Analysis
-
max time kernel
82s -
max time network
159s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25-08-2022 13:00
Static task
static1
Behavioral task
behavioral1
Sample
fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe
Resource
win10-20220812-en
General
-
Target
fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe
-
Size
380KB
-
MD5
df409b77daf6f0963bbf9b83ceaeb505
-
SHA1
7a93df423e854e70fbd9d79d7ab0f559b4257dea
-
SHA256
fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee
-
SHA512
1caf2b5a81a3afc496bfc26eea2291c606e8e5dc22e5512be3bfe1f91d0c45cb50b7670903f44987641c69f96c89684fc8264f4bc5c54141da296b0ed6af12fd
-
SSDEEP
6144:x/QiQXCkkm+ksmpk3U9j0IUWOGBfj/WUplm6zIOYQNd28pTXdAmpCLVRZoglM7LT:pQi3kP6m6UR0IhlL//plmW9bTXeVhDrE
Malware Config
Extracted
nymaim
208.67.104.9
85.31.46.167
Extracted
socelars
https://hueduy.s3.eu-west-1.amazonaws.com/nbsdg818/
Extracted
redline
Crym
15.235.171.56:30730
-
auth_value
cbe4e2f707ccba3ef47d8390a845041f
Extracted
redline
nam3
103.89.90.61:34589
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
5
176.113.115.146:9582
-
auth_value
d38b30c1ccd6c1e5088d9e5bd9e51b0f
Extracted
redline
5076357887
195.54.170.157:16525
-
auth_value
0dfaff60271d374d0c206d19883e06f3
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5488 5032 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5632-681-0x000000000041ADBE-mapping.dmp family_redline behavioral1/memory/5632-749-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/7492-1617-0x0000000000E30000-0x0000000000E50000-memory.dmp family_redline behavioral1/memory/7560-1635-0x0000000000AC0000-0x0000000000B04000-memory.dmp family_redline behavioral1/memory/7592-1666-0x0000000000E30000-0x0000000000E50000-memory.dmp family_redline -
Socelars payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\zbacuepz.yye\mp3studios_9.exe family_socelars C:\Users\Admin\AppData\Local\Temp\zbacuepz.yye\mp3studios_9.exe family_socelars -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
zouzozu.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts zouzozu.exe -
Executes dropped EXE 30 IoCs
Processes:
fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmpzouzozu.exeCejofonogy.exeXijiculoge.exepoweroff.exepoweroff.tmpgcleaner.exePower Off.exerandom.exerandom.exemp3studios_9.exeCrym.exeCrym.exeesay.exetoolspab3.exeIllusione.exe.piftoolspab3.exermaa1045.exe11.exeF0geI.exekukurzka9000.exenamdoitntn.exereal.exesafert44.exejshainx.exebrokerius.execaptain09876.exeordo_sec666.exeme.exeSETUP_~1.EXEpid process 412 fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp 3216 zouzozu.exe 4724 Cejofonogy.exe 4868 Xijiculoge.exe 4176 poweroff.exe 4064 poweroff.tmp 1692 gcleaner.exe 432 Power Off.exe 2412 random.exe 1508 random.exe 960 mp3studios_9.exe 3668 Crym.exe 5632 Crym.exe 5764 esay.exe 5260 toolspab3.exe 5340 Illusione.exe.pif 5860 toolspab3.exe 5304 rmaa1045.exe 5696 11.exe 7456 F0geI.exe 7468 kukurzka9000.exe 7492 namdoitntn.exe 7528 real.exe 7560 safert44.exe 7592 jshainx.exe 7624 brokerius.exe 7664 captain09876.exe 7728 ordo_sec666.exe 7784 me.exe 8016 SETUP_~1.EXE -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Cejofonogy.exe11.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Control Panel\International\Geo\Nation Cejofonogy.exe Key value queried \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Control Panel\International\Geo\Nation 11.exe -
Loads dropped DLL 2 IoCs
Processes:
fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmprundll32.exepid process 412 fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp 5504 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 34.64.183.91 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
zouzozu.exeesay.execaptain09876.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\MSBuild\\Kukaebozhaega.exe\"" zouzozu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce esay.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" esay.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce captain09876.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" captain09876.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 163 ip-api.com -
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7DD7728EDE0BEF841950C1717AFBEC27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7DD7728EDE0BEF841950C1717AFBEC27 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61 svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Crym.exesvchost.exetoolspab3.exedescription pid process target process PID 3668 set thread context of 5632 3668 Crym.exe Crym.exe PID 3800 set thread context of 6060 3800 svchost.exe svchost.exe PID 5260 set thread context of 5860 5260 toolspab3.exe toolspab3.exe -
Drops file in Program Files directory 29 IoCs
Processes:
11.exemp3studios_9.exezouzozu.exepoweroff.tmpdescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\jshainx.exe 11.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png mp3studios_9.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js mp3studios_9.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js mp3studios_9.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe 11.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe 11.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe 11.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\brokerius.exe 11.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\me.exe 11.exe File created C:\Program Files (x86)\MSBuild\Kukaebozhaega.exe zouzozu.exe File opened for modification C:\Program Files (x86)\powerOff\unins000.dat poweroff.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe 11.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js mp3studios_9.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json mp3studios_9.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js mp3studios_9.exe File created C:\Program Files\Windows Media Player\NEUPAPQEVM\poweroff.exe.config zouzozu.exe File created C:\Program Files (x86)\powerOff\is-2P8NI.tmp poweroff.tmp File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js mp3studios_9.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js mp3studios_9.exe File created C:\Program Files (x86)\powerOff\is-57VSH.tmp poweroff.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe 11.exe File created C:\Program Files (x86)\powerOff\unins000.dat poweroff.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\ordo_sec666.exe 11.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\captain09876.exe 11.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html mp3studios_9.exe File created C:\Program Files\Windows Media Player\NEUPAPQEVM\poweroff.exe zouzozu.exe File opened for modification C:\Program Files (x86)\powerOff\Power Off.exe poweroff.tmp File created C:\Program Files (x86)\MSBuild\Kukaebozhaega.exe.config zouzozu.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js mp3studios_9.exe -
Drops file in Windows directory 10 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4744 1692 WerFault.exe gcleaner.exe 1600 1692 WerFault.exe gcleaner.exe 1864 1692 WerFault.exe gcleaner.exe 2612 1692 WerFault.exe gcleaner.exe 3912 1692 WerFault.exe gcleaner.exe 4424 1692 WerFault.exe gcleaner.exe 3412 1692 WerFault.exe gcleaner.exe 4648 1692 WerFault.exe gcleaner.exe 164 1692 WerFault.exe gcleaner.exe 5200 7528 WerFault.exe real.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspab3.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 4656 timeout.exe 8064 timeout.exe 6936 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5288 taskkill.exe 6056 taskkill.exe 5568 taskkill.exe 8160 taskkill.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies data under HKEY_USERS 16 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exerundll32.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 40db119893b8d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{NI228LKD-8RC5-A6DE-83EQ-7121ODQLEKCO} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\c.idea-shopping.xyz MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = d581f14b6daed801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\d.idea-shopping.xyz MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{JX146IGX-5GI2-M5EF-55KV-0371XYMKMIMY} svchost.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{B978C955-0EF6-4508-AFF5-175FED2328BC}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0204259893b8d801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\idea-shopping.xyz\NumberOfSu = "2" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{VB428EIA-7RH3-S9VD-73FI-7068PASYSEQB}\12BC699624D59B83 svchost.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\idea-shopping.xyz\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{VB428EIA-7RH3-S9VD-73FI-7068PASYSEQB}\650478DC7424C37C svchost.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\idea-shopping.xyz MicrosoftEdgeCP.exe -
Processes:
Cejofonogy.exemp3studios_9.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Cejofonogy.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Cejofonogy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 mp3studios_9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 mp3studios_9.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 106 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Xijiculoge.exepid process 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe 4868 Xijiculoge.exe -
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
MicrosoftEdgeCP.exetoolspab3.exepid process 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe 5860 toolspab3.exe 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
zouzozu.exeCejofonogy.exeXijiculoge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exemp3studios_9.exeCrym.exerundll32.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 3216 zouzozu.exe Token: SeDebugPrivilege 4724 Cejofonogy.exe Token: SeDebugPrivilege 4868 Xijiculoge.exe Token: SeDebugPrivilege 3388 MicrosoftEdge.exe Token: SeDebugPrivilege 3388 MicrosoftEdge.exe Token: SeDebugPrivilege 3388 MicrosoftEdge.exe Token: SeDebugPrivilege 3388 MicrosoftEdge.exe Token: SeDebugPrivilege 1544 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1544 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1544 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1544 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4828 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4828 MicrosoftEdgeCP.exe Token: SeCreateTokenPrivilege 960 mp3studios_9.exe Token: SeAssignPrimaryTokenPrivilege 960 mp3studios_9.exe Token: SeLockMemoryPrivilege 960 mp3studios_9.exe Token: SeIncreaseQuotaPrivilege 960 mp3studios_9.exe Token: SeMachineAccountPrivilege 960 mp3studios_9.exe Token: SeTcbPrivilege 960 mp3studios_9.exe Token: SeSecurityPrivilege 960 mp3studios_9.exe Token: SeTakeOwnershipPrivilege 960 mp3studios_9.exe Token: SeLoadDriverPrivilege 960 mp3studios_9.exe Token: SeSystemProfilePrivilege 960 mp3studios_9.exe Token: SeSystemtimePrivilege 960 mp3studios_9.exe Token: SeProfSingleProcessPrivilege 960 mp3studios_9.exe Token: SeIncBasePriorityPrivilege 960 mp3studios_9.exe Token: SeCreatePagefilePrivilege 960 mp3studios_9.exe Token: SeCreatePermanentPrivilege 960 mp3studios_9.exe Token: SeBackupPrivilege 960 mp3studios_9.exe Token: SeRestorePrivilege 960 mp3studios_9.exe Token: SeShutdownPrivilege 960 mp3studios_9.exe Token: SeDebugPrivilege 960 mp3studios_9.exe Token: SeAuditPrivilege 960 mp3studios_9.exe Token: SeSystemEnvironmentPrivilege 960 mp3studios_9.exe Token: SeChangeNotifyPrivilege 960 mp3studios_9.exe Token: SeRemoteShutdownPrivilege 960 mp3studios_9.exe Token: SeUndockPrivilege 960 mp3studios_9.exe Token: SeSyncAgentPrivilege 960 mp3studios_9.exe Token: SeEnableDelegationPrivilege 960 mp3studios_9.exe Token: SeManageVolumePrivilege 960 mp3studios_9.exe Token: SeImpersonatePrivilege 960 mp3studios_9.exe Token: SeCreateGlobalPrivilege 960 mp3studios_9.exe Token: 31 960 mp3studios_9.exe Token: 32 960 mp3studios_9.exe Token: 33 960 mp3studios_9.exe Token: 34 960 mp3studios_9.exe Token: 35 960 mp3studios_9.exe Token: SeDebugPrivilege 3668 Crym.exe Token: SeDebugPrivilege 5504 rundll32.exe Token: SeIncreaseQuotaPrivilege 3800 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3800 svchost.exe Token: SeDebugPrivilege 5504 rundll32.exe Token: SeIncreaseQuotaPrivilege 2704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2704 svchost.exe Token: SeDebugPrivilege 5504 rundll32.exe Token: SeIncreaseQuotaPrivilege 64 svchost.exe Token: SeAssignPrimaryTokenPrivilege 64 svchost.exe Token: SeDebugPrivilege 5504 rundll32.exe Token: SeIncreaseQuotaPrivilege 2272 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2272 svchost.exe Token: SeDebugPrivilege 5504 rundll32.exe Token: SeIncreaseQuotaPrivilege 2332 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2332 svchost.exe Token: SeDebugPrivilege 5504 rundll32.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
Processes:
poweroff.tmpIllusione.exe.pifchrome.exepid process 4064 poweroff.tmp 5340 Illusione.exe.pif 5340 Illusione.exe.pif 5340 Illusione.exe.pif 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 2480 2480 -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
Illusione.exe.pifchrome.exepid process 5340 Illusione.exe.pif 5340 Illusione.exe.pif 5340 Illusione.exe.pif 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe 5348 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3388 MicrosoftEdge.exe 4748 MicrosoftEdgeCP.exe 4748 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exefa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmpzouzozu.exepoweroff.exeXijiculoge.execmd.exepoweroff.tmpMicrosoftEdgeCP.execmd.exerandom.execmd.execmd.exerundll32.exeCrym.exedescription pid process target process PID 1744 wrote to memory of 412 1744 fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp PID 1744 wrote to memory of 412 1744 fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp PID 1744 wrote to memory of 412 1744 fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp PID 412 wrote to memory of 3216 412 fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp zouzozu.exe PID 412 wrote to memory of 3216 412 fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp zouzozu.exe PID 3216 wrote to memory of 4724 3216 zouzozu.exe Cejofonogy.exe PID 3216 wrote to memory of 4724 3216 zouzozu.exe Cejofonogy.exe PID 3216 wrote to memory of 4868 3216 zouzozu.exe Xijiculoge.exe PID 3216 wrote to memory of 4868 3216 zouzozu.exe Xijiculoge.exe PID 3216 wrote to memory of 4176 3216 zouzozu.exe poweroff.exe PID 3216 wrote to memory of 4176 3216 zouzozu.exe poweroff.exe PID 3216 wrote to memory of 4176 3216 zouzozu.exe poweroff.exe PID 4176 wrote to memory of 4064 4176 poweroff.exe poweroff.tmp PID 4176 wrote to memory of 4064 4176 poweroff.exe poweroff.tmp PID 4176 wrote to memory of 4064 4176 poweroff.exe poweroff.tmp PID 4868 wrote to memory of 364 4868 Xijiculoge.exe cmd.exe PID 4868 wrote to memory of 364 4868 Xijiculoge.exe cmd.exe PID 364 wrote to memory of 1692 364 cmd.exe gcleaner.exe PID 364 wrote to memory of 1692 364 cmd.exe gcleaner.exe PID 364 wrote to memory of 1692 364 cmd.exe gcleaner.exe PID 4064 wrote to memory of 432 4064 poweroff.tmp Power Off.exe PID 4064 wrote to memory of 432 4064 poweroff.tmp Power Off.exe PID 4748 wrote to memory of 1544 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 1544 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 1544 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 1544 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 1544 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 1544 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 1544 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4868 wrote to memory of 3668 4868 Xijiculoge.exe cmd.exe PID 4868 wrote to memory of 3668 4868 Xijiculoge.exe cmd.exe PID 3668 wrote to memory of 2412 3668 cmd.exe random.exe PID 3668 wrote to memory of 2412 3668 cmd.exe random.exe PID 3668 wrote to memory of 2412 3668 cmd.exe random.exe PID 2412 wrote to memory of 1508 2412 random.exe random.exe PID 2412 wrote to memory of 1508 2412 random.exe random.exe PID 2412 wrote to memory of 1508 2412 random.exe random.exe PID 4868 wrote to memory of 4072 4868 Xijiculoge.exe cmd.exe PID 4868 wrote to memory of 4072 4868 Xijiculoge.exe cmd.exe PID 4072 wrote to memory of 960 4072 cmd.exe mp3studios_9.exe PID 4072 wrote to memory of 960 4072 cmd.exe mp3studios_9.exe PID 4072 wrote to memory of 960 4072 cmd.exe mp3studios_9.exe PID 4868 wrote to memory of 4648 4868 Xijiculoge.exe cmd.exe PID 4868 wrote to memory of 4648 4868 Xijiculoge.exe cmd.exe PID 4648 wrote to memory of 3668 4648 cmd.exe Crym.exe PID 4648 wrote to memory of 3668 4648 cmd.exe Crym.exe PID 4648 wrote to memory of 3668 4648 cmd.exe Crym.exe PID 4748 wrote to memory of 4212 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 4212 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 4212 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 4212 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 4212 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 4212 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4748 wrote to memory of 4212 4748 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5488 wrote to memory of 5504 5488 rundll32.exe rundll32.exe PID 5488 wrote to memory of 5504 5488 rundll32.exe rundll32.exe PID 5488 wrote to memory of 5504 5488 rundll32.exe rundll32.exe PID 3668 wrote to memory of 5632 3668 Crym.exe Crym.exe PID 3668 wrote to memory of 5632 3668 Crym.exe Crym.exe PID 3668 wrote to memory of 5632 3668 Crym.exe Crym.exe PID 3668 wrote to memory of 5632 3668 Crym.exe Crym.exe PID 3668 wrote to memory of 5632 3668 Crym.exe Crym.exe PID 3668 wrote to memory of 5632 3668 Crym.exe Crym.exe PID 3668 wrote to memory of 5632 3668 Crym.exe Crym.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe"C:\Users\Admin\AppData\Local\Temp\fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-LKDF9.tmp\fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp"C:\Users\Admin\AppData\Local\Temp\is-LKDF9.tmp\fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmp" /SL5="$90060,140559,56832,C:\Users\Admin\AppData\Local\Temp\fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-KN97P.tmp\zouzozu.exe"C:\Users\Admin\AppData\Local\Temp\is-KN97P.tmp\zouzozu.exe" /S /UID=913⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8f-f92df-13b-cdfb8-a73f765496e80\Cejofonogy.exe"C:\Users\Admin\AppData\Local\Temp\8f-f92df-13b-cdfb8-a73f765496e80\Cejofonogy.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\e3-f6384-d68-d89a2-7ca03fd56c08d\Xijiculoge.exe"C:\Users\Admin\AppData\Local\Temp\e3-f6384-d68-d89a2-7ca03fd56c08d\Xijiculoge.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cnglohgo.khh\gcleaner.exe /mixfive & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cnglohgo.khh\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\cnglohgo.khh\gcleaner.exe /mixfive6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 5247⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 7847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 8047⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 8727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 9767⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 8687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 11447⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 11567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 12367⤵
- Program crash
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exe & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exeC:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exe"C:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exe" -h7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zbacuepz.yye\mp3studios_9.exe & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\zbacuepz.yye\mp3studios_9.exeC:\Users\Admin\AppData\Local\Temp\zbacuepz.yye\mp3studios_9.exe6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"7⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffddc574f50,0x7ffddc574f60,0x7ffddc574f708⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1976 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2560 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2552 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1788 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1728 /prefetch:28⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:18⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4500 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4540 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4652 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4656 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4904 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5220 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5364 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5508 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=proxy_resolver.mojom.ProxyResolverFactory --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=proxy_resolver --mojo-platform-channel-handle=5448 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5940 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=988 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1352 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5908 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5664 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5736 /prefetch:88⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1720,17030924040371537393,15038923028682606593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=780 /prefetch:88⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exe & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exeC:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exe"C:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exe"7⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tfno54wu.l4g\esay.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\tfno54wu.l4g\esay.exeC:\Users\Admin\AppData\Local\Temp\tfno54wu.l4g\esay.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\WerFault.exeWerFault.exe //////7⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Affidarlo.mpeg & ping -n 5 localhost7⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^jVkfcpoYehXkMDfbFFoMvoVpDiIryuPcYMKONgagdtDWwTazQVJLXrArZwMgByTWbBhqSBKshUvsFZoJPfhpvtbVkGOLCrMkkHnmGaAflabrHonqTemkRJmzraOkMYOlikuYAIrvOYZtGxheoO$" Sospettoso.mpeg9⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Illusione.exe.pifIllusione.exe.pif I9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Illusione.exe.pifC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Illusione.exe.pif10⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Illusione.exe.pifC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Illusione.exe.pif10⤵
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 59⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost8⤵
- Runs ping.exe
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exeC:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exeC:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exe7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wxoedzpu.cof\rmaa1045.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\wxoedzpu.cof\rmaa1045.exeC:\Users\Admin\AppData\Local\Temp\wxoedzpu.cof\rmaa1045.exe6⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ctwnzf3q.gyw\11.exe & exit5⤵
-
C:\Users\Admin\AppData\Local\Temp\ctwnzf3q.gyw\11.exeC:\Users\Admin\AppData\Local\Temp\ctwnzf3q.gyw\11.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im real.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Company\NewProduct\real.exe" & del C:\PrograData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im real.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7528 -s 18888⤵
- Program crash
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exe"C:\Program Files (x86)\Company\NewProduct\jshainx.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\brokerius.exe"C:\Program Files (x86)\Company\NewProduct\brokerius.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im brokerius.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Company\NewProduct\brokerius.exe" & del C:\PrograData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im brokerius.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\Company\NewProduct\ordo_sec666.exe"C:\Program Files (x86)\Company\NewProduct\ordo_sec666.exe"7⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\me.exe"C:\Program Files (x86)\Company\NewProduct\me.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im me.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Company\NewProduct\me.exe" & del C:\PrograData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im me.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\Company\NewProduct\captain09876.exe"C:\Program Files (x86)\Company\NewProduct\captain09876.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~1.EXE8⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"7⤵
- Executes dropped EXE
-
C:\Program Files\Windows Media Player\NEUPAPQEVM\poweroff.exe"C:\Program Files\Windows Media Player\NEUPAPQEVM\poweroff.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-FDGNV.tmp\poweroff.tmp"C:\Users\Admin\AppData\Local\Temp\is-FDGNV.tmp\poweroff.tmp" /SL5="$301E4,490199,350720,C:\Program Files\Windows Media Player\NEUPAPQEVM\poweroff.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\powerOff\Power Off.exe"C:\Program Files (x86)\powerOff\Power Off.exe" -silent -desktopShortcut -programMenu6⤵
- Executes dropped EXE
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\powerOff\Power Off.exeFilesize
621KB
MD58d0b18eb87590fa654da3704092b122b
SHA1aaf4417695904bd718def564b2c1dae40623cc1d
SHA256f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457
SHA512fa54fad936e96ecabfab70f29fe5095b60ce5bfa7f31f6c405c42ad4f4f153ec7406d03d0451e11e886722abf28f09b219d3e8d9a703f20cb67b0950d8b70828
-
C:\Program Files (x86)\powerOff\Power Off.exeFilesize
621KB
MD58d0b18eb87590fa654da3704092b122b
SHA1aaf4417695904bd718def564b2c1dae40623cc1d
SHA256f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457
SHA512fa54fad936e96ecabfab70f29fe5095b60ce5bfa7f31f6c405c42ad4f4f153ec7406d03d0451e11e886722abf28f09b219d3e8d9a703f20cb67b0950d8b70828
-
C:\Program Files\Windows Media Player\NEUPAPQEVM\poweroff.exeFilesize
838KB
MD5c0538198613d60407c75c54c55e69d91
SHA1a2d713a098bc7b6d245c428dcdeb5614af3b8edd
SHA256c23f223e4d981eb0e24cadae9dc0c60e40e12ff220d95c9dd2a5b6220fa6d6ed
SHA512121f882471cd14752a1f806472c89028cc56c90fbfb0b645c26937c417f107d5324250f783310032d4526018c8918cdd06c52325949f78220a9d3bab167e3529
-
C:\Program Files\Windows Media Player\NEUPAPQEVM\poweroff.exeFilesize
838KB
MD5c0538198613d60407c75c54c55e69d91
SHA1a2d713a098bc7b6d245c428dcdeb5614af3b8edd
SHA256c23f223e4d981eb0e24cadae9dc0c60e40e12ff220d95c9dd2a5b6220fa6d6ed
SHA512121f882471cd14752a1f806472c89028cc56c90fbfb0b645c26937c417f107d5324250f783310032d4526018c8918cdd06c52325949f78220a9d3bab167e3529
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.htmlFilesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.pngFilesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.jsFilesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.jsFilesize
19KB
MD5b6c4c2bd3a1228c5cdefbcf4b2507f68
SHA13fce0860e24ead2d8753a52382c332cf7e8285c7
SHA25601d40a4ba5a77471b42b2218454d8d3e7f4b0386e9a7ec49120d906a87d355bd
SHA5125436e6913d363a0d0f54a68e8ce0e43d482e9acf9ad5afbed505dfb99258144cd611cd3568068aebac1ef6ae7dd68322ddcb29c833fb0b652b35c7f4db145556
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.jsFilesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.jsFilesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.jsFilesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.jsFilesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.jsonFilesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD57cc3619a1ed71246b7a427687ac13bba
SHA10e7b92c837339c2fbe904539dfd5da26ff009679
SHA256923d585d1fec6ed7934fd1657d6aada948e60a1ef4aa4f85f56a8c949a7235f4
SHA512535806bc541e4f63eb72daac751ee8d8922500215f3e730347f9dd105825cdb09f7da4c08608ff7bb14733bb4974ad1051a67d8ca0279f572f89dcb54fb15aee
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Crym.exe.logFilesize
617B
MD5a0613d38ffeb5c99b6f8d085c7ba985e
SHA1d5394e5509841b2c7a073543a66e0916741bad66
SHA25688bfd8c0caa80171d51051bcca51f3581ccd4cbec3540501958e73ae560de668
SHA5128be6641aa27e82b9f4a53804e05f84f39603a14bcdba4dda08cc149121e039ffa856ed5584fdc40a2d09f3b1b70c02571e9bd30678b763c89b0265df8f208168
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6B0D0351A9B8CFD4C51B42E5749FFDC6Filesize
503B
MD55426d4d3967bac69de21b921902bd4b9
SHA185587b871cead5a9b233b404d230a35c31ef6075
SHA256989093d59608977e03dc2292c12a21fef8aa7fd60ba6afeee84de7e12b437262
SHA5123080c76e6e61529755d32da400e6e5367992514c6bf6125f97ad3d463ce858921df947fa841d19076986b3c3eae7e1622bfce5f7d0ceafaac460914ff4228813
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5435504906bb312770909f68b25943643
SHA16317cae90c111c15e196f97f98b9283941e43ce7
SHA256daebf48aa16fda091082a39121d800ffdb02add67105620c4c183318d92df7f7
SHA512ef0175407fa63729edfb695ce71138291d4d5f2549730b7e5c1b506697e60b8aaa2b765f4f0dc876e58e74b83c7a8ac110fd4b9fe7e1fcd74e9c7992e5723599
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6B0D0351A9B8CFD4C51B42E5749FFDC6Filesize
548B
MD540f55d8729370188c6f7dd1ea62ed61a
SHA1e7c6200f3c793b46fef11cacad5eab3c1c5b647b
SHA2561fbe420b4a8aea52ad2b012c59e2bfd950d40eac39016a0d1587feab52f13f25
SHA5125c60c40adce3abe8549e5d6683c1f62d334e8e162bfb71732df36e13b236e3bb17c14ae7e04b6275008027547ffacb4b37354b9cd3d8ca7a69a83cc1bca1c815
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
C:\Users\Admin\AppData\Local\Temp\8f-f92df-13b-cdfb8-a73f765496e80\Cejofonogy.exeFilesize
667KB
MD52416c603ae770e1f9be93a05705b873f
SHA1bb0788931435f837f5257f5c56da16bdcfba3aaf
SHA256502ec713cdab8b1e7844182a3656f9fcf1bf1ac1c3c6786388797b73d7d5c778
SHA51262e83755a815bd087a731cbba12ad9be43bd2b463a27304429a9041c2012a5b7b169b9741e17f6669dc574da13e9e8110a11e5082c2be518246aa4df30e1a628
-
C:\Users\Admin\AppData\Local\Temp\8f-f92df-13b-cdfb8-a73f765496e80\Cejofonogy.exeFilesize
667KB
MD52416c603ae770e1f9be93a05705b873f
SHA1bb0788931435f837f5257f5c56da16bdcfba3aaf
SHA256502ec713cdab8b1e7844182a3656f9fcf1bf1ac1c3c6786388797b73d7d5c778
SHA51262e83755a815bd087a731cbba12ad9be43bd2b463a27304429a9041c2012a5b7b169b9741e17f6669dc574da13e9e8110a11e5082c2be518246aa4df30e1a628
-
C:\Users\Admin\AppData\Local\Temp\8f-f92df-13b-cdfb8-a73f765496e80\Cejofonogy.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Affidarlo.mpegFilesize
9KB
MD5d5418a11dd93b1e54ebb7507c241e667
SHA1a99bfa37a71984faf3083dfb63b2972932006df1
SHA256dcb08514a54bbeaa03645bcaf71b835bddb91dd8bd9b8ca72f89db296021da56
SHA512cf27386a981babb1ba517baff8a0a38caab9d45d2ec54f65b4cda24b723f7406e886b2a6d1598d5ca1137f9af48e2765f63d32ca8bc6980a20d66425da25584d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Illusione.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sospettoso.mpegFilesize
924KB
MD559d41eebb9ce28e3361455ee57dfeece
SHA159fd036ad532f01281d8a1815f5a2736ccf1576e
SHA256778493d5497476f4756a03dcd1edf30f738f6da66a84f5bf7f9f8465c9269d5d
SHA512588657ebf8fd68f9b089a5b83bedf5c21d65e3fc3d9a3b845002f080348e590e31ad15e199753826ebac90e07492fb99abb59fb15d824d8e55465271835360d4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Via.mpegFilesize
1.0MB
MD569455caf13216bf0cfae95eba961d6c7
SHA17f11e77f0dca09eb42bfa545d5e1c78266309101
SHA25635e4f899cf52fd6d5847d12b32c1c18fc33e794f26065f564c46f602a623391b
SHA5122ce9ecd387ef86873789cb43d2e6ef1d40887d0debe148c5703730e18d45fb50c7576a88ed7cc5f33f67713018648ed65f0ba09b6b4b77d784e575cee99790c6
-
C:\Users\Admin\AppData\Local\Temp\cnglohgo.khh\gcleaner.exeFilesize
301KB
MD573ca5bac94cf9480ff87695b6f8820fc
SHA121d4d58b9048a10f57a8c10cd871cee7e808f676
SHA256a88433517fd67ded453c384c8fb9e51033d0de184070c0eefda46bc0c863cc17
SHA5125a4f1e5a73ad4caa4d047e1a04b740a70249b0ffaa7a80702aa87ee5b7d4bd296ccf98598b19fd8469df77b4a9a021091ba766290611214b39c9f8cfc7218679
-
C:\Users\Admin\AppData\Local\Temp\cnglohgo.khh\gcleaner.exeFilesize
301KB
MD573ca5bac94cf9480ff87695b6f8820fc
SHA121d4d58b9048a10f57a8c10cd871cee7e808f676
SHA256a88433517fd67ded453c384c8fb9e51033d0de184070c0eefda46bc0c863cc17
SHA5125a4f1e5a73ad4caa4d047e1a04b740a70249b0ffaa7a80702aa87ee5b7d4bd296ccf98598b19fd8469df77b4a9a021091ba766290611214b39c9f8cfc7218679
-
C:\Users\Admin\AppData\Local\Temp\ctwnzf3q.gyw\11.exeFilesize
2.6MB
MD51d1c4639ec7bd10badd41968bc0ff797
SHA1ab1146f9ac9bbe1580be4f16c1548a2600075ba9
SHA256bdbd5a0fb6a3ab99f0cfa3cee7e3f7f8f7ec078eeb628aadfb8a32a5df2be3b9
SHA5121b3da0307716f29cd2ec969160f1965949e059cf093cbd37cd411d923f8e8bcfe07bf944176e7a18eb8414046c805934f827e0f5cf57afced8c86978cce8e2a5
-
C:\Users\Admin\AppData\Local\Temp\ctwnzf3q.gyw\11.exeFilesize
2.6MB
MD51d1c4639ec7bd10badd41968bc0ff797
SHA1ab1146f9ac9bbe1580be4f16c1548a2600075ba9
SHA256bdbd5a0fb6a3ab99f0cfa3cee7e3f7f8f7ec078eeb628aadfb8a32a5df2be3b9
SHA5121b3da0307716f29cd2ec969160f1965949e059cf093cbd37cd411d923f8e8bcfe07bf944176e7a18eb8414046c805934f827e0f5cf57afced8c86978cce8e2a5
-
C:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exeFilesize
531KB
MD556bd2ddcee32d72e62a9ad0d7363e3c1
SHA10ddfcbda9a60ede8c352503d3521099a1dd7f7fb
SHA256e9357f1183c29fb059e820418c518e103a9dd9ebc3280deadcf6641cd7b242b2
SHA51299d7d384b9306b9dc84ec59f818ba18625c1e9fefb497823a8f102dc58ef80e11ea0bb9660c0ad294bdc0706390822faf3df7df6b1d84d2ac209d316aeedebbc
-
C:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exeFilesize
531KB
MD556bd2ddcee32d72e62a9ad0d7363e3c1
SHA10ddfcbda9a60ede8c352503d3521099a1dd7f7fb
SHA256e9357f1183c29fb059e820418c518e103a9dd9ebc3280deadcf6641cd7b242b2
SHA51299d7d384b9306b9dc84ec59f818ba18625c1e9fefb497823a8f102dc58ef80e11ea0bb9660c0ad294bdc0706390822faf3df7df6b1d84d2ac209d316aeedebbc
-
C:\Users\Admin\AppData\Local\Temp\cwurp3ex.rkl\Crym.exeFilesize
531KB
MD556bd2ddcee32d72e62a9ad0d7363e3c1
SHA10ddfcbda9a60ede8c352503d3521099a1dd7f7fb
SHA256e9357f1183c29fb059e820418c518e103a9dd9ebc3280deadcf6641cd7b242b2
SHA51299d7d384b9306b9dc84ec59f818ba18625c1e9fefb497823a8f102dc58ef80e11ea0bb9660c0ad294bdc0706390822faf3df7df6b1d84d2ac209d316aeedebbc
-
C:\Users\Admin\AppData\Local\Temp\db.datFilesize
557KB
MD50d0e6d1708c3c4365b53b7ce487bf2e3
SHA1110cb46f6d5dbe22e419c5d8d6bc739b9958e0bb
SHA2566e11d205028f8c8d6d9f11e92d5564424f7efc9e83ccbfd791f66c35183c38e4
SHA5128aed84b24345f9cb1253bb0bfb64f11f974bc97ecd67e4ed15de768620257e8abf3b95fc17a4c181ef4574eacc410a79411305f57ffa576101373230f31ada53
-
C:\Users\Admin\AppData\Local\Temp\db.dllFilesize
60KB
MD54d11bd6f3172584b3fda0e9efcaf0ddb
SHA10581c7f087f6538a1b6d4f05d928c1df24236944
SHA25673314490c80e5eb09f586e12c1f035c44f11aeaa41d2f4b08aca476132578930
SHA5126a023496e7ee03c2ff8e3ba445c7d7d5bfe6a1e1e1bae5c17dcf41e78ede84a166966579bf8cc7be7450d2516f869713907775e863670b10eb60c092492d2d04
-
C:\Users\Admin\AppData\Local\Temp\e3-f6384-d68-d89a2-7ca03fd56c08d\Kenessey.txtFilesize
9B
MD597384261b8bbf966df16e5ad509922db
SHA12fc42d37fee2c81d767e09fb298b70c748940f86
SHA2569c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c
SHA512b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21
-
C:\Users\Admin\AppData\Local\Temp\e3-f6384-d68-d89a2-7ca03fd56c08d\Xijiculoge.exeFilesize
522KB
MD556800de116a99bf1b69fdb6001caf2d7
SHA12eb1d613efbbb9aaa38aa06308ffe38b297369e9
SHA2568b127f228134c8110a14dfa32afbd7275e7ffda7b6fbd9a0f0a1756501091057
SHA512e6138e99ecabb9ead30e2de8fb15020bd097e18893e296634e6e36b0b8177942dcbb02568b64167cfe8b5e63ff18b6123793e9a83129d672a568b93d7c8a4403
-
C:\Users\Admin\AppData\Local\Temp\e3-f6384-d68-d89a2-7ca03fd56c08d\Xijiculoge.exeFilesize
522KB
MD556800de116a99bf1b69fdb6001caf2d7
SHA12eb1d613efbbb9aaa38aa06308ffe38b297369e9
SHA2568b127f228134c8110a14dfa32afbd7275e7ffda7b6fbd9a0f0a1756501091057
SHA512e6138e99ecabb9ead30e2de8fb15020bd097e18893e296634e6e36b0b8177942dcbb02568b64167cfe8b5e63ff18b6123793e9a83129d672a568b93d7c8a4403
-
C:\Users\Admin\AppData\Local\Temp\e3-f6384-d68-d89a2-7ca03fd56c08d\Xijiculoge.exe.configFilesize
1KB
MD598d2687aec923f98c37f7cda8de0eb19
SHA1f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA2568a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA51295c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590
-
C:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exeFilesize
184KB
MD51c73fb90bb95324b847e932c391ba555
SHA11ee1c07a376b4f3f68931a96ca4502c63459d702
SHA2565a994d12a7b33fb489f2a988553f669d3ee475f4184d4e2e6678ef160c3e38b8
SHA5129a9a4202d253948fb7a0e6ad0e4e7280531720c6120d40321b65eb385280f4ea27867c911497b8ed34ddcb37b5b69146e7f1f4d83b773733abb7b58b6511398c
-
C:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exeFilesize
184KB
MD51c73fb90bb95324b847e932c391ba555
SHA11ee1c07a376b4f3f68931a96ca4502c63459d702
SHA2565a994d12a7b33fb489f2a988553f669d3ee475f4184d4e2e6678ef160c3e38b8
SHA5129a9a4202d253948fb7a0e6ad0e4e7280531720c6120d40321b65eb385280f4ea27867c911497b8ed34ddcb37b5b69146e7f1f4d83b773733abb7b58b6511398c
-
C:\Users\Admin\AppData\Local\Temp\fwganssk.rlr\random.exeFilesize
184KB
MD51c73fb90bb95324b847e932c391ba555
SHA11ee1c07a376b4f3f68931a96ca4502c63459d702
SHA2565a994d12a7b33fb489f2a988553f669d3ee475f4184d4e2e6678ef160c3e38b8
SHA5129a9a4202d253948fb7a0e6ad0e4e7280531720c6120d40321b65eb385280f4ea27867c911497b8ed34ddcb37b5b69146e7f1f4d83b773733abb7b58b6511398c
-
C:\Users\Admin\AppData\Local\Temp\is-FDGNV.tmp\poweroff.tmpFilesize
981KB
MD501515376348a54ecef04f45b436cb104
SHA1111e709b21bf56181c83057dafba7b71ed41f1b2
SHA2568c1a062cf83fba41daa86670e9ccdb7b7ae3c913fe6d0343284336d40c394ba0
SHA5128d0a31e3694cec61fb99573e58c3696224a6198060d8bfca020805541789516315867b6b83a5e105703660e03fac4906f95f617dc8a3947d6b7982dfd3baea28
-
C:\Users\Admin\AppData\Local\Temp\is-FDGNV.tmp\poweroff.tmpFilesize
981KB
MD501515376348a54ecef04f45b436cb104
SHA1111e709b21bf56181c83057dafba7b71ed41f1b2
SHA2568c1a062cf83fba41daa86670e9ccdb7b7ae3c913fe6d0343284336d40c394ba0
SHA5128d0a31e3694cec61fb99573e58c3696224a6198060d8bfca020805541789516315867b6b83a5e105703660e03fac4906f95f617dc8a3947d6b7982dfd3baea28
-
C:\Users\Admin\AppData\Local\Temp\is-KN97P.tmp\zouzozu.exeFilesize
371KB
MD5cf5e3c3dbd8b49252c9ad2c72cd779a5
SHA12a39f5a8754dc6469c85a7450f2255fdc8af9965
SHA256765adb13c98fd99525028d9b1cb16388eb4ebf0eef7856ca1600e350c2704b0d
SHA51261ba28c3fb0960051869b0bfd60ef6dfaeda8d5f643bd5a601322df721865c0d67b072ba0f0e46fe56bb867587b0e878bdc57d309bac036ba0ec462c67c02f75
-
C:\Users\Admin\AppData\Local\Temp\is-KN97P.tmp\zouzozu.exeFilesize
371KB
MD5cf5e3c3dbd8b49252c9ad2c72cd779a5
SHA12a39f5a8754dc6469c85a7450f2255fdc8af9965
SHA256765adb13c98fd99525028d9b1cb16388eb4ebf0eef7856ca1600e350c2704b0d
SHA51261ba28c3fb0960051869b0bfd60ef6dfaeda8d5f643bd5a601322df721865c0d67b072ba0f0e46fe56bb867587b0e878bdc57d309bac036ba0ec462c67c02f75
-
C:\Users\Admin\AppData\Local\Temp\is-LKDF9.tmp\fa8a126ed2ee982c47f9fd5f4451a932c04f3fee4863ab26252c9438447105ee.tmpFilesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\AppData\Local\Temp\tfno54wu.l4g\esay.exeFilesize
958KB
MD5826b0500e46f72adbd1533fce36fa6c0
SHA14e61502462b8c3dda462df66a42dd86e66fe1ec6
SHA2562c8d13873ea8aeeec7d5baf4b07fbeff2570d165101a8934a7141bcf5dd3d76c
SHA512b35c08be00bb10bc03b2d0d4b49e67c1a0f49a58aa1cd189efe50adbd5bc873c0fb967aef3b6900b2d1d4d70c20f8ffd7b59afe38a10956bff803318d0826507
-
C:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exeFilesize
216KB
MD5c9258825c66f0e407cb5dc58658495ab
SHA1c18235d1f68c1bac5fde40a77bc2fceeb0dd25fc
SHA25699702b383e6bddf8637b7f2d3eddcdf12e8f80e501a141be05c2ca90053de144
SHA51289ad79fc360cc1d668370f63fb8a1d9bdf21b1c421a3b95088aad804b570c34e75600d504dd2375942a0b0cffb5ff2def4277d89d935e8237e6bd7f077609451
-
C:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exeFilesize
216KB
MD5c9258825c66f0e407cb5dc58658495ab
SHA1c18235d1f68c1bac5fde40a77bc2fceeb0dd25fc
SHA25699702b383e6bddf8637b7f2d3eddcdf12e8f80e501a141be05c2ca90053de144
SHA51289ad79fc360cc1d668370f63fb8a1d9bdf21b1c421a3b95088aad804b570c34e75600d504dd2375942a0b0cffb5ff2def4277d89d935e8237e6bd7f077609451
-
C:\Users\Admin\AppData\Local\Temp\ubfptpv2.ab2\toolspab3.exeFilesize
216KB
MD5c9258825c66f0e407cb5dc58658495ab
SHA1c18235d1f68c1bac5fde40a77bc2fceeb0dd25fc
SHA25699702b383e6bddf8637b7f2d3eddcdf12e8f80e501a141be05c2ca90053de144
SHA51289ad79fc360cc1d668370f63fb8a1d9bdf21b1c421a3b95088aad804b570c34e75600d504dd2375942a0b0cffb5ff2def4277d89d935e8237e6bd7f077609451
-
C:\Users\Admin\AppData\Local\Temp\wxoedzpu.cof\rmaa1045.exeFilesize
142KB
MD5cc1af196f62bc78c839d0aee2b171b23
SHA17544d300ea2ad8ac0c823ce94b8a764fb883e597
SHA256549fbfc5f0c0866f678be83044b5452899d7c01f5076909982855b44178efcab
SHA512ee0fff10513c24c12fa446f6f04e7d3cac0040f449f2ee036b0f34ca6c909f9f4162325fa42f41098e05b69e47b790cba79cc710ca008f0e1300be99a44030b7
-
C:\Users\Admin\AppData\Local\Temp\wxoedzpu.cof\rmaa1045.exeFilesize
142KB
MD5cc1af196f62bc78c839d0aee2b171b23
SHA17544d300ea2ad8ac0c823ce94b8a764fb883e597
SHA256549fbfc5f0c0866f678be83044b5452899d7c01f5076909982855b44178efcab
SHA512ee0fff10513c24c12fa446f6f04e7d3cac0040f449f2ee036b0f34ca6c909f9f4162325fa42f41098e05b69e47b790cba79cc710ca008f0e1300be99a44030b7
-
C:\Users\Admin\AppData\Local\Temp\zbacuepz.yye\mp3studios_9.exeFilesize
1.4MB
MD526f88db0d6880c88299bf252e15f426b
SHA1797bbb317c74efb1ff5d5d7b97cb4b0e164f0473
SHA2563621a05ade1ff69dc8c3d903942193d22a29b5b88c482a2f2ac935f1ee797e8d
SHA512f82917f6ef98d1f513cf6a297c5550b0e3d9690a46c3da8c6a38a47ebcab8f3659b5514fe0451d23b99a7237a25ccd46a2c4abd289de8b0ec63e0acbc3706298
-
C:\Users\Admin\AppData\Local\Temp\zbacuepz.yye\mp3studios_9.exeFilesize
1.4MB
MD526f88db0d6880c88299bf252e15f426b
SHA1797bbb317c74efb1ff5d5d7b97cb4b0e164f0473
SHA2563621a05ade1ff69dc8c3d903942193d22a29b5b88c482a2f2ac935f1ee797e8d
SHA512f82917f6ef98d1f513cf6a297c5550b0e3d9690a46c3da8c6a38a47ebcab8f3659b5514fe0451d23b99a7237a25ccd46a2c4abd289de8b0ec63e0acbc3706298
-
\??\pipe\crashpad_5348_MBFZSUSZKXINZXSWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\db.dllFilesize
60KB
MD54d11bd6f3172584b3fda0e9efcaf0ddb
SHA10581c7f087f6538a1b6d4f05d928c1df24236944
SHA25673314490c80e5eb09f586e12c1f035c44f11aeaa41d2f4b08aca476132578930
SHA5126a023496e7ee03c2ff8e3ba445c7d7d5bfe6a1e1e1bae5c17dcf41e78ede84a166966579bf8cc7be7450d2516f869713907775e863670b10eb60c092492d2d04
-
\Users\Admin\AppData\Local\Temp\is-KN97P.tmp\idp.dllFilesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
memory/64-799-0x0000019AA4270000-0x0000019AA42E2000-memory.dmpFilesize
456KB
-
memory/364-302-0x0000000000000000-mapping.dmp
-
memory/412-177-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-165-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-180-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-182-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-181-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-179-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-159-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-158-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-176-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-175-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-178-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-174-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-173-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-160-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-172-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-171-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-170-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-161-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-169-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-154-0x0000000000000000-mapping.dmp
-
memory/412-156-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-168-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-167-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-162-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-166-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-163-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-157-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/412-164-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/432-376-0x0000000000000000-mapping.dmp
-
memory/960-501-0x0000000000000000-mapping.dmp
-
memory/1032-813-0x000001AE83D10000-0x000001AE83D82000-memory.dmpFilesize
456KB
-
memory/1148-810-0x000002BD11250000-0x000002BD112C2000-memory.dmpFilesize
456KB
-
memory/1208-831-0x000002228AF40000-0x000002228AFB2000-memory.dmpFilesize
456KB
-
memory/1384-832-0x000002ABE4100000-0x000002ABE4172000-memory.dmpFilesize
456KB
-
memory/1416-829-0x00000213897A0000-0x0000021389812000-memory.dmpFilesize
456KB
-
memory/1508-473-0x0000000000000000-mapping.dmp
-
memory/1692-426-0x0000000000530000-0x00000000005DE000-memory.dmpFilesize
696KB
-
memory/1692-401-0x0000000000530000-0x000000000067A000-memory.dmpFilesize
1.3MB
-
memory/1692-330-0x0000000000000000-mapping.dmp
-
memory/1692-425-0x0000000000530000-0x000000000067A000-memory.dmpFilesize
1.3MB
-
memory/1692-403-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/1692-427-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/1692-402-0x0000000000530000-0x00000000005DE000-memory.dmpFilesize
696KB
-
memory/1744-146-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-145-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-124-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-122-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-126-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-121-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-265-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1744-247-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1744-153-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-127-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-129-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-152-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-151-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-150-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-149-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1744-147-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1744-123-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-130-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-128-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-125-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-131-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-132-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-133-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-134-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-135-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-144-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-143-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-142-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-141-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-136-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-137-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-138-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-139-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-120-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-119-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-118-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-116-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-117-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1744-140-0x00000000770F0000-0x000000007727E000-memory.dmpFilesize
1.6MB
-
memory/1848-830-0x000002040FC80000-0x000002040FCF2000-memory.dmpFilesize
456KB
-
memory/2272-804-0x000002E190420000-0x000002E190492000-memory.dmpFilesize
456KB
-
memory/2332-808-0x0000026E47740000-0x0000026E477B2000-memory.dmpFilesize
456KB
-
memory/2364-833-0x0000021BC6330000-0x0000021BC63A2000-memory.dmpFilesize
456KB
-
memory/2376-834-0x00000295386C0000-0x0000029538732000-memory.dmpFilesize
456KB
-
memory/2412-428-0x0000000000000000-mapping.dmp
-
memory/2704-797-0x00000288BDA80000-0x00000288BDAF2000-memory.dmpFilesize
456KB
-
memory/3216-224-0x0000000000000000-mapping.dmp
-
memory/3668-424-0x0000000000000000-mapping.dmp
-
memory/3668-665-0x000000000A680000-0x000000000AB7E000-memory.dmpFilesize
5.0MB
-
memory/3668-651-0x0000000007090000-0x000000000716C000-memory.dmpFilesize
880KB
-
memory/3668-668-0x0000000002480000-0x000000000249C000-memory.dmpFilesize
112KB
-
memory/3668-672-0x000000000A270000-0x000000000A30C000-memory.dmpFilesize
624KB
-
memory/3668-634-0x0000000000320000-0x00000000003AE000-memory.dmpFilesize
568KB
-
memory/3668-554-0x0000000000000000-mapping.dmp
-
memory/3772-916-0x0000000000000000-mapping.dmp
-
memory/3800-793-0x0000019B44F10000-0x0000019B44F5D000-memory.dmpFilesize
308KB
-
memory/3800-794-0x0000019B44FD0000-0x0000019B45042000-memory.dmpFilesize
456KB
-
memory/4064-286-0x0000000000000000-mapping.dmp
-
memory/4072-481-0x0000000000000000-mapping.dmp
-
memory/4176-423-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/4176-238-0x0000000000000000-mapping.dmp
-
memory/4176-319-0x0000000000400000-0x000000000045C000-memory.dmpFilesize
368KB
-
memory/4648-528-0x0000000000000000-mapping.dmp
-
memory/4656-3237-0x0000000000000000-mapping.dmp
-
memory/4724-228-0x0000000000000000-mapping.dmp
-
memory/4868-233-0x0000000000000000-mapping.dmp
-
memory/5124-897-0x0000000000000000-mapping.dmp
-
memory/5260-899-0x0000000000000000-mapping.dmp
-
memory/5260-983-0x00000000006C3000-0x00000000006D4000-memory.dmpFilesize
68KB
-
memory/5260-997-0x00000000006C3000-0x00000000006D4000-memory.dmpFilesize
68KB
-
memory/5260-988-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/5288-1135-0x0000000000000000-mapping.dmp
-
memory/5304-1023-0x0000000000000000-mapping.dmp
-
memory/5340-933-0x0000000000000000-mapping.dmp
-
memory/5504-746-0x00000000049D0000-0x0000000004ADC000-memory.dmpFilesize
1.0MB
-
memory/5504-792-0x0000000004890000-0x00000000048ED000-memory.dmpFilesize
372KB
-
memory/5504-826-0x0000000004890000-0x00000000048ED000-memory.dmpFilesize
372KB
-
memory/5504-653-0x0000000000000000-mapping.dmp
-
memory/5508-934-0x0000000000000000-mapping.dmp
-
memory/5568-4034-0x0000000000000000-mapping.dmp
-
memory/5632-800-0x0000000001040000-0x0000000001052000-memory.dmpFilesize
72KB
-
memory/5632-811-0x0000000002850000-0x000000000288E000-memory.dmpFilesize
248KB
-
memory/5632-798-0x00000000054A0000-0x0000000005AA6000-memory.dmpFilesize
6.0MB
-
memory/5632-1058-0x0000000005CB0000-0x0000000005D26000-memory.dmpFilesize
472KB
-
memory/5632-1061-0x0000000005DD0000-0x0000000005E62000-memory.dmpFilesize
584KB
-
memory/5632-1069-0x0000000005DB0000-0x0000000005DCE000-memory.dmpFilesize
120KB
-
memory/5632-802-0x0000000004FA0000-0x00000000050AA000-memory.dmpFilesize
1.0MB
-
memory/5632-749-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/5632-986-0x0000000005120000-0x0000000005186000-memory.dmpFilesize
408KB
-
memory/5632-817-0x00000000028B0000-0x00000000028FB000-memory.dmpFilesize
300KB
-
memory/5632-1120-0x0000000006000000-0x0000000006050000-memory.dmpFilesize
320KB
-
memory/5632-681-0x000000000041ADBE-mapping.dmp
-
memory/5632-1170-0x0000000006F80000-0x00000000074AC000-memory.dmpFilesize
5.2MB
-
memory/5632-1167-0x0000000006880000-0x0000000006A42000-memory.dmpFilesize
1.8MB
-
memory/5696-1072-0x0000000000000000-mapping.dmp
-
memory/5712-835-0x0000000000000000-mapping.dmp
-
memory/5764-836-0x0000000000000000-mapping.dmp
-
memory/5780-971-0x0000000000000000-mapping.dmp
-
memory/5816-978-0x0000000000000000-mapping.dmp
-
memory/5848-2795-0x0000000000000000-mapping.dmp
-
memory/5860-991-0x0000000000402DD8-mapping.dmp
-
memory/5860-1226-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/5860-1037-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/5940-3992-0x0000000000000000-mapping.dmp
-
memory/5956-883-0x0000000000000000-mapping.dmp
-
memory/5968-1250-0x0000000000000000-mapping.dmp
-
memory/5972-1123-0x0000000000000000-mapping.dmp
-
memory/5976-884-0x0000000000000000-mapping.dmp
-
memory/6056-2827-0x0000000000000000-mapping.dmp
-
memory/6060-1345-0x000001948B4B0000-0x000001948B4CB000-memory.dmpFilesize
108KB
-
memory/6060-1691-0x000001948B490000-0x000001948B4B0000-memory.dmpFilesize
128KB
-
memory/6060-1674-0x0000019489AE0000-0x0000019489AFB000-memory.dmpFilesize
108KB
-
memory/6060-1700-0x000001948B4B0000-0x000001948B4CB000-memory.dmpFilesize
108KB
-
memory/6060-1341-0x0000019489AE0000-0x0000019489AFB000-memory.dmpFilesize
108KB
-
memory/6060-1344-0x000001948B490000-0x000001948B4B0000-memory.dmpFilesize
128KB
-
memory/6060-1682-0x000001948C300000-0x000001948C402000-memory.dmpFilesize
1.0MB
-
memory/6060-765-0x00007FF77BF34060-mapping.dmp
-
memory/6060-1091-0x0000019489C70000-0x0000019489CE2000-memory.dmpFilesize
456KB
-
memory/6060-801-0x0000019489C70000-0x0000019489CE2000-memory.dmpFilesize
456KB
-
memory/6060-1343-0x000001948C300000-0x000001948C402000-memory.dmpFilesize
1.0MB
-
memory/6100-891-0x0000000000000000-mapping.dmp
-
memory/6936-5236-0x0000000000000000-mapping.dmp
-
memory/7456-1375-0x0000000000000000-mapping.dmp
-
memory/7468-1376-0x0000000000000000-mapping.dmp
-
memory/7492-1378-0x0000000000000000-mapping.dmp
-
memory/7492-1617-0x0000000000E30000-0x0000000000E50000-memory.dmpFilesize
128KB
-
memory/7528-1381-0x0000000000000000-mapping.dmp
-
memory/7560-1635-0x0000000000AC0000-0x0000000000B04000-memory.dmpFilesize
272KB
-
memory/7560-1386-0x0000000000000000-mapping.dmp
-
memory/7592-1666-0x0000000000E30000-0x0000000000E50000-memory.dmpFilesize
128KB
-
memory/7592-1392-0x0000000000000000-mapping.dmp
-
memory/7624-1398-0x0000000000000000-mapping.dmp
-
memory/7664-1406-0x0000000000000000-mapping.dmp
-
memory/7728-1420-0x0000000000000000-mapping.dmp
-
memory/7784-1429-0x0000000000000000-mapping.dmp
-
memory/7896-5041-0x0000000000000000-mapping.dmp
-
memory/8016-1637-0x0000000000000000-mapping.dmp
-
memory/8064-4219-0x0000000000000000-mapping.dmp
-
memory/8160-5080-0x0000000000000000-mapping.dmp