobe Films\burger.exe.exe"C:\Users\Admin\Pictures\Adobe Films\burger.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 12963⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe"C:\Users\Admin\Pictures\Adobe Films\6523.exe.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Adobe Films\wam.exe.exe"C:\Users\Admin\Pictures\Adobe Films\wam.exe.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 453⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 454⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3112 -ip 31121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1384 -ip 13841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3204 -ip 32041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2216 -ip 22161⤵
-
C:\Users\Admin\AppData\Local\Temp\7FCA.exeC:\Users\Admin\AppData\Local\Temp\7FCA.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 8722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3048 -ip 30481⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Hidden Files and Directories
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Virtualization/Sandbox Evasion
1File Permissions Modification
1Install Root Certificate
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mozglue.dllFilesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
C:\ProgramData\nss3.dllFilesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
727B
MD5a26978d9f2615325fb2b045c080c9657
SHA1a017813c221c6a9e984b6577dc97f49b8b0d8822
SHA256f8539e0108a07604e84e1981c07a6de12589661720624376f0a6dc3a3616535e
SHA51250ec4cd301269a6893e482e2b30478971ce9d485bb3576253bad2f231fa403583708ec2e953482726616030a57ee5da208fc3ad21218abdc8563467ba550761b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\572BF21E454637C9F000BE1AF9B1E1A9Filesize
506B
MD5507dd2056118b2596bee936246e24331
SHA1eddc19d15d3f9af7397200c04641c990fb40effb
SHA2569d97ad674835d6ae293900dae55c12f3064fce41fb9bb08cc11e917a92ac6c60
SHA512250b76fa7f55586cd5db647bf9a9e36faea6ffa6df5e71f4e1f302f8429f16bcd8a887915db0aff6695bd82a4fa757be6e80b0a83ff0e2a6197daeef41dbbe0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
402B
MD590b6d89fdb0ab3a90b5bef6120674557
SHA1cb18801f611fe93cc9e50b15cea05ab31927e05c
SHA256642dd7f353466a62d6d06b11e7de1ab469749fc4236d18218ced902566e3d2ef
SHA512ff3d95e601fdeb55e8dccbdc2c3e795696547347219292fab911023bf5299ff36af7daf99358a5e8672e37861354c8492945b9f3bcbb8beb3ee3d00e0c6be1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\572BF21E454637C9F000BE1AF9B1E1A9Filesize
248B
MD5bf314c77be1f6e7b96db7cc4a13180c3
SHA1d6860f035e41e8e1f6c6af9585038d818d1b8118
SHA2568d2a64c5c0f58691ef0b014545f1beb9e102c792ce4c11f502ba0592a4cc9ae4
SHA512df09f882a1418e778ed2c2a83f38cacef97469700399d99db8dd81c9eb4d4945027429a781ce9385c6aca92f616ada52b77ef1ba0ff9bf5d8f1af5675388e5ef
-
C:\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
C:\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
C:\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
C:\Users\Admin\AppData\Local\229d8245-1926-434e-822b-b0b75504409c\test30206.bmp.exeFilesize
727KB
MD52fbf6438efaf266f67e3b5dab90f99cd
SHA171bfd76506879b21c221e83771ce7518493681ec
SHA256ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f
SHA5129372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f
-
C:\Users\Admin\AppData\Local\Temp\B8LH9H5DMABDC08.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\B8LH9H5DMABDC08.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\H10CF.exeFilesize
55KB
MD5b35cde0ed02bf71f1a87721d09746f7b
SHA10cf266265f77e387a9d396888651240f2b458e0a
SHA25647f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1
SHA51259aa3d9c0cbcdbb1d08c563ed322517cd5a52c4dbb039f840a911860c46402304ae889217d1832d5d61af6e080d54d9edfcd3334fc7a8bef2f8f921f232b2344
-
C:\Users\Admin\AppData\Local\Temp\H10CF.exeFilesize
55KB
MD5b35cde0ed02bf71f1a87721d09746f7b
SHA10cf266265f77e387a9d396888651240f2b458e0a
SHA25647f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1
SHA51259aa3d9c0cbcdbb1d08c563ed322517cd5a52c4dbb039f840a911860c46402304ae889217d1832d5d61af6e080d54d9edfcd3334fc7a8bef2f8f921f232b2344
-
C:\Users\Admin\AppData\Local\Temp\KBKEA.exeFilesize
1.4MB
MD5579cff902d41cd6281c00ee1760d1f4e
SHA1bb7a11abc71cfccc2efb583bebc9626b1bf4839a
SHA256e3026e0b6d6a5c600cd402077fb4dbfa6c1b0ac55b5c9ea1006cda3bf1724465
SHA5120d13238ed87047d444eb6960401a74f612d6447f27a2eccae3dfa9e6188b9752a405477981ba7b4bf020578fb27a5b7a759b08026ea033da6c0d566ddca73881
-
C:\Users\Admin\AppData\Local\Temp\KBKEA.exeFilesize
1.4MB
MD5579cff902d41cd6281c00ee1760d1f4e
SHA1bb7a11abc71cfccc2efb583bebc9626b1bf4839a
SHA256e3026e0b6d6a5c600cd402077fb4dbfa6c1b0ac55b5c9ea1006cda3bf1724465
SHA5120d13238ed87047d444eb6960401a74f612d6447f27a2eccae3dfa9e6188b9752a405477981ba7b4bf020578fb27a5b7a759b08026ea033da6c0d566ddca73881
-
C:\Users\Admin\AppData\Local\Temp\LF185.exeFilesize
55KB
MD5b35cde0ed02bf71f1a87721d09746f7b
SHA10cf266265f77e387a9d396888651240f2b458e0a
SHA25647f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1
SHA51259aa3d9c0cbcdbb1d08c563ed322517cd5a52c4dbb039f840a911860c46402304ae889217d1832d5d61af6e080d54d9edfcd3334fc7a8bef2f8f921f232b2344
-
C:\Users\Admin\AppData\Local\Temp\LF185.exeFilesize
55KB
MD5b35cde0ed02bf71f1a87721d09746f7b
SHA10cf266265f77e387a9d396888651240f2b458e0a
SHA25647f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1
SHA51259aa3d9c0cbcdbb1d08c563ed322517cd5a52c4dbb039f840a911860c46402304ae889217d1832d5d61af6e080d54d9edfcd3334fc7a8bef2f8f921f232b2344
-
C:\Users\Admin\AppData\Local\Temp\main\2.0.0-beta1.exeFilesize
55KB
MD5eca370e62443218965eb27b1a61bb7a0
SHA14e48d0c38e0a4543137cd381abb38e6bd17f17aa
SHA256f7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27
SHA5126e0554a49c509a3c1c29f042746d18f924417692f3d4c2e8f55676bcc8bb7574ff3a8d4c131634601bd3da28c7c4ef4282c7002bb2a88a69c40e73aa23d58c81
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.dllFilesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\2.0.0-beta1.exeFilesize
55KB
MD5eca370e62443218965eb27b1a61bb7a0
SHA14e48d0c38e0a4543137cd381abb38e6bd17f17aa
SHA256f7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27
SHA5126e0554a49c509a3c1c29f042746d18f924417692f3d4c2e8f55676bcc8bb7574ff3a8d4c131634601bd3da28c7c4ef4282c7002bb2a88a69c40e73aa23d58c81
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DATFilesize
2.0MB
MD54e70fcf4b7060a35917b49f4a55803e7
SHA1d1e0b87b81816375ff516ed0e72abdaa397b470a
SHA25618b3b7cd0f4c5db1d42f19348a4ccfb4b11feead511d06d02e4f5c36f4b7f0bb
SHA512d3383340972e182cd851fcd63e2d2a5207a41ecdad6b11be71636e0b8092feb3981fa2385819f5c45d08dd8b067c6aab22c41c7cf4f3d1ccc1e2dfb049ba7460
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zipFilesize
26KB
MD5c61dd85508ed77e27c26c6b4d0f187ec
SHA12bd4e51dc477ad8cdc0053f25158adead075fb76
SHA256a6d7cbc36b9685b82a826b1f01095e9edd1917e952860c47243466ee20eb1f9f
SHA512987e6b374d924cb1b6703cfc38a7c79f98373abe0602edee31011990525935004fc2621133297aa2755bf98fa105dad8a8dea989aab485564130241145124b31
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zipFilesize
26KB
MD5100a43bed0ff08932560eb488429f66d
SHA1b1032e0c20ca18748ed699bd1762d1b429aad6b4
SHA2563f806869e98bbceda71312694fda6c884292c6d9a6cb6205e05a82e63228a3ce
SHA51220a7ce98d7e887df9517981b9af7ac31a9eb0d31349ff9b52f64f45a7f845d9942468d1c19bbb0a2b731bed224675bf449b1fc6b2bf25f26c315d492f4418656
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zipFilesize
27KB
MD580d507970a9c5f5164c0b180ffe25ffc
SHA1663ebde5de74c83f9b26a5669757a2cbb9d2c57c
SHA256da414c14ad6c38a4d9d2448efe9ddefdf27173d5f5b550ebd34715c73d5097af
SHA512316bd58990c5886fbc59abf850dd98323e3366bc5dfee1aa1be5623b5ba5dcd68686f7044463c3d46d960489d96f547a3e65704817ce5f430186f87a140cfaa2
-
C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zipFilesize
1.5MB
MD5c6a1cd18c39320ce5381f7b3008ccccf
SHA1b07db62d8d98bc3a89505534688408d30a5feced
SHA256b4e4d0c99063e691459cb0d95b444387b9359e86ce79e1f30d012630f1c7f63f
SHA5123791a3af5c7d2603d7b5e2a41fe9f60b4ee95d1d9a1ed7ba654092495e1bf14f71ba2151fe13db8ef050984c6030711fe5754393c19df0126f2d937a0b18d525
-
C:\Users\Admin\AppData\Local\Temp\main\file.binFilesize
1.5MB
MD55f66715f6ead472bcf04355767e605bb
SHA1f45560bb2c519c76729ae7ad43b6f6247a842100
SHA25625c3de3780243511f80380ee6c761c56f10320c552695223e2cf68197fca9eaf
SHA51280915468c9d1da43981662994dd014cc7b8bf514f26b2111d98b0d603f646b193ff04d43c8438e602e789e9c3d5015f205cbda1939066461aa95e58d4e2394c3
-
C:\Users\Admin\AppData\Local\Temp\main\main.batFilesize
485B
MD52417f6319fb896b95751167f6b68f26a
SHA1d4f22bdddffc5b4453a34157ded62079473e401c
SHA256f425c69516cb41d3e2159f56f5c8fb962fb3418e46ed7fc515e264e8136dc49d
SHA5128712831cbe00e45780bdf040eb5521b4b6ee69e703e9a82410977877ab5cbbb58f4b5861680df79069b98635aa9549c973ee723a4ef5f0753ba94bded8a0d235
-
C:\Users\Admin\AppData\Local\c7897061-d4d3-4548-8ba8-3134461b7892\build2.exeFilesize
303KB
MD5f2916222c3c59c2dc07859447acd4419
SHA152f83a6127ac36108130a89057378dcfb3bfd91b
SHA256a1e3bdcce3d07f6bc4015659a1a334413e619e39d89f5e8cf9304b7f44a93c36
SHA512319facb7d2bfc14429c959c4443b4cafbae8200bcd2b9e866a7fb7f6de2a9c9dac70fd2c1a1bef3e908c80f5bcace28106dd8373b128e0c7891e59146320d857
-
C:\Users\Admin\AppData\Local\c7897061-d4d3-4548-8ba8-3134461b7892\build2.exeFilesize
303KB
MD5f2916222c3c59c2dc07859447acd4419
SHA152f83a6127ac36108130a89057378dcfb3bfd91b
SHA256a1e3bdcce3d07f6bc4015659a1a334413e619e39d89f5e8cf9304b7f44a93c36
SHA512319facb7d2bfc14429c959c4443b4cafbae8200bcd2b9e866a7fb7f6de2a9c9dac70fd2c1a1bef3e908c80f5bcace28106dd8373b128e0c7891e59146320d857
-
C:\Users\Admin\AppData\Local\c7897061-d4d3-4548-8ba8-3134461b7892\build2.exeFilesize
303KB
MD5f2916222c3c59c2dc07859447acd4419
SHA152f83a6127ac36108130a89057378dcfb3bfd91b
SHA256a1e3bdcce3d07f6bc4015659a1a334413e619e39d89f5e8cf9304b7f44a93c36
SHA512319facb7d2bfc14429c959c4443b4cafbae8200bcd2b9e866a7fb7f6de2a9c9dac70fd2c1a1bef3e908c80f5bcace28106dd8373b128e0c7891e59146320d857
-
C:\Users\Admin\Pictures\Adobe Films\6523.exe.exeFilesize
202KB
MD56d00c6d377738da756cf15e47620933f
SHA1b2c3489481ffb64debcdda47bdd9a0d587402b07
SHA256f3822ebafa4ccb955f3e93845c565ea9b7eaf6a8ac3e5ccb0461e94f86d916f0
SHA512e6ed3cb352a85b7bf9cd1323ec2e6f91253e9abf6c5c9ac4345d71a400ce2d0ae6f481ebf1245fb385bf72d5aa560b4c17fbfb70f4cbddf352ac335b2a2c2936
-
C:\Users\Admin\Pictures\Adobe Films\6523.exe.exeFilesize
202KB
MD56d00c6d377738da756cf15e47620933f
SHA1b2c3489481ffb64debcdda47bdd9a0d587402b07
SHA256f3822ebafa4ccb955f3e93845c565ea9b7eaf6a8ac3e5ccb0461e94f86d916f0
SHA512e6ed3cb352a85b7bf9cd1323ec2e6f91253e9abf6c5c9ac4345d71a400ce2d0ae6f481ebf1245fb385bf72d5aa560b4c17fbfb70f4cbddf352ac335b2a2c2936
-
C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exeFilesize
4.6MB
MD5f31d52ed4388f89e790988f13f98c0cd
SHA1509e54da32e0f44cf3244b5e5a625535d66a1800
SHA2565daf7769453a91c6dbc1691ec27f7c2af87953490493e459865596d17f58d3b8
SHA512d0c3743258e5e393ddbe5fbf3dbd315626f76bc610f86f3f6e0244ae9237abefcc6d15445ec996c1efd31a66eb9deb2083956adf986ca555114b51eea3d156f1
-
C:\Users\Admin\Pictures\Adobe Films\Fenix_1.bmp.exeFilesize
4.6MB
MD5f31d52ed4388f89e790988f13f98c0cd
SHA1509e54da32e0f44cf3244b5e5a625535d66a1800
SHA2565daf7769453a91c6dbc1691ec27f7c2af87953490493e459865596d17f58d3b8
SHA512d0c3743258e5e393ddbe5fbf3dbd315626f76bc610f86f3f6e0244ae9237abefcc6d15445ec996c1efd31a66eb9deb2083956adf986ca555114b51eea3d156f1
-
C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exeFilesize
335KB
MD568f9204a733a878116aa2ce6e1aabe5a
SHA12c740d93a0437ba6e6c902a72c779f6ecb9802e3
SHA25653e39bc8b5b4d0195a727b29654d51adcf1e20b8fab494b777c5e88ec51cddd9
SHA51261d58b98ef968a5c41b8b1c741bddffd83f5b1f3a4a59fb71e2375198a44e0012682c7ba1446f655149d1bcb46cc3f082b6fbdcc04a9abb2e7ae2e93b1e3cbad
-
C:\Users\Admin\Pictures\Adobe Films\SetupMEXX.exe.exeFilesize
335KB
MD568f9204a733a878116aa2ce6e1aabe5a
SHA12c740d93a0437ba6e6c902a72c779f6ecb9802e3
SHA25653e39bc8b5b4d0195a727b29654d51adcf1e20b8fab494b777c5e88ec51cddd9
SHA51261d58b98ef968a5c41b8b1c741bddffd83f5b1f3a4a59fb71e2375198a44e0012682c7ba1446f655149d1bcb46cc3f082b6fbdcc04a9abb2e7ae2e93b1e3cbad
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr649.exe.exeFilesize
232KB
MD533fcf4efbe4ae2e0360156b74506bdc1
SHA15bb74785293a6ecdbdeaa9e57374fe453e8684cd
SHA2566c5013ba959f4298d155eb0a7cfb09100a69ecf765816c407b3bc4696f216806
SHA512ab7220ccccbbba80b4ab66a3c62b1e76a2a022e2cca09b1c461458dba85350535a5071d695ed495ce8b9d2abe94361bbc78bee1562dbfad75aa0693a604ea8f3
-
C:\Users\Admin\Pictures\Adobe Films\TrdngAnlzr649.exe.exeFilesize
232KB
MD533fcf4efbe4ae2e0360156b74506bdc1
SHA15bb74785293a6ecdbdeaa9e57374fe453e8684cd
SHA2566c5013ba959f4298d155eb0a7cfb09100a69ecf765816c407b3bc4696f216806
SHA512ab7220ccccbbba80b4ab66a3c62b1e76a2a022e2cca09b1c461458dba85350535a5071d695ed495ce8b9d2abe94361bbc78bee1562dbfad75aa0693a604ea8f3
-
C:\Users\Admin\Pictures\Adobe Films\burger.exe.exeFilesize
336KB
MD58db11a5dfcf0630fe8ce89d20b832b1d
SHA1a38545bc5953cad5231e07949b19f5720c696239
SHA256a877fb12f2b00799457106f4a387e937e2e8b122ef365f4054f7638dc3d345ad
SHA512fef78ce675fceea79879ffee16fb60004e5460015bfd4fc6718f6a9b6ea5fe37204c942a250a96274ed12a25b2733510e1862e6f4295a1e3c0bdc7d433ed2418
-
C:\Users\Admin\Pictures\Adobe Films\burger.exe.exeFilesize
336KB
MD58db11a5dfcf0630fe8ce89d20b832b1d
SHA1a38545bc5953cad5231e07949b19f5720c696239
SHA256a877fb12f2b00799457106f4a387e937e2e8b122ef365f4054f7638dc3d345ad
SHA512fef78ce675fceea79879ffee16fb60004e5460015bfd4fc6718f6a9b6ea5fe37204c942a250a96274ed12a25b2733510e1862e6f4295a1e3c0bdc7d433ed2418
-
C:\Users\Admin\Pictures\Adobe Films\hg45iugniu5hgi54hgui45.bmp.exeFilesize
2.4MB
MD54bdb690da3e1c805c43436e661350127
SHA1b19957947d719da5575723f50efc275ca2545a19
SHA256535c5d454255d378276325e59897b6f5cfc6cbe1d8ac194782f355ff522f9df6
SHA512fcdc905a0434623403ab971a64c14b3db9745f41a681fad8baa04cc31b06fd9f212856dfab43a69951fcb2b97574f880422868415215e56dd65d176acfec550f
-
C:\Users\Admin\Pictures\Adobe Films\hg45iugniu5hgi54hgui45.bmp.exeFilesize
2.4MB
MD54bdb690da3e1c805c43436e661350127
SHA1b19957947d719da5575723f50efc275ca2545a19
SHA256535c5d454255d378276325e59897b6f5cfc6cbe1d8ac194782f355ff522f9df6
SHA512fcdc905a0434623403ab971a64c14b3db9745f41a681fad8baa04cc31b06fd9f212856dfab43a69951fcb2b97574f880422868415215e56dd65d176acfec550f
-
C:\Users\Admin\Pictures\Adobe Films\mixinte0701.bmp.exeFilesize
303KB
MD50af9529b7c2fb121034259c78ef8c613
SHA1cfa76d9c9d89242c23ed24e03d9747b225b35919
SHA2567e771850cc291e0d9e7bb139f8d71ea556a5bfad80ff758f600fc930ab6df293
SHA512e136963da3f5801d8a519997382ab988d6e1480e75b8dcf28a109557e17d8045323aec56eeac4e347e13f653e6ebcb6278419a301d668fd2e589d003f4875982
-
C:\Users\Admin\Pictures\Adobe Films\mixinte0701.bmp.exeFilesize
303KB
MD50af9529b7c2fb121034259c78ef8c613
SHA1cfa76d9c9d89242c23ed24e03d9747b225b35919
SHA2567e771850cc291e0d9e7bb139f8d71ea556a5bfad80ff758f600fc930ab6df293
SHA512e136963da3f5801d8a519997382ab988d6e1480e75b8dcf28a109557e17d8045323aec56eeac4e347e13f653e6ebcb6278419a301d668fd2e589d003f4875982
-
C:\Users\Admin\Pictures\Adobe Films\real1001.bmp.exeFilesize
309KB
MD5f03422a28ae90bfc426f2726412fa71b
SHA1ec00f09edaa4f838472c824caea8eb0c5afb2bca
SHA256b660fa36faa3980c7de45a583ed1451d81d16917cd5a01f784fc3c7f2c3e9d1a
SHA5121fab93bc199b040495f00768b5562bd2be3ad9092ae2d40333f4c3aaea83642ca5e0073f6052282b167abe012c39103b022ba02493bce5ba65015e43ba332729
-
C:\Users\Admin\Pictures\Adobe Films\real1001.bmp.exeFilesize
309KB
MD5f03422a28ae90bfc426f2726412fa71b
SHA1ec00f09edaa4f838472c824caea8eb0c5afb2bca
SHA256b660fa36faa3980c7de45a583ed1451d81d16917cd5a01f784fc3c7f2c3e9d1a
SHA5121fab93bc199b040495f00768b5562bd2be3ad9092ae2d40333f4c3aaea83642ca5e0073f6052282b167abe012c39103b022ba02493bce5ba65015e43ba332729
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exeFilesize
727KB
MD52fbf6438efaf266f67e3b5dab90f99cd
SHA171bfd76506879b21c221e83771ce7518493681ec
SHA256ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f
SHA5129372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exeFilesize
727KB
MD52fbf6438efaf266f67e3b5dab90f99cd
SHA171bfd76506879b21c221e83771ce7518493681ec
SHA256ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f
SHA5129372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exeFilesize
727KB
MD52fbf6438efaf266f67e3b5dab90f99cd
SHA171bfd76506879b21c221e83771ce7518493681ec
SHA256ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f
SHA5129372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exeFilesize
727KB
MD52fbf6438efaf266f67e3b5dab90f99cd
SHA171bfd76506879b21c221e83771ce7518493681ec
SHA256ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f
SHA5129372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f
-
C:\Users\Admin\Pictures\Adobe Films\test30206.bmp.exeFilesize
727KB
MD52fbf6438efaf266f67e3b5dab90f99cd
SHA171bfd76506879b21c221e83771ce7518493681ec
SHA256ccec3a411e4299b323f84f4d56b6b1db6aad9f5116a00ab3492d346cd567625f
SHA5129372d42d26d361b3290ba317dfd60d97c171f094af3343bcc5babf1403d9931271e5d7970ec966cbf803d92afb187f6d636a3765ebbeccbc0a964e2912b7f32f
-
C:\Users\Admin\Pictures\Adobe Films\wam.exe.exeFilesize
117KB
MD5f31b76fd7b6ed86ef02fb8eff3002753
SHA19f3797bfa835124cd37eac9530378937c328d8e4
SHA256c42f604a5999dbe43c776c71929744fec2a39c5ef2bb81e034018bf5d3fbeed7
SHA512141231238e36298f91f4f467be2e73ea460463f5b146f4b426c2d4df221e3107b05113419ca89e1dcdc18f9e54c648e324feccbbfa3a0470d6c884c222417dcc
-
C:\Users\Admin\Pictures\Adobe Films\wam.exe.exeFilesize
117KB
MD5f31b76fd7b6ed86ef02fb8eff3002753
SHA19f3797bfa835124cd37eac9530378937c328d8e4
SHA256c42f604a5999dbe43c776c71929744fec2a39c5ef2bb81e034018bf5d3fbeed7
SHA512141231238e36298f91f4f467be2e73ea460463f5b146f4b426c2d4df221e3107b05113419ca89e1dcdc18f9e54c648e324feccbbfa3a0470d6c884c222417dcc
-
memory/64-258-0x0000000077B50000-0x0000000077CF3000-memory.dmpFilesize
1.6MB
-
memory/64-166-0x0000000077B50000-0x0000000077CF3000-memory.dmpFilesize
1.6MB
-
memory/64-201-0x0000000006470000-0x000000000657A000-memory.dmpFilesize
1.0MB
-
memory/64-225-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/64-312-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/64-137-0x0000000000000000-mapping.dmp
-
memory/64-158-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/64-160-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/64-199-0x00000000057F0000-0x0000000005802000-memory.dmpFilesize
72KB
-
memory/64-313-0x0000000077B50000-0x0000000077CF3000-memory.dmpFilesize
1.6MB
-
memory/64-165-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/436-308-0x0000000000000000-mapping.dmp
-
memory/548-376-0x0000000000000000-mapping.dmp
-
memory/860-282-0x0000000000000000-mapping.dmp
-
memory/1016-210-0x0000000000000000-mapping.dmp
-
memory/1240-320-0x0000000000BCD000-0x0000000000BF5000-memory.dmpFilesize
160KB
-
memory/1240-294-0x0000000000000000-mapping.dmp
-
memory/1240-321-0x0000000002450000-0x0000000002495000-memory.dmpFilesize
276KB
-
memory/1248-259-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1248-272-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1248-255-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1248-252-0x0000000000000000-mapping.dmp
-
memory/1328-309-0x0000000000000000-mapping.dmp
-
memory/1384-196-0x00000000008C0000-0x00000000008F7000-memory.dmpFilesize
220KB
-
memory/1384-213-0x0000000005D10000-0x0000000005D76000-memory.dmpFilesize
408KB
-
memory/1384-195-0x000000000095C000-0x0000000000986000-memory.dmpFilesize
168KB
-
memory/1384-305-0x0000000000400000-0x0000000000670000-memory.dmpFilesize
2.4MB
-
memory/1384-295-0x000000000095C000-0x0000000000986000-memory.dmpFilesize
168KB
-
memory/1384-132-0x0000000000000000-mapping.dmp
-
memory/1384-184-0x0000000004EF0000-0x0000000005494000-memory.dmpFilesize
5.6MB
-
memory/1384-207-0x0000000004E40000-0x0000000004E7C000-memory.dmpFilesize
240KB
-
memory/1384-200-0x00000000054A0000-0x0000000005AB8000-memory.dmpFilesize
6.1MB
-
memory/1384-197-0x0000000000400000-0x0000000000670000-memory.dmpFilesize
2.4MB
-
memory/1384-304-0x000000000095C000-0x0000000000986000-memory.dmpFilesize
168KB
-
memory/1452-319-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/1452-314-0x0000000000000000-mapping.dmp
-
memory/1452-317-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/1452-315-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/1524-300-0x0000000000000000-mapping.dmp
-
memory/1588-318-0x0000000000000000-mapping.dmp
-
memory/1856-270-0x0000000000000000-mapping.dmp
-
memory/1956-131-0x0000000003A00000-0x0000000003BC0000-memory.dmpFilesize
1.8MB
-
memory/1956-130-0x0000000003A00000-0x0000000003BC0000-memory.dmpFilesize
1.8MB
-
memory/1956-286-0x0000000003A00000-0x0000000003BC0000-memory.dmpFilesize
1.8MB
-
memory/2072-167-0x0000000000000000-mapping.dmp
-
memory/2072-170-0x0000000000690000-0x00000000006B2000-memory.dmpFilesize
136KB
-
memory/2188-370-0x0000000000400000-0x0000000000CCA000-memory.dmpFilesize
8.8MB
-
memory/2188-367-0x0000000000000000-mapping.dmp
-
memory/2188-368-0x0000000000400000-0x0000000000CCA000-memory.dmpFilesize
8.8MB
-
memory/2200-144-0x0000000000000000-mapping.dmp
-
memory/2200-192-0x00000000006BC000-0x00000000006C5000-memory.dmpFilesize
36KB
-
memory/2200-193-0x0000000000680000-0x0000000000689000-memory.dmpFilesize
36KB
-
memory/2200-221-0x0000000000400000-0x000000000064F000-memory.dmpFilesize
2.3MB
-
memory/2200-194-0x0000000000400000-0x000000000064F000-memory.dmpFilesize
2.3MB
-
memory/2216-303-0x00000000009ED000-0x00000000009FD000-memory.dmpFilesize
64KB
-
memory/2216-202-0x0000000000400000-0x0000000000656000-memory.dmpFilesize
2.3MB
-
memory/2216-209-0x00000000009ED000-0x00000000009FD000-memory.dmpFilesize
64KB
-
memory/2216-299-0x0000000000400000-0x0000000000656000-memory.dmpFilesize
2.3MB
-
memory/2216-139-0x0000000000000000-mapping.dmp
-
memory/2216-198-0x00000000007A0000-0x00000000007BF000-memory.dmpFilesize
124KB
-
memory/2232-226-0x0000000000000000-mapping.dmp
-
memory/2256-298-0x0000000000000000-mapping.dmp
-
memory/2396-333-0x0000000000000000-mapping.dmp
-
memory/2596-180-0x0000000000000000-mapping.dmp
-
memory/2836-281-0x0000000000000000-mapping.dmp
-
memory/3048-373-0x0000000000000000-mapping.dmp
-
memory/3064-275-0x0000000000000000-mapping.dmp
-
memory/3112-302-0x0000000000400000-0x0000000000917000-memory.dmpFilesize
5.1MB
-
memory/3112-181-0x0000000000400000-0x0000000000917000-memory.dmpFilesize
5.1MB
-
memory/3112-285-0x0000000000400000-0x0000000000917000-memory.dmpFilesize
5.1MB
-
memory/3112-284-0x0000000000C4C000-0x0000000000C78000-memory.dmpFilesize
176KB
-
memory/3112-138-0x0000000000000000-mapping.dmp
-
memory/3112-229-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/3112-174-0x0000000000C4C000-0x0000000000C78000-memory.dmpFilesize
176KB
-
memory/3112-301-0x0000000000C4C000-0x0000000000C78000-memory.dmpFilesize
176KB
-
memory/3112-176-0x0000000000B90000-0x0000000000BD9000-memory.dmpFilesize
292KB
-
memory/3192-134-0x0000000000000000-mapping.dmp
-
memory/3204-293-0x0000000000400000-0x0000000000916000-memory.dmpFilesize
5.1MB
-
memory/3204-307-0x0000000000400000-0x0000000000916000-memory.dmpFilesize
5.1MB
-
memory/3204-292-0x0000000000A4C000-0x0000000000A72000-memory.dmpFilesize
152KB
-
memory/3204-133-0x0000000000000000-mapping.dmp
-
memory/3204-185-0x0000000000A4C000-0x0000000000A72000-memory.dmpFilesize
152KB
-
memory/3204-186-0x00000000009D0000-0x0000000000A0F000-memory.dmpFilesize
252KB
-
memory/3204-306-0x0000000000A4C000-0x0000000000A72000-memory.dmpFilesize
152KB
-
memory/3204-187-0x0000000000400000-0x0000000000916000-memory.dmpFilesize
5.1MB
-
memory/3300-257-0x0000000002624000-0x00000000026B6000-memory.dmpFilesize
584KB
-
memory/3300-222-0x0000000000000000-mapping.dmp
-
memory/3396-332-0x0000000000000000-mapping.dmp
-
memory/4188-325-0x0000000000000000-mapping.dmp
-
memory/4280-175-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4280-179-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4280-178-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4280-173-0x0000000000000000-mapping.dmp
-
memory/4280-182-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4280-223-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4284-146-0x0000000000000000-mapping.dmp
-
memory/4284-172-0x00000000026F0000-0x000000000280B000-memory.dmpFilesize
1.1MB
-
memory/4284-171-0x000000000264E000-0x00000000026E0000-memory.dmpFilesize
584KB
-
memory/4348-237-0x00000000067F0000-0x00000000069B2000-memory.dmpFilesize
1.8MB
-
memory/4348-190-0x00000000008C0000-0x00000000008F8000-memory.dmpFilesize
224KB
-
memory/4348-215-0x0000000005D80000-0x0000000005DF6000-memory.dmpFilesize
472KB
-
memory/4348-191-0x0000000000400000-0x0000000000670000-memory.dmpFilesize
2.4MB
-
memory/4348-240-0x00000000069C0000-0x0000000006EEC000-memory.dmpFilesize
5.2MB
-
memory/4348-183-0x000000000096C000-0x0000000000997000-memory.dmpFilesize
172KB
-
memory/4348-311-0x0000000000400000-0x0000000000670000-memory.dmpFilesize
2.4MB
-
memory/4348-310-0x000000000096C000-0x0000000000997000-memory.dmpFilesize
172KB
-
memory/4348-145-0x0000000000000000-mapping.dmp
-
memory/4348-217-0x0000000005E90000-0x0000000005F22000-memory.dmpFilesize
584KB
-
memory/4348-290-0x000000000096C000-0x0000000000997000-memory.dmpFilesize
172KB
-
memory/4348-220-0x0000000006030000-0x000000000604E000-memory.dmpFilesize
120KB
-
memory/4420-338-0x0000000000000000-mapping.dmp
-
memory/4420-356-0x00000000022A0000-0x00000000032A0000-memory.dmpFilesize
16.0MB
-
memory/4420-362-0x000000002D030000-0x000000002D0E6000-memory.dmpFilesize
728KB
-
memory/4420-363-0x000000002D100000-0x000000002D1A1000-memory.dmpFilesize
644KB
-
memory/4572-256-0x0000000000000000-mapping.dmp
-
memory/4748-287-0x0000000000000000-mapping.dmp
-
memory/4816-214-0x0000000000000000-mapping.dmp
-
memory/4860-204-0x0000000000000000-mapping.dmp
-
memory/4900-264-0x0000000000000000-mapping.dmp
-
memory/5036-208-0x0000000000000000-mapping.dmp