Analysis
-
max time kernel
160s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-08-2022 07:18
Static task
static1
Behavioral task
behavioral1
Sample
03091132.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03091132.exe
Resource
win10v2004-20220812-en
General
-
Target
03091132.exe
-
Size
68.3MB
-
MD5
d2457793c05186062eb3aa6d7ab0797c
-
SHA1
456b732d643e792e977ba6f440969b5ec5e56b01
-
SHA256
5199f4e0d80f7c7445ddf120ec17f05dd94e3c9293a87024f1ab41a4eb60279d
-
SHA512
bab22acd3a0faddf25d880038ec29242982e1c64dcbd394cd2cc3dbace6f2a39cfe1dc56244c8c18d56e4c9605ae7b19c46dba4fb10862c70e6ab46017412099
-
SSDEEP
1572864:k6pfZnJiBolI39FtdGdLATNInXE2YP/OsGtYBs14K:kg1JdlI3DDGdExuKOsGtY+1X
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 10 IoCs
Processes:
regsvr32.exeregsvr32.exej_filejo_setup.exej_filejo_setup.tmpnatsvc.exesmmgr_setup.exesmmgr_setup.tmpsmmgr.exeFileJoPlayer_setup.exeFileJoPlayer_setup.tmppid process 940 regsvr32.exe 1124 regsvr32.exe 1616 j_filejo_setup.exe 1700 j_filejo_setup.tmp 668 natsvc.exe 1372 smmgr_setup.exe 1852 smmgr_setup.tmp 1600 smmgr.exe 1764 FileJoPlayer_setup.exe 1856 FileJoPlayer_setup.tmp -
Possible privilege escalation attempt 5 IoCs
Processes:
icacls.exetakeown.exeicacls.exeicacls.exeicacls.exepid process 1744 icacls.exe 1604 takeown.exe 1408 icacls.exe 1500 icacls.exe 1644 icacls.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 20 IoCs
Processes:
03091132.exeregsvr32.exeregsvr32.exej_filejo_setup.exej_filejo_setup.tmpsmmgr_setup.exeFileJoPlayer_setup.exepid process 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 940 regsvr32.exe 940 regsvr32.exe 1348 03091132.exe 1348 03091132.exe 1124 regsvr32.exe 1348 03091132.exe 1616 j_filejo_setup.exe 1700 j_filejo_setup.tmp 1348 03091132.exe 1372 smmgr_setup.exe 1348 03091132.exe 1764 FileJoPlayer_setup.exe -
Modifies file permissions 1 TTPs 5 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exetakeown.exepid process 1408 icacls.exe 1500 icacls.exe 1644 icacls.exe 1744 icacls.exe 1604 takeown.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
03091132.exenatsvc.exeFileJoPlayer_setup.tmpj_filejo_setup.tmpsmmgr_setup.tmpdescription ioc process File created C:\Program Files (x86)\FileJo\calMbc.dll 03091132.exe File created C:\Program Files (x86)\NAT Service\libeay32.dll natsvc.exe File created C:\Program Files (x86)\filejo\player\plugins\access\is-NS5V2.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\access\is-0BBPM.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\audio_filter\is-NCAV3.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\demux\is-2I5KU.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\stream_out\is-GLK9O.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\FCvServer.ini 03091132.exe File created C:\Program Files (x86)\FileJo\sffilejo.dll 03091132.exe File created C:\Program Files (x86)\filejo\player\plugins\access_output\is-TNROI.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\audio_filter\is-BASA6.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\TachionLive\ENGS\TYAVP2_003.bin 03091132.exe File created C:\Program Files (x86)\filejo\player\plugins\access\is-N6FO1.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\demux\is-3AMUU.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\stream_out\is-UOSI8.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\ArkZip32.dll 03091132.exe File opened for modification C:\Program Files (x86)\NAT Service\unins000.dat j_filejo_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\audio_filter\is-8V6TQ.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\demux\is-CA0RP.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\demux\is-9QI6R.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\stream_out\is-G9LNB.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\detect.exe 03091132.exe File created C:\Program Files (x86)\FileJo\mfc100.dll 03091132.exe File created C:\Program Files (x86)\filejo\player\is-E69DR.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\codec\is-1VOGU.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\codec\is-HBG8E.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\codec\is-9NSSM.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\codec\is-49MB1.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\codec\is-5FJU7.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\regsvr32.exe 03091132.exe File created C:\Program Files (x86)\filejo\player\plugins\is-RIE5V.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\access\is-E9RDQ.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\codec\is-8RI13.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\keystore\is-B8P88.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\TvClFile.dll 03091132.exe File opened for modification C:\Program Files (x86)\SManager\unins000.dat smmgr_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\audio_filter\is-VOFV1.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\demux\is-T91LH.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\demux\is-A24L2.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\meta_engine\is-69E94.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\stream_out\is-VCEVU.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\video_chroma\is-PQT9A.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\Check.exe 03091132.exe File created C:\Program Files (x86)\FileJo\j_filejo_setup.exe 03091132.exe File created C:\Program Files (x86)\filejo\player\plugins\demux\is-5C4EL.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\stream_out\is-FG8F2.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\adver.ini 03091132.exe File created C:\Program Files (x86)\FileJo\mfc100u.dll 03091132.exe File created C:\Program Files (x86)\FileJo\msvcp100.dll 03091132.exe File created C:\Program Files (x86)\filejo\player\plugins\audio_filter\is-H4HQ4.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\audio_filter\is-VETLB.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\codec\is-TFT64.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\d3d9\is-NVFD6.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\misc\is-G8502.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\packetizer\is-CUDN4.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\services_discovery\is-UHL6D.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\spu\is-20LP5.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\spu\is-9D158.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\spu\is-8R0BI.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\stream_filter\is-SA9CL.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\filejo\player\plugins\stream_out\is-CO1TO.tmp FileJoPlayer_setup.tmp File created C:\Program Files (x86)\FileJo\MediaInfo.dll 03091132.exe File created C:\Program Files (x86)\NAT Service\ssleay32.dll natsvc.exe File created C:\Program Files (x86)\filejo\player\plugins\audio_filter\is-Q6U08.tmp FileJoPlayer_setup.tmp -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exepid process 728 sc.exe 780 sc.exe 1816 sc.exe 1656 sc.exe 1180 sc.exe 1220 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2016 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 2016 taskkill.exe 1012 taskkill.exe -
Processes:
03091132.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 03091132.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" 03091132.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
03091132.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.FileJo.com" 03091132.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exe03091132.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\AppID = "{FCF9C839-34AD-499C-A9CE-CE4226E66EE9}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS\CLSID\ = "{8FE97D14-B9D4-427f-884B-EA27E858010E}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427F-884B-EA27E858010E}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427F-884B-EA27E858010E}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8402234F-5087-47FE-AC06-6255D78E2675} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FCF9C839-34AD-499C-A9CE-CE4226E66EE9}\ = "FileJoControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FCF9C839-34AD-499C-A9CE-CE4226E66EE9}\DllSurrogate regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\LocalizedString = "@C:\\Program Files (x86)\\FileJo\\FileJoControl.dll,-101" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Filejo\shell\open\command 03091132.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Filejo 03091132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\ = "IWebBBS" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.fjo\ = "Filejo" 03091132.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\MiscStatus\1\ = "131473" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8402234F-5087-47FE-AC06-6255D78E2675}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\TypeLib\ = "{8402234F-5087-47FE-AC06-6255D78E2675}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\TypeLib\ = "{8402234F-5087-47FE-AC06-6255D78E2675}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Filejo\DefaultIcon\ = "C:\\Program Files (x86)\\FileJo\\FileJo.ico" 03091132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\ = "FileJo Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8402234F-5087-47FE-AC06-6255D78E2675}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS.1\ = "FileJo Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS.1\CLSID\ = "{8FE97D14-B9D4-427f-884B-EA27E858010E}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\VersionIndependentProgID\ = "FileJoControl.WebBBS" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\ProgID\ = "FileJoControl.WebBBS.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8402234F-5087-47FE-AC06-6255D78E2675}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fjo 03091132.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Filejo\shell\open 03091132.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\TypeLib\ = "{8402234F-5087-47FE-AC06-6255D78E2675}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8402234F-5087-47FE-AC06-6255D78E2675}\1.0\ = "WebControl 1.0 Çü½Ä ¶óÀ̺귯¸®" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8402234F-5087-47FE-AC06-6255D78E2675}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8402234F-5087-47FE-AC06-6255D78E2675}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS\CurVer\ = "FileJo.WebBBS.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{53479A23-C3FE-4A1F-AA82-8FB1F9ED4CF4}\ = "_IWebBBSEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\ = "IWebBBS" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5EF6DEFB-23A6-49FC-AA08-D0A64BEE9670}\TypeLib\ = "{8402234F-5087-47FE-AC06-6255D78E2675}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\FileJoControl.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FileJoControl.WebBBS\ = "FileJo Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427f-884B-EA27E858010E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8FE97D14-B9D4-427F-884B-EA27E858010E} regsvr32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
03091132.exej_filejo_setup.tmpsmmgr_setup.tmppid process 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 1348 03091132.exe 1700 j_filejo_setup.tmp 1700 j_filejo_setup.tmp 1852 smmgr_setup.tmp 1852 smmgr_setup.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 924 WMIC.exe Token: SeSecurityPrivilege 924 WMIC.exe Token: SeTakeOwnershipPrivilege 924 WMIC.exe Token: SeLoadDriverPrivilege 924 WMIC.exe Token: SeSystemProfilePrivilege 924 WMIC.exe Token: SeSystemtimePrivilege 924 WMIC.exe Token: SeProfSingleProcessPrivilege 924 WMIC.exe Token: SeIncBasePriorityPrivilege 924 WMIC.exe Token: SeCreatePagefilePrivilege 924 WMIC.exe Token: SeBackupPrivilege 924 WMIC.exe Token: SeRestorePrivilege 924 WMIC.exe Token: SeShutdownPrivilege 924 WMIC.exe Token: SeDebugPrivilege 924 WMIC.exe Token: SeSystemEnvironmentPrivilege 924 WMIC.exe Token: SeRemoteShutdownPrivilege 924 WMIC.exe Token: SeUndockPrivilege 924 WMIC.exe Token: SeManageVolumePrivilege 924 WMIC.exe Token: 33 924 WMIC.exe Token: 34 924 WMIC.exe Token: 35 924 WMIC.exe Token: SeIncreaseQuotaPrivilege 924 WMIC.exe Token: SeSecurityPrivilege 924 WMIC.exe Token: SeTakeOwnershipPrivilege 924 WMIC.exe Token: SeLoadDriverPrivilege 924 WMIC.exe Token: SeSystemProfilePrivilege 924 WMIC.exe Token: SeSystemtimePrivilege 924 WMIC.exe Token: SeProfSingleProcessPrivilege 924 WMIC.exe Token: SeIncBasePriorityPrivilege 924 WMIC.exe Token: SeCreatePagefilePrivilege 924 WMIC.exe Token: SeBackupPrivilege 924 WMIC.exe Token: SeRestorePrivilege 924 WMIC.exe Token: SeShutdownPrivilege 924 WMIC.exe Token: SeDebugPrivilege 924 WMIC.exe Token: SeSystemEnvironmentPrivilege 924 WMIC.exe Token: SeRemoteShutdownPrivilege 924 WMIC.exe Token: SeUndockPrivilege 924 WMIC.exe Token: SeManageVolumePrivilege 924 WMIC.exe Token: 33 924 WMIC.exe Token: 34 924 WMIC.exe Token: 35 924 WMIC.exe Token: SeIncreaseQuotaPrivilege 752 WMIC.exe Token: SeSecurityPrivilege 752 WMIC.exe Token: SeTakeOwnershipPrivilege 752 WMIC.exe Token: SeLoadDriverPrivilege 752 WMIC.exe Token: SeSystemProfilePrivilege 752 WMIC.exe Token: SeSystemtimePrivilege 752 WMIC.exe Token: SeProfSingleProcessPrivilege 752 WMIC.exe Token: SeIncBasePriorityPrivilege 752 WMIC.exe Token: SeCreatePagefilePrivilege 752 WMIC.exe Token: SeBackupPrivilege 752 WMIC.exe Token: SeRestorePrivilege 752 WMIC.exe Token: SeShutdownPrivilege 752 WMIC.exe Token: SeDebugPrivilege 752 WMIC.exe Token: SeSystemEnvironmentPrivilege 752 WMIC.exe Token: SeRemoteShutdownPrivilege 752 WMIC.exe Token: SeUndockPrivilege 752 WMIC.exe Token: SeManageVolumePrivilege 752 WMIC.exe Token: 33 752 WMIC.exe Token: 34 752 WMIC.exe Token: 35 752 WMIC.exe Token: SeIncreaseQuotaPrivilege 752 WMIC.exe Token: SeSecurityPrivilege 752 WMIC.exe Token: SeTakeOwnershipPrivilege 752 WMIC.exe Token: SeLoadDriverPrivilege 752 WMIC.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
j_filejo_setup.tmpsmmgr_setup.tmpFileJoPlayer_setup.tmppid process 1700 j_filejo_setup.tmp 1852 smmgr_setup.tmp 1856 FileJoPlayer_setup.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
03091132.exej_filejo_setup.exej_filejo_setup.tmpcmd.execmd.exedescription pid process target process PID 1348 wrote to memory of 728 1348 03091132.exe sc.exe PID 1348 wrote to memory of 728 1348 03091132.exe sc.exe PID 1348 wrote to memory of 728 1348 03091132.exe sc.exe PID 1348 wrote to memory of 728 1348 03091132.exe sc.exe PID 1348 wrote to memory of 780 1348 03091132.exe sc.exe PID 1348 wrote to memory of 780 1348 03091132.exe sc.exe PID 1348 wrote to memory of 780 1348 03091132.exe sc.exe PID 1348 wrote to memory of 780 1348 03091132.exe sc.exe PID 1348 wrote to memory of 940 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 940 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 940 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 940 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 940 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 940 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 940 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1124 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1124 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1124 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1124 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1124 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1124 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1124 1348 03091132.exe regsvr32.exe PID 1348 wrote to memory of 1616 1348 03091132.exe j_filejo_setup.exe PID 1348 wrote to memory of 1616 1348 03091132.exe j_filejo_setup.exe PID 1348 wrote to memory of 1616 1348 03091132.exe j_filejo_setup.exe PID 1348 wrote to memory of 1616 1348 03091132.exe j_filejo_setup.exe PID 1348 wrote to memory of 1616 1348 03091132.exe j_filejo_setup.exe PID 1348 wrote to memory of 1616 1348 03091132.exe j_filejo_setup.exe PID 1348 wrote to memory of 1616 1348 03091132.exe j_filejo_setup.exe PID 1616 wrote to memory of 1700 1616 j_filejo_setup.exe j_filejo_setup.tmp PID 1616 wrote to memory of 1700 1616 j_filejo_setup.exe j_filejo_setup.tmp PID 1616 wrote to memory of 1700 1616 j_filejo_setup.exe j_filejo_setup.tmp PID 1616 wrote to memory of 1700 1616 j_filejo_setup.exe j_filejo_setup.tmp PID 1616 wrote to memory of 1700 1616 j_filejo_setup.exe j_filejo_setup.tmp PID 1616 wrote to memory of 1700 1616 j_filejo_setup.exe j_filejo_setup.tmp PID 1616 wrote to memory of 1700 1616 j_filejo_setup.exe j_filejo_setup.tmp PID 1700 wrote to memory of 812 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 812 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 812 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 812 1700 j_filejo_setup.tmp cmd.exe PID 812 wrote to memory of 1604 812 cmd.exe takeown.exe PID 812 wrote to memory of 1604 812 cmd.exe takeown.exe PID 812 wrote to memory of 1604 812 cmd.exe takeown.exe PID 812 wrote to memory of 1604 812 cmd.exe takeown.exe PID 812 wrote to memory of 1408 812 cmd.exe icacls.exe PID 812 wrote to memory of 1408 812 cmd.exe icacls.exe PID 812 wrote to memory of 1408 812 cmd.exe icacls.exe PID 812 wrote to memory of 1408 812 cmd.exe icacls.exe PID 812 wrote to memory of 1500 812 cmd.exe icacls.exe PID 812 wrote to memory of 1500 812 cmd.exe icacls.exe PID 812 wrote to memory of 1500 812 cmd.exe icacls.exe PID 812 wrote to memory of 1500 812 cmd.exe icacls.exe PID 1700 wrote to memory of 1288 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 1288 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 1288 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 1288 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 1096 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 1096 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 1096 1700 j_filejo_setup.tmp cmd.exe PID 1700 wrote to memory of 1096 1700 j_filejo_setup.tmp cmd.exe PID 1096 wrote to memory of 2016 1096 cmd.exe timeout.exe PID 1096 wrote to memory of 2016 1096 cmd.exe timeout.exe PID 1096 wrote to memory of 2016 1096 cmd.exe timeout.exe PID 1096 wrote to memory of 2016 1096 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03091132.exe"C:\Users\Admin\AppData\Local\Temp\03091132.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop FileJoSvc2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc delete FileJoSvc2⤵
- Launches sc.exe
-
C:\Program Files (x86)\FileJo\regsvr32.exe"C:\Program Files (x86)\FileJo\regsvr32.exe" "C:\Program Files (x86)\FileJo\FileJoControl.dll" /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\FileJo\regsvr32.exe"C:\Program Files (x86)\FileJo\regsvr32.exe" "C:\Program Files (x86)\FileJo\..\..\BUILD\FileJo\Temp\FileJo64.dll" /s2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\FileJo\j_filejo_setup.exe"C:\Program Files (x86)\FileJo\j_filejo_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-E7VLL.tmp\j_filejo_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-E7VLL.tmp\j_filejo_setup.tmp" /SL5="$60178,1675564,57856,C:\Program Files (x86)\FileJo\j_filejo_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\bd2364a24e81faa27fcf3cb751ec88c7.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Program Files (x86)\NAT Service" /R /D Y5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\NAT Service" /reset /T5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\NAT Service" /grant Admin:F /T5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\81a36b72819aaf7716ae86f15e7da157.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\d3d1b7ee9ec5673763d3d70974b6bde9.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\5447c5fe3b877d7ada35dcf3a72597e5.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\5447c5fe3b877d7ada35dcf3a72597e5.bat" "4⤵
-
C:\Windows\SysWOW64\sc.exesc start NATService5⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" create NATService start= auto binPath= "\"C:\Program Files (x86)\NAT Service\natsvc.exe\""4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" start NATService4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic service NATService get state | more> C:\Users\Admin\AppData\Local\Temp\is-K8CF8.tmp\temp_cmd_result.txt4⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic service NATService get state5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\more.commore5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic service NATService get PathName | more> C:\Users\Admin\AppData\Local\Temp\is-K8CF8.tmp\temp_cmd_result.txt4⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic service NATService get PathName5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\more.commore5⤵
-
C:\Program Files (x86)\FileJo\smmgr_setup.exe"C:\Program Files (x86)\FileJo\smmgr_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-RS4O7.tmp\smmgr_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-RS4O7.tmp\smmgr_setup.tmp" /SL5="$70178,763801,58368,C:\Program Files (x86)\FileJo\smmgr_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\Program Files (x86)\SManager\smmgr.exe" /grant Administrators:(OI)(CI)F /T4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\Program Files (x86)\SManager\sm.cnf" /grant Administrators:(OI)(CI)F /T4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c taskkill /f /im smmgr.exe4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im smmgr.exe5⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im smmgr.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c sc.exe create SmMgrDaemon binPath= "C:\Program Files (x86)\SManager\smmgr.exe" start= auto4⤵
-
C:\Windows\SysWOW64\sc.exesc.exe create SmMgrDaemon binPath= "C:\Program Files (x86)\SManager\smmgr.exe" start= auto5⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c net start SmMgrDaemon4⤵
-
C:\Windows\SysWOW64\net.exenet start SmMgrDaemon5⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SmMgrDaemon6⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c4⤵
-
C:\Program Files (x86)\FileJo\FileJoPlayer_setup.exe"C:\Program Files (x86)\FileJo\FileJoPlayer_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-V0922.tmp\FileJoPlayer_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-V0922.tmp\FileJoPlayer_setup.tmp" /SL5="$80178,35900036,58368,C:\Program Files (x86)\FileJo\FileJoPlayer_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\NAT Service\natsvc.exe"C:\Program Files (x86)\NAT Service\natsvc.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\SManager\smmgr.exe"C:\Program Files (x86)\SManager\smmgr.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\FileJo\FileJoControl.dllFilesize
2.1MB
MD52d1acdc1f8394e01693fd08028e21aba
SHA1f25010f7d939be4c0eb24403733fa2d5a23cef86
SHA256117865a6bd89f0200a496de3daf86226235a3a45c91837b3e3fe5bcf4fbecfa0
SHA512c377f71454ee8cd696485e9e7a2c26133d595c704bef713d26316656279f9d1ed7149fd3ff8bf26cd80d523fee689e2b73a07bbd18ff236d3ee4ff226f03f086
-
C:\Program Files (x86)\FileJo\FileJoPlayer_setup.exeFilesize
34.5MB
MD5bd884a0754b2044a3a19cd7c959950a0
SHA1216f0fe5273ca36bceda278311ec959afa8c3b43
SHA256cf5bc40388d710f1731f3f72ce1421596c12d8ebe5e815d1dda94d46d448a907
SHA512fd8f517709cdb92d4147ed85652f937caa948c33dabd6f43d997157ca55fdb89ce8ed23ac8f0ba947368f2c7f66cbfef3319403a27f4447ae2d4c8664b0db77d
-
C:\Program Files (x86)\FileJo\FileJoPlayer_setup.exeFilesize
34.5MB
MD5bd884a0754b2044a3a19cd7c959950a0
SHA1216f0fe5273ca36bceda278311ec959afa8c3b43
SHA256cf5bc40388d710f1731f3f72ce1421596c12d8ebe5e815d1dda94d46d448a907
SHA512fd8f517709cdb92d4147ed85652f937caa948c33dabd6f43d997157ca55fdb89ce8ed23ac8f0ba947368f2c7f66cbfef3319403a27f4447ae2d4c8664b0db77d
-
C:\Program Files (x86)\FileJo\j_filejo_setup.exeFilesize
1.8MB
MD54bce83f0e6b532b23f922a8b08b92320
SHA13faa7ef49a54cafd280aaeac8fdf41171aaa5747
SHA256e8e7ba538dc5ca0dffdf3764abca71508b2878044da73b4595e6e4634841d9bb
SHA51233abf52c133bf12d2bef417fbb624cdd966e6c80573b001c9da5bba51530a6839e6258c8d4a662966a52ddeb98d5827592478ad2f07475bc12d82611424c2aeb
-
C:\Program Files (x86)\FileJo\j_filejo_setup.exeFilesize
1.8MB
MD54bce83f0e6b532b23f922a8b08b92320
SHA13faa7ef49a54cafd280aaeac8fdf41171aaa5747
SHA256e8e7ba538dc5ca0dffdf3764abca71508b2878044da73b4595e6e4634841d9bb
SHA51233abf52c133bf12d2bef417fbb624cdd966e6c80573b001c9da5bba51530a6839e6258c8d4a662966a52ddeb98d5827592478ad2f07475bc12d82611424c2aeb
-
C:\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
C:\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
C:\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
C:\Program Files (x86)\FileJo\smmgr_setup.exeFilesize
996KB
MD5409255e1571810494132733ff18bac85
SHA17fec32e1f212e31f4eba5c7aa165909c10a63438
SHA256b1d2b8b52aea94ca53f48f56fcaa0aa96a9b29c97f24cc1721904e3dffed7f93
SHA512b3f2f02066cfd15090b48dc573e0f9c3d61c1bf73db98b697bf6128b0122baace470cf17054c7c63b397bcfbd2d63550b65f475e404bf05b9f7e212f6facf04a
-
C:\Program Files (x86)\FileJo\smmgr_setup.exeFilesize
996KB
MD5409255e1571810494132733ff18bac85
SHA17fec32e1f212e31f4eba5c7aa165909c10a63438
SHA256b1d2b8b52aea94ca53f48f56fcaa0aa96a9b29c97f24cc1721904e3dffed7f93
SHA512b3f2f02066cfd15090b48dc573e0f9c3d61c1bf73db98b697bf6128b0122baace470cf17054c7c63b397bcfbd2d63550b65f475e404bf05b9f7e212f6facf04a
-
C:\Program Files (x86)\NAT Service\natsvc.exeFilesize
4.4MB
MD539dc5d4f2ebbedfc73b9f8fbbfd63653
SHA17d160d580364eb9553c1dbdd28ee2ea9e572fefd
SHA256e5ad1ba4458e6ad759c53dc292636af66774bb8487eb3859c42fb5816fd978a5
SHA512ae5ebc04aa7f17913f7fa51bb8829015838f3ca4e2e103570f495efd4761de8cb4e53987a0b2190d639e550a1b9cd588edb136c89bb1d12b329f55fe90c96584
-
C:\Program Files (x86)\SManager\smmgr.exeFilesize
2.3MB
MD570517332e2fee9209a1f3ca2d03c0e5c
SHA174fdc4a444ef5383d0497967127fd85e4706f736
SHA256250e229051ce2f9167a7019a43efe54b828038357c0732f5dd8279199667085e
SHA512b93ea71011a0b51eef52ef10a281835417d7aef38a959942bed680fb78c4a7d24d797f5037d80801a9bf11073224a8f8bb53bd297dd8d84c5a9dad9046c97361
-
C:\Users\Admin\AppData\Local\Temp\is-E7VLL.tmp\j_filejo_setup.tmpFilesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49
-
C:\Users\Admin\AppData\Local\Temp\is-E7VLL.tmp\j_filejo_setup.tmpFilesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49
-
C:\Users\Admin\AppData\Local\Temp\is-K8CF8.tmp\temp_cmd_result.txtFilesize
29B
MD5e10468f29ada02cfdf46c43eb08f9184
SHA157e187278e35eb37407e53e372efae9f613dab01
SHA256f7aedcb8d1ba35408e27d6ea406a266a091b2556abf04f9c1618879bb8ae5693
SHA512e976c43c08da601b0dd91bfad2f5634f2adce0edbd1eaffda7b191e2e74691c274dd6de95ffdaf3c63c5319c617a76adb9ed8794346f1e5d92a01a2d2b7ddc0b
-
C:\Users\Admin\AppData\Local\Temp\is-K8CF8.tmp\temp_cmd_result.txtFilesize
109B
MD5fecee4ec4769dbc908b7f506e8d35e82
SHA1558e27aaf941092f852aaeaec03059abf814ce21
SHA256d4ff7b03fd9fb4a201efb69519abc26d77520c1d2fe18ecc5ae23ffff32ddaef
SHA512c19e42a0c9eb1f463496853e79765a75d792d5b284faf88d1817f25ae474f0c86341c64b6d1b36048f8dcada78b83ad8ebec6921f1ce6660a074d585bde106ee
-
C:\Users\Admin\AppData\Local\Temp\is-RS4O7.tmp\smmgr_setup.tmpFilesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419
-
C:\Users\Admin\AppData\Local\Temp\is-RS4O7.tmp\smmgr_setup.tmpFilesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419
-
C:\Users\Admin\AppData\Local\Temp\is-V0922.tmp\FileJoPlayer_setup.tmpFilesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419
-
C:\Users\Admin\AppData\Local\Temp\is-V0922.tmp\FileJoPlayer_setup.tmpFilesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419
-
C:\Users\Admin\AppData\Roaming\5447c5fe3b877d7ada35dcf3a72597e5.batFilesize
62B
MD5d2189475ad941d2a2578e553143ebe73
SHA194b3c3829a5d0a489fda8b1453436104ca3f3ba9
SHA2566da8e271ed5e2a0fc0947857bc1391efd2718082d0150023fd462c849c07fa0e
SHA512b12506c0f514dcab72ace03a7b9822c192415a87b9196fbb85dbda7ae680a39c47f1f332c593888d088fe7482a6ed5a0a5c5b3700d6025c61a2afa432d08cf91
-
C:\Users\Admin\AppData\Roaming\5447c5fe3b877d7ada35dcf3a72597e5.batFilesize
21B
MD527ac015a9f8af8ccef64d955d21d1174
SHA1004c2bb22540c544f042640e41d8d8305c429849
SHA2568a278c1ea22969857fe614bb5bcdd3edfc085b40f60d0d5c198e22e229a86771
SHA51242b3af5a8441b2e548e7243012d3e707e58e74e17a7dfca67493df8ef69a92ce2a5f33dac048812ee76b72d24f97115d3f188053562ee0abb055e6d6bc52cc9e
-
C:\Users\Admin\AppData\Roaming\81a36b72819aaf7716ae86f15e7da157.batFilesize
105B
MD5ee905332eb5d4b7c0300411614af8f95
SHA1395357b2e5f5866d989ca63c1169a6103fd33734
SHA2566ff79a4240ce92aa6b94241e39da3b43c1effd68f1d2760229628aa4217f7c70
SHA5126478168b740c657369fd056c2d05dcc0665873604bd7de2fbb4b8e4f017cf866243e04b482633d995d5c82a65b6448ee64f7efdef38222ceecbe933a880f5503
-
C:\Users\Admin\AppData\Roaming\bd2364a24e81faa27fcf3cb751ec88c7.batFilesize
180B
MD5c694b6cca9500262bf41e4956a516fd9
SHA1b47909bb9d7e4f0d41dd5dc7a956ff3ba427430f
SHA2569e7588f8d30fdfbc23ce1bf48a6cf81e0d914cb200e0191c78a3f62b960cd467
SHA512475bbc55c10af39e078786c3e7ed5b993e6705f52d160038c03ffde4953f16efcd0391cfbd74453a9185dec3fbdc9a9997520e2890d67e31ee21c11de44a75bd
-
C:\Users\Admin\AppData\Roaming\d3d1b7ee9ec5673763d3d70974b6bde9.batFilesize
11B
MD5db4ab8278cc5bacf4c54f658cb5613c0
SHA1ba6ee96f2e5b876c3ca7ec35c880fca532b635e0
SHA2569a180fff0ba28ef0972d09e89e40096e51038ea5a0089e3417d78dfff720566f
SHA512167ae29061ad0b21653eadadca0e467d5e262f07961578ae45a74fe40de6833ec02bc1e5b7232fbaa8dc610b9943f306d1d391500cbf239c3c847c254e2212ab
-
\Program Files (x86)\FileJo\FileJoControl.dllFilesize
2.1MB
MD52d1acdc1f8394e01693fd08028e21aba
SHA1f25010f7d939be4c0eb24403733fa2d5a23cef86
SHA256117865a6bd89f0200a496de3daf86226235a3a45c91837b3e3fe5bcf4fbecfa0
SHA512c377f71454ee8cd696485e9e7a2c26133d595c704bef713d26316656279f9d1ed7149fd3ff8bf26cd80d523fee689e2b73a07bbd18ff236d3ee4ff226f03f086
-
\Program Files (x86)\FileJo\FileJoPlayer_setup.exeFilesize
34.5MB
MD5bd884a0754b2044a3a19cd7c959950a0
SHA1216f0fe5273ca36bceda278311ec959afa8c3b43
SHA256cf5bc40388d710f1731f3f72ce1421596c12d8ebe5e815d1dda94d46d448a907
SHA512fd8f517709cdb92d4147ed85652f937caa948c33dabd6f43d997157ca55fdb89ce8ed23ac8f0ba947368f2c7f66cbfef3319403a27f4447ae2d4c8664b0db77d
-
\Program Files (x86)\FileJo\j_filejo_setup.exeFilesize
1.8MB
MD54bce83f0e6b532b23f922a8b08b92320
SHA13faa7ef49a54cafd280aaeac8fdf41171aaa5747
SHA256e8e7ba538dc5ca0dffdf3764abca71508b2878044da73b4595e6e4634841d9bb
SHA51233abf52c133bf12d2bef417fbb624cdd966e6c80573b001c9da5bba51530a6839e6258c8d4a662966a52ddeb98d5827592478ad2f07475bc12d82611424c2aeb
-
\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
\Program Files (x86)\FileJo\regsvr32.exeFilesize
13KB
MD5b34c14e51281dc05c19740556ac2b0bc
SHA10216d1d82452b752ae7594ab8a2921ec2dc01659
SHA2566d7bcff6bf116b76dd41ce06342c5f1bc50d332f03e0fc39e3a09f6d7a158a9b
SHA51226c79a36f43a602c1a22cd8a35d98298c9ed3667595919044c59f40c38b8a25835a1a2efef57f8d7ec38a4961bfd2d52b909b7f50a83a4a5ab4738efd9c60d13
-
\Program Files (x86)\FileJo\smmgr_setup.exeFilesize
996KB
MD5409255e1571810494132733ff18bac85
SHA17fec32e1f212e31f4eba5c7aa165909c10a63438
SHA256b1d2b8b52aea94ca53f48f56fcaa0aa96a9b29c97f24cc1721904e3dffed7f93
SHA512b3f2f02066cfd15090b48dc573e0f9c3d61c1bf73db98b697bf6128b0122baace470cf17054c7c63b397bcfbd2d63550b65f475e404bf05b9f7e212f6facf04a
-
\Users\Admin\AppData\Local\Temp\is-E7VLL.tmp\j_filejo_setup.tmpFilesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49
-
\Users\Admin\AppData\Local\Temp\is-K8CF8.tmp\insproc.dllFilesize
1.0MB
MD5be15b33cf62c3c7cee0abc8aa4c85048
SHA13371b48ac7625f9310dcb499027e013fd0a50546
SHA2563069e91d1dba8e76416cc9a6281275c7a7275c96d6d9ff8f0cf7a9b5c8ea4e47
SHA51257ee30c8458c78b3284333b7ef2bf32c40fdbf1c092f94a6f053f84b1ce578e277cd0176922a986283eba413db9f917e89207317fe8e98f212a648f0e906db1a
-
\Users\Admin\AppData\Local\Temp\is-RS4O7.tmp\smmgr_setup.tmpFilesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419
-
\Users\Admin\AppData\Local\Temp\is-V0922.tmp\FileJoPlayer_setup.tmpFilesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419
-
\Users\Admin\AppData\Local\Temp\nsyC16E.tmp\FindProcDLL.dllFilesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
\Users\Admin\AppData\Local\Temp\nsyC16E.tmp\KillProcDLL.dllFilesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
\Users\Admin\AppData\Local\Temp\nsyC16E.tmp\KillProcDLL.dllFilesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
\Users\Admin\AppData\Local\Temp\nsyC16E.tmp\KillProcDLL.dllFilesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
\Users\Admin\AppData\Local\Temp\nsyC16E.tmp\nsProcess.dllFilesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
\Users\Admin\AppData\Local\Temp\nsyC16E.tmp\termsDialog.dllFilesize
12KB
MD5e4fc52619a2c96a2e3340e778d44d034
SHA19d67a65b807439e4192649e3873371f138d403e4
SHA25678aa52e6c1df91d9a5466c457d50321a446644f0e4dab6648ced9d8eb9a7bbc7
SHA51224023e46665e344c6cbe580196ce29c7171c823279e26e1a3bea0c95ed879c810a8926bf2c1bc70b060a340cbe892546c674398915fff5236452b485252d2d8f
-
memory/316-136-0x0000000000000000-mapping.dmp
-
memory/468-119-0x0000000000000000-mapping.dmp
-
memory/520-113-0x0000000000000000-mapping.dmp
-
memory/672-115-0x0000000000000000-mapping.dmp
-
memory/728-58-0x0000000000000000-mapping.dmp
-
memory/752-118-0x0000000000000000-mapping.dmp
-
memory/780-59-0x0000000000000000-mapping.dmp
-
memory/812-92-0x0000000000000000-mapping.dmp
-
memory/848-148-0x0000000000000000-mapping.dmp
-
memory/924-114-0x0000000000000000-mapping.dmp
-
memory/940-65-0x0000000000000000-mapping.dmp
-
memory/1012-138-0x0000000000000000-mapping.dmp
-
memory/1096-101-0x0000000000000000-mapping.dmp
-
memory/1124-74-0x0000000000000000-mapping.dmp
-
memory/1180-110-0x0000000000000000-mapping.dmp
-
memory/1220-142-0x0000000000000000-mapping.dmp
-
memory/1268-144-0x0000000000000000-mapping.dmp
-
memory/1272-145-0x0000000000000000-mapping.dmp
-
memory/1288-97-0x0000000000000000-mapping.dmp
-
memory/1316-141-0x0000000000000000-mapping.dmp
-
memory/1316-106-0x0000000000000000-mapping.dmp
-
memory/1348-54-0x0000000074F41000-0x0000000074F43000-memory.dmpFilesize
8KB
-
memory/1368-143-0x0000000000000000-mapping.dmp
-
memory/1372-149-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1372-135-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1372-126-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1372-123-0x0000000000000000-mapping.dmp
-
memory/1408-95-0x0000000000000000-mapping.dmp
-
memory/1500-96-0x0000000000000000-mapping.dmp
-
memory/1604-94-0x0000000000000000-mapping.dmp
-
memory/1612-117-0x0000000000000000-mapping.dmp
-
memory/1616-79-0x0000000000000000-mapping.dmp
-
memory/1616-82-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1616-121-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1616-89-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1644-133-0x0000000000000000-mapping.dmp
-
memory/1656-109-0x0000000000000000-mapping.dmp
-
memory/1700-99-0x00000000744C1000-0x00000000744C3000-memory.dmpFilesize
8KB
-
memory/1700-86-0x0000000000000000-mapping.dmp
-
memory/1744-134-0x0000000000000000-mapping.dmp
-
memory/1748-104-0x0000000000000000-mapping.dmp
-
memory/1764-151-0x0000000000000000-mapping.dmp
-
memory/1764-154-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1764-157-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1816-108-0x0000000000000000-mapping.dmp
-
memory/1852-139-0x0000000074471000-0x0000000074473000-memory.dmpFilesize
8KB
-
memory/1852-130-0x0000000000000000-mapping.dmp
-
memory/1856-159-0x0000000000000000-mapping.dmp
-
memory/1856-162-0x00000000744D1000-0x00000000744D3000-memory.dmpFilesize
8KB
-
memory/2016-103-0x0000000000000000-mapping.dmp
-
memory/2016-137-0x0000000000000000-mapping.dmp