Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe
Resource
win10v2004-20220812-en
General
-
Target
27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe
-
Size
2.5MB
-
MD5
3e04b8ba6cbccb22f3a1cbb98b092990
-
SHA1
ce6176c44798b5104f87c8f37330041f7911b97f
-
SHA256
27425ab21814acdc92665957ce92f326a46ea99131ef32df83ccaeaaa5228c20
-
SHA512
8c1c8ac110c9aa43412d5569e20239704c53268b33ba88b74f8d85f00dc07fb8291d85937bcfe2459e0f54a1bbbde2f966057aff34a012a77350d86bb7c5641f
-
SSDEEP
49152:EggBDSuw1VkMpraG6d23GG49DSP4FDHhJaO69QGnMg4PPqZi5r:JxVVjsd2Z/AlNq9MgcPH5r
Malware Config
Extracted
nullmixer
http://sokiran.xyz/
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Extracted
nymaim
208.67.104.97
85.31.46.167
Extracted
vidar
54.9
1679
https://t.me/larsenup
https://ioc.exchange/@zebra54
-
profile_id
1679
Extracted
raccoon
f65d012b021e6e8fcaa9c1a04b6d5107
http://64.44.102.241
http://64.44.102.116
Signatures
-
DcRat 3 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe5F22.exeschtasks.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\29eca203-3b0d-4a60-9b01-9e4b451ef678\\5F22.exe\" --AutoStart" 5F22.exe 4020 schtasks.exe -
Detects Smokeloader packer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2164-208-0x0000000000A20000-0x0000000000A29000-memory.dmp family_smokeloader behavioral2/memory/4192-271-0x00000000006B0000-0x00000000006B9000-memory.dmp family_smokeloader -
Processes:
sonia_6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sonia_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sonia_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sonia_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sonia_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" sonia_6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection sonia_6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sonia_6.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 1732 rUNdlL32.eXe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 1732 rundll32.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
MWendDapqHOZc3rw922StliA.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MWendDapqHOZc3rw922StliA.exe -
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3748-211-0x0000000002530000-0x00000000025CD000-memory.dmp family_vidar behavioral2/memory/3748-219-0x0000000000400000-0x0000000000A00000-memory.dmp family_vidar behavioral2/memory/3748-222-0x0000000002530000-0x00000000025CD000-memory.dmp family_vidar behavioral2/memory/3748-224-0x0000000000400000-0x0000000000A00000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS41488986\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS41488986\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS41488986\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS41488986\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurl.dll aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 31 IoCs
Processes:
setup_installer.exesetup_install.exesonia_1.exesonia_2.exesonia_1.exesonia_6.exesonia_3.exesonia_5.exesonia_4.exesonia_7.exeyAmHiinfk87qmj1zSSi5kxS9.exe9QzFWE_pem83FBeI7vQsnsFU.exeuJZS7zpTOdtevWirz9JQX_W8.exeNi8ZzArnA9_TP4qNbOVAiiEk.exefic68gnDkH3ni2WUDFie5TwN.exeXrJjgyXOrk_4Hpw7aoHKbbY0.exeOj11E2bcEzztHsAAaBJ_ycix.exemQdMiBTPOobi_BuHy8FCwY8K.exeF_Qw445qjIdhSD0Y3IBsfhaQ.exeegfSGYPgyplSLrwbrV3u6a8Y.exejlag7WZ7N4ujo9KwZyPuZMP0.exeInstall.exeMWendDapqHOZc3rw922StliA.exeYHucwUKxtMoV0ytDNX7BK_kO.exeSETUP_~1.EXEInstall.exemQdMiBTPOobi_BuHy8FCwY8K.exe5F22.exe5F22.exe6AAD.exe8338.exepid process 1044 setup_installer.exe 1228 setup_install.exe 1584 sonia_1.exe 2164 sonia_2.exe 216 sonia_1.exe 5096 sonia_6.exe 3748 sonia_3.exe 1176 sonia_5.exe 1864 sonia_4.exe 4768 sonia_7.exe 1096 yAmHiinfk87qmj1zSSi5kxS9.exe 4296 9QzFWE_pem83FBeI7vQsnsFU.exe 4192 uJZS7zpTOdtevWirz9JQX_W8.exe 3396 Ni8ZzArnA9_TP4qNbOVAiiEk.exe 2132 fic68gnDkH3ni2WUDFie5TwN.exe 3868 XrJjgyXOrk_4Hpw7aoHKbbY0.exe 4500 Oj11E2bcEzztHsAAaBJ_ycix.exe 1408 mQdMiBTPOobi_BuHy8FCwY8K.exe 4748 F_Qw445qjIdhSD0Y3IBsfhaQ.exe 4584 egfSGYPgyplSLrwbrV3u6a8Y.exe 440 jlag7WZ7N4ujo9KwZyPuZMP0.exe 3888 Install.exe 364 MWendDapqHOZc3rw922StliA.exe 2304 YHucwUKxtMoV0ytDNX7BK_kO.exe 972 SETUP_~1.EXE 3748 Install.exe 4956 mQdMiBTPOobi_BuHy8FCwY8K.exe 3292 5F22.exe 2112 5F22.exe 1568 6AAD.exe 2000 8338.exe -
Processes:
resource yara_rule C:\Users\Admin\Documents\Oj11E2bcEzztHsAAaBJ_ycix.exe vmprotect C:\Users\Admin\Documents\Oj11E2bcEzztHsAAaBJ_ycix.exe vmprotect C:\Users\Admin\Documents\YHucwUKxtMoV0ytDNX7BK_kO.exe vmprotect C:\Users\Admin\Documents\YHucwUKxtMoV0ytDNX7BK_kO.exe vmprotect behavioral2/memory/4500-297-0x0000000140000000-0x000000014060D000-memory.dmp vmprotect behavioral2/memory/2304-314-0x0000000000400000-0x0000000000BD4000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
MWendDapqHOZc3rw922StliA.exeInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MWendDapqHOZc3rw922StliA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MWendDapqHOZc3rw922StliA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mQdMiBTPOobi_BuHy8FCwY8K.exeXrJjgyXOrk_4Hpw7aoHKbbY0.exeSETUP_~1.EXEsonia_1.exesetup_installer.exesonia_6.exeInstall.exeMWendDapqHOZc3rw922StliA.exe27425AB21814ACDC92665957CE92F326A46EA99131EF3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation mQdMiBTPOobi_BuHy8FCwY8K.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation XrJjgyXOrk_4Hpw7aoHKbbY0.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation sonia_1.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation sonia_6.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation MWendDapqHOZc3rw922StliA.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe -
Loads dropped DLL 15 IoCs
Processes:
setup_install.exesonia_2.exerundll32.exeregsvr32.exerundll32.exeMWendDapqHOZc3rw922StliA.exeegfSGYPgyplSLrwbrV3u6a8Y.exeregsvr32.exepid process 1228 setup_install.exe 1228 setup_install.exe 1228 setup_install.exe 1228 setup_install.exe 1228 setup_install.exe 2164 sonia_2.exe 2784 rundll32.exe 924 regsvr32.exe 640 rundll32.exe 364 MWendDapqHOZc3rw922StliA.exe 364 MWendDapqHOZc3rw922StliA.exe 4584 egfSGYPgyplSLrwbrV3u6a8Y.exe 4584 egfSGYPgyplSLrwbrV3u6a8Y.exe 4584 egfSGYPgyplSLrwbrV3u6a8Y.exe 2140 regsvr32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\MWendDapqHOZc3rw922StliA.exe themida C:\Users\Admin\Documents\MWendDapqHOZc3rw922StliA.exe themida behavioral2/memory/364-303-0x0000000000C60000-0x0000000001519000-memory.dmp themida behavioral2/memory/364-306-0x0000000000C60000-0x0000000001519000-memory.dmp themida behavioral2/memory/364-308-0x0000000000C60000-0x0000000001519000-memory.dmp themida behavioral2/memory/364-310-0x0000000000C60000-0x0000000001519000-memory.dmp themida behavioral2/memory/364-316-0x0000000000C60000-0x0000000001519000-memory.dmp themida behavioral2/memory/364-323-0x0000000000C60000-0x0000000001519000-memory.dmp themida behavioral2/memory/364-311-0x0000000000C60000-0x0000000001519000-memory.dmp themida behavioral2/memory/364-343-0x0000000000C60000-0x0000000001519000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
Ni8ZzArnA9_TP4qNbOVAiiEk.exeyAmHiinfk87qmj1zSSi5kxS9.exe5F22.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Ni8ZzArnA9_TP4qNbOVAiiEk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ni8ZzArnA9_TP4qNbOVAiiEk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yAmHiinfk87qmj1zSSi5kxS9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" yAmHiinfk87qmj1zSSi5kxS9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\29eca203-3b0d-4a60-9b01-9e4b451ef678\\5F22.exe\" --AutoStart" 5F22.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
MWendDapqHOZc3rw922StliA.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MWendDapqHOZc3rw922StliA.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipinfo.io 5 ipinfo.io 175 api.2ip.ua 176 api.2ip.ua -
Drops file in System32 directory 1 IoCs
Processes:
Install.exedescription ioc process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
MWendDapqHOZc3rw922StliA.exepid process 364 MWendDapqHOZc3rw922StliA.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
F_Qw445qjIdhSD0Y3IBsfhaQ.exe5F22.exedescription pid process target process PID 4748 set thread context of 764 4748 F_Qw445qjIdhSD0Y3IBsfhaQ.exe vbc.exe PID 3292 set thread context of 2112 3292 5F22.exe 5F22.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2604 1228 WerFault.exe setup_install.exe 4340 4768 WerFault.exe sonia_7.exe 4548 2784 WerFault.exe rundll32.exe 3960 3748 WerFault.exe sonia_3.exe 2604 4296 WerFault.exe 9QzFWE_pem83FBeI7vQsnsFU.exe 1928 4500 WerFault.exe Oj11E2bcEzztHsAAaBJ_ycix.exe 4116 4296 WerFault.exe 9QzFWE_pem83FBeI7vQsnsFU.exe 2768 640 WerFault.exe rundll32.exe 2784 4296 WerFault.exe 9QzFWE_pem83FBeI7vQsnsFU.exe 3220 4296 WerFault.exe 9QzFWE_pem83FBeI7vQsnsFU.exe 4780 4296 WerFault.exe 9QzFWE_pem83FBeI7vQsnsFU.exe 1044 4296 WerFault.exe 9QzFWE_pem83FBeI7vQsnsFU.exe 3948 1568 WerFault.exe 6AAD.exe 3940 1568 WerFault.exe 6AAD.exe 4312 1568 WerFault.exe 6AAD.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
uJZS7zpTOdtevWirz9JQX_W8.exesonia_2.exe8338.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uJZS7zpTOdtevWirz9JQX_W8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uJZS7zpTOdtevWirz9JQX_W8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uJZS7zpTOdtevWirz9JQX_W8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8338.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8338.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 8338.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MWendDapqHOZc3rw922StliA.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MWendDapqHOZc3rw922StliA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MWendDapqHOZc3rw922StliA.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4200 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3704 taskkill.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 154 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sonia_2.exepid process 2164 sonia_2.exe 2164 sonia_2.exe 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 2592 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2592 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
sonia_2.exeuJZS7zpTOdtevWirz9JQX_W8.exe8338.exepid process 2164 sonia_2.exe 4192 uJZS7zpTOdtevWirz9JQX_W8.exe 2592 2592 2592 2592 2000 8338.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sonia_4.exesonia_5.exeSETUP_~1.EXEdescription pid process Token: SeDebugPrivilege 1864 sonia_4.exe Token: SeDebugPrivilege 1176 sonia_5.exe Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeDebugPrivilege 972 SETUP_~1.EXE Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 Token: SeCreatePagefilePrivilege 2592 Token: SeShutdownPrivilege 2592 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
27425AB21814ACDC92665957CE92F326A46EA99131EF3.exesetup_installer.exesetup_install.execmd.execmd.exesonia_1.execmd.execmd.execmd.execmd.execmd.exerUNdlL32.eXesonia_6.exedescription pid process target process PID 4708 wrote to memory of 1044 4708 27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe setup_installer.exe PID 4708 wrote to memory of 1044 4708 27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe setup_installer.exe PID 4708 wrote to memory of 1044 4708 27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe setup_installer.exe PID 1044 wrote to memory of 1228 1044 setup_installer.exe setup_install.exe PID 1044 wrote to memory of 1228 1044 setup_installer.exe setup_install.exe PID 1044 wrote to memory of 1228 1044 setup_installer.exe setup_install.exe PID 1228 wrote to memory of 4500 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4500 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4500 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4324 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4324 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4324 1228 setup_install.exe cmd.exe PID 4500 wrote to memory of 1584 4500 cmd.exe sonia_1.exe PID 4500 wrote to memory of 1584 4500 cmd.exe sonia_1.exe PID 4500 wrote to memory of 1584 4500 cmd.exe sonia_1.exe PID 1228 wrote to memory of 2124 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 2124 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 2124 1228 setup_install.exe cmd.exe PID 4324 wrote to memory of 2164 4324 cmd.exe sonia_2.exe PID 4324 wrote to memory of 2164 4324 cmd.exe sonia_2.exe PID 4324 wrote to memory of 2164 4324 cmd.exe sonia_2.exe PID 1228 wrote to memory of 4544 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4544 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4544 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 1356 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 1356 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 1356 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4468 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4468 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 4468 1228 setup_install.exe cmd.exe PID 1584 wrote to memory of 216 1584 sonia_1.exe sonia_1.exe PID 1584 wrote to memory of 216 1584 sonia_1.exe sonia_1.exe PID 1584 wrote to memory of 216 1584 sonia_1.exe sonia_1.exe PID 1228 wrote to memory of 3872 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 3872 1228 setup_install.exe cmd.exe PID 1228 wrote to memory of 3872 1228 setup_install.exe cmd.exe PID 4468 wrote to memory of 5096 4468 cmd.exe sonia_6.exe PID 4468 wrote to memory of 5096 4468 cmd.exe sonia_6.exe PID 4468 wrote to memory of 5096 4468 cmd.exe sonia_6.exe PID 2124 wrote to memory of 3748 2124 cmd.exe sonia_3.exe PID 2124 wrote to memory of 3748 2124 cmd.exe sonia_3.exe PID 2124 wrote to memory of 3748 2124 cmd.exe sonia_3.exe PID 1356 wrote to memory of 1176 1356 cmd.exe sonia_5.exe PID 1356 wrote to memory of 1176 1356 cmd.exe sonia_5.exe PID 4544 wrote to memory of 1864 4544 cmd.exe sonia_4.exe PID 4544 wrote to memory of 1864 4544 cmd.exe sonia_4.exe PID 3872 wrote to memory of 4768 3872 cmd.exe sonia_7.exe PID 3872 wrote to memory of 4768 3872 cmd.exe sonia_7.exe PID 1600 wrote to memory of 2784 1600 rUNdlL32.eXe rundll32.exe PID 1600 wrote to memory of 2784 1600 rUNdlL32.eXe rundll32.exe PID 1600 wrote to memory of 2784 1600 rUNdlL32.eXe rundll32.exe PID 5096 wrote to memory of 4192 5096 sonia_6.exe uJZS7zpTOdtevWirz9JQX_W8.exe PID 5096 wrote to memory of 4192 5096 sonia_6.exe uJZS7zpTOdtevWirz9JQX_W8.exe PID 5096 wrote to memory of 4192 5096 sonia_6.exe uJZS7zpTOdtevWirz9JQX_W8.exe PID 5096 wrote to memory of 4296 5096 sonia_6.exe 9QzFWE_pem83FBeI7vQsnsFU.exe PID 5096 wrote to memory of 4296 5096 sonia_6.exe 9QzFWE_pem83FBeI7vQsnsFU.exe PID 5096 wrote to memory of 4296 5096 sonia_6.exe 9QzFWE_pem83FBeI7vQsnsFU.exe PID 5096 wrote to memory of 1096 5096 sonia_6.exe yAmHiinfk87qmj1zSSi5kxS9.exe PID 5096 wrote to memory of 1096 5096 sonia_6.exe yAmHiinfk87qmj1zSSi5kxS9.exe PID 5096 wrote to memory of 1096 5096 sonia_6.exe yAmHiinfk87qmj1zSSi5kxS9.exe PID 5096 wrote to memory of 3396 5096 sonia_6.exe Ni8ZzArnA9_TP4qNbOVAiiEk.exe PID 5096 wrote to memory of 3396 5096 sonia_6.exe Ni8ZzArnA9_TP4qNbOVAiiEk.exe PID 5096 wrote to memory of 2132 5096 sonia_6.exe fic68gnDkH3ni2WUDFie5TwN.exe PID 5096 wrote to memory of 2132 5096 sonia_6.exe fic68gnDkH3ni2WUDFie5TwN.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe"C:\Users\Admin\AppData\Local\Temp\27425AB21814ACDC92665957CE92F326A46EA99131EF3.exe"1⤵
- DcRat
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS41488986\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_1.exesonia_1.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_3.exesonia_3.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 18446⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_4.exesonia_4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_6.exesonia_6.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\Ni8ZzArnA9_TP4qNbOVAiiEk.exe"C:\Users\Admin\Documents\Ni8ZzArnA9_TP4qNbOVAiiEk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~1.EXE7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==8⤵
-
C:\Users\Admin\Documents\yAmHiinfk87qmj1zSSi5kxS9.exe"C:\Users\Admin\Documents\yAmHiinfk87qmj1zSSi5kxS9.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\at.exeat 3874982763784yhwgdfg78234789s42809374918uf7⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Film.aspx & ping -n 5 localhost7⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"9⤵
-
C:\Users\Admin\Documents\9QzFWE_pem83FBeI7vQsnsFU.exe"C:\Users\Admin\Documents\9QzFWE_pem83FBeI7vQsnsFU.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 4527⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 7687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 7687⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 7807⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 8367⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 8607⤵
- Program crash
-
C:\Users\Admin\Documents\uJZS7zpTOdtevWirz9JQX_W8.exe"C:\Users\Admin\Documents\uJZS7zpTOdtevWirz9JQX_W8.exe"6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Documents\fic68gnDkH3ni2WUDFie5TwN.exe"C:\Users\Admin\Documents\fic68gnDkH3ni2WUDFie5TwN.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS7D00.tmp\Install.exe.\Install.exe7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSCC49.tmp\Install.exe.\Install.exe /S /site_id "525403"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gXiCMUipu" /SC once /ST 14:19:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\XrJjgyXOrk_4Hpw7aoHKbbY0.exe"C:\Users\Admin\Documents\XrJjgyXOrk_4Hpw7aoHKbbY0.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" nFVn.Qh -u /S7⤵
- Loads dropped DLL
-
C:\Users\Admin\Documents\Oj11E2bcEzztHsAAaBJ_ycix.exe"C:\Users\Admin\Documents\Oj11E2bcEzztHsAAaBJ_ycix.exe"6⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4500 -s 4767⤵
- Program crash
-
C:\Users\Admin\Documents\jlag7WZ7N4ujo9KwZyPuZMP0.exe"C:\Users\Admin\Documents\jlag7WZ7N4ujo9KwZyPuZMP0.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\egfSGYPgyplSLrwbrV3u6a8Y.exe"C:\Users\Admin\Documents\egfSGYPgyplSLrwbrV3u6a8Y.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Documents\F_Qw445qjIdhSD0Y3IBsfhaQ.exe"C:\Users\Admin\Documents\F_Qw445qjIdhSD0Y3IBsfhaQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"7⤵
-
C:\Users\Admin\Documents\mQdMiBTPOobi_BuHy8FCwY8K.exe"C:\Users\Admin\Documents\mQdMiBTPOobi_BuHy8FCwY8K.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\Documents\mQdMiBTPOobi_BuHy8FCwY8K.exe"C:\Users\Admin\Documents\mQdMiBTPOobi_BuHy8FCwY8K.exe" -q7⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\MWendDapqHOZc3rw922StliA.exe"C:\Users\Admin\Documents\MWendDapqHOZc3rw922StliA.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" š«ˆ®¦ÈJ2tžž/c taskkill /im MWendDapqHOZc3rw922StliA.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\MWendDapqHOZc3rw922StliA.exe" & del C:\PrograData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im MWendDapqHOZc3rw922StliA.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\YHucwUKxtMoV0ytDNX7BK_kO.exe"C:\Users\Admin\Documents\YHucwUKxtMoV0ytDNX7BK_kO.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_7.exesonia_7.exe5⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4768 -s 12086⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 5444⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1228 -ip 12281⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_5.exesonia_5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_1.exe" -a1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_2.exesonia_2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 6003⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 4768 -ip 47681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2784 -ip 27841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3748 -ip 37481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4296 -ip 42961⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 572 -p 4500 -ip 45001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4296 -ip 42961⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 640 -ip 6401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4296 -ip 42961⤵
-
C:\Users\Admin\AppData\Local\Temp\5F22.exeC:\Users\Admin\AppData\Local\Temp\5F22.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\5F22.exeC:\Users\Admin\AppData\Local\Temp\5F22.exe2⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\29eca203-3b0d-4a60-9b01-9e4b451ef678" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\6AAD.exeC:\Users\Admin\AppData\Local\Temp\6AAD.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 5482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 5522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 4562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4296 -ip 42961⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\754C.dll1⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\754C.dll2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\8338.exeC:\Users\Admin\AppData\Local\Temp\8338.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1568 -ip 15681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1568 -ip 15681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
2Disabling Security Tools
1Virtualization/Sandbox Evasion
1File Permissions Modification
1Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\setup_install.exeFilesize
290KB
MD573af0c2f773cf957f9611d44a5e40f16
SHA150d58eb73b262deb989abf337fbd1696ae74803a
SHA256c8a808f09902383c69455cb69423420ba45cffe61754bf44d6f038b5a05f6384
SHA512a2a5618bf52f09284b28e9fe151dac93c664f71794bac7688eb3ce29d94b149caa68bfc5642c4663673c9c05e94dd366bcb3c7141097fbac8f92fc2fcdd1be0e
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\setup_install.exeFilesize
290KB
MD573af0c2f773cf957f9611d44a5e40f16
SHA150d58eb73b262deb989abf337fbd1696ae74803a
SHA256c8a808f09902383c69455cb69423420ba45cffe61754bf44d6f038b5a05f6384
SHA512a2a5618bf52f09284b28e9fe151dac93c664f71794bac7688eb3ce29d94b149caa68bfc5642c4663673c9c05e94dd366bcb3c7141097fbac8f92fc2fcdd1be0e
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_1.exeFilesize
712KB
MD56e43430011784cff369ea5a5ae4b000f
SHA15999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f
SHA256a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a
SHA51233ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_1.exeFilesize
712KB
MD56e43430011784cff369ea5a5ae4b000f
SHA15999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f
SHA256a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a
SHA51233ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_1.txtFilesize
712KB
MD56e43430011784cff369ea5a5ae4b000f
SHA15999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f
SHA256a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a
SHA51233ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_2.exeFilesize
168KB
MD55025f51f20fdf72746354072363b4a55
SHA1997d932032d2400b32db7bd4edb432942073f3ea
SHA256c9299dda70cf1f902c56a507d79e4a34d9e8ad6d1a5b436bf15dd451d30a2bf4
SHA512e8b62916ca4da01d5a376f2bd85afb9a4649a192c4e205924f55e1597cadd27d00e46c6c1b913d21c6f6d7dcaf5251517618d48aacf9fc0d96f08a0c001e7c95
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_2.txtFilesize
168KB
MD55025f51f20fdf72746354072363b4a55
SHA1997d932032d2400b32db7bd4edb432942073f3ea
SHA256c9299dda70cf1f902c56a507d79e4a34d9e8ad6d1a5b436bf15dd451d30a2bf4
SHA512e8b62916ca4da01d5a376f2bd85afb9a4649a192c4e205924f55e1597cadd27d00e46c6c1b913d21c6f6d7dcaf5251517618d48aacf9fc0d96f08a0c001e7c95
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_3.exeFilesize
534KB
MD5c281e19bd02faa84354fd0403ee04c2f
SHA1941545ac22ec58778535c33ebc0ee817aa20d733
SHA256038cac723655d95edd5708f7904b60d199a3c8234e502007973760ac2d664bdd
SHA51213149f23c3256a7b8aec689357f89e903504389b5a267c1ce7b86803a1225b6b9d5ecfd3227fe6744ae736c0376093be7551fd5200da656df354f2e13d5720a8
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_3.txtFilesize
534KB
MD5c281e19bd02faa84354fd0403ee04c2f
SHA1941545ac22ec58778535c33ebc0ee817aa20d733
SHA256038cac723655d95edd5708f7904b60d199a3c8234e502007973760ac2d664bdd
SHA51213149f23c3256a7b8aec689357f89e903504389b5a267c1ce7b86803a1225b6b9d5ecfd3227fe6744ae736c0376093be7551fd5200da656df354f2e13d5720a8
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_4.exeFilesize
8KB
MD56765fe4e4be8c4daf3763706a58f42d0
SHA1cebb504bfc3097a95d40016f01123b275c97d58c
SHA256755a4266245c52bcd0328044c8a0908b2daafbad140cee06830b991493f21f60
SHA512c6b8d328768040b31aad0441258240ce8e99a80dba028462bd03ad9d5964d4877c296f25a5a2ca59bcafe0ad75297da39352c17f3df1bb79ec091e5ace3b5d55
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_4.txtFilesize
8KB
MD56765fe4e4be8c4daf3763706a58f42d0
SHA1cebb504bfc3097a95d40016f01123b275c97d58c
SHA256755a4266245c52bcd0328044c8a0908b2daafbad140cee06830b991493f21f60
SHA512c6b8d328768040b31aad0441258240ce8e99a80dba028462bd03ad9d5964d4877c296f25a5a2ca59bcafe0ad75297da39352c17f3df1bb79ec091e5ace3b5d55
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_5.exeFilesize
133KB
MD5806c795738de9c6fb869433b38ac56ce
SHA1acfec747758e429306303f237a7bad70685c8458
SHA256e38bc2017f92ec6330ee23ae43948b69e727ff947f9b54b73c4d35bb1c258ae1
SHA5122834f32f3f7ff541b317cb26e0cf4f78b27e590b10040fefb4eeb239e56018b5ff3022379aef5d6c96c3b40ac46fce7216c5f962967db3ce405d75e5b5b4c75f
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_5.txtFilesize
133KB
MD5806c795738de9c6fb869433b38ac56ce
SHA1acfec747758e429306303f237a7bad70685c8458
SHA256e38bc2017f92ec6330ee23ae43948b69e727ff947f9b54b73c4d35bb1c258ae1
SHA5122834f32f3f7ff541b317cb26e0cf4f78b27e590b10040fefb4eeb239e56018b5ff3022379aef5d6c96c3b40ac46fce7216c5f962967db3ce405d75e5b5b4c75f
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_6.exeFilesize
840KB
MD5ec149486075982428b9d394c1a5375fd
SHA163c94ed4abc8aff9001293045bc4d8ce549a47b8
SHA25653379b36716f384e530dae9ec883c459d0c12f0260116614a0482ded7d9b5ba9
SHA512c8267ac9e08816a476f5bf7d3177057ff9a8e4e30aea3abdf2fa4fb4281623d3d11bd8751bff917fbea73763790ea8b95d03fd2e37168872a903cfd70b155b4d
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_6.txtFilesize
840KB
MD5ec149486075982428b9d394c1a5375fd
SHA163c94ed4abc8aff9001293045bc4d8ce549a47b8
SHA25653379b36716f384e530dae9ec883c459d0c12f0260116614a0482ded7d9b5ba9
SHA512c8267ac9e08816a476f5bf7d3177057ff9a8e4e30aea3abdf2fa4fb4281623d3d11bd8751bff917fbea73763790ea8b95d03fd2e37168872a903cfd70b155b4d
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_7.exeFilesize
241KB
MD5ed8ebbf646eb62469da3ca1c539e8fd7
SHA1356a7c551b57998f200c0b59647d4ee6aaa20660
SHA25600c508bdb9c7de8a246238f4de7588d4175a0d2dfe6e057a5d5b5ece75796975
SHA5128de409c4353a5e4782fd603d7571cfc2ee309fdbfb682f19ce1cbbd00e67d5ee3b1a12101944f945721498de2ddf03f513633df73d1e4dbeb80fb5b606b8d782
-
C:\Users\Admin\AppData\Local\Temp\7zS41488986\sonia_7.txtFilesize
241KB
MD5ed8ebbf646eb62469da3ca1c539e8fd7
SHA1356a7c551b57998f200c0b59647d4ee6aaa20660
SHA25600c508bdb9c7de8a246238f4de7588d4175a0d2dfe6e057a5d5b5ece75796975
SHA5128de409c4353a5e4782fd603d7571cfc2ee309fdbfb682f19ce1cbbd00e67d5ee3b1a12101944f945721498de2ddf03f513633df73d1e4dbeb80fb5b606b8d782
-
C:\Users\Admin\AppData\Local\Temp\7zS7D00.tmp\Install.exeFilesize
6.3MB
MD5078ee192a7a0daaad80a4b0836cb047d
SHA18ce2657d0baf048b9f6d9befe7c3a8a6c6b04b98
SHA2569b7f5fd81087af82be6e996f66d452ce51d9c8b2edea35079cf73f1e4ee605a7
SHA512cd1b31f309f8606f2fa27c538826ea5fe5b9bd7e669f2b37b80a0761f187bd9eaf81050a016c3c43bddf0bdba6b04e213d6b4c99c7b2e271b6c8a45aa34f78ad
-
C:\Users\Admin\AppData\Local\Temp\7zS7D00.tmp\Install.exeFilesize
6.3MB
MD5078ee192a7a0daaad80a4b0836cb047d
SHA18ce2657d0baf048b9f6d9befe7c3a8a6c6b04b98
SHA2569b7f5fd81087af82be6e996f66d452ce51d9c8b2edea35079cf73f1e4ee605a7
SHA512cd1b31f309f8606f2fa27c538826ea5fe5b9bd7e669f2b37b80a0761f187bd9eaf81050a016c3c43bddf0bdba6b04e213d6b4c99c7b2e271b6c8a45aa34f78ad
-
C:\Users\Admin\AppData\Local\Temp\7zSCC49.tmp\Install.exeFilesize
6.8MB
MD5ad10a30760d467dade24f430b558b465
SHA17aaa56e80264c27d080c3b77055294593eacca1b
SHA25644c717fd08281b16f266bd9bc037fc16713a8ac02e1dfe519ba3be49bac8442a
SHA51223c13f8c865da24d848b2843b67190188048e7383dcb2dff10f8e8e94862a8ae1916aef3566cd2ce4346c816f7e8301912a9fff4a04bb5380b75b98bd7154e63
-
C:\Users\Admin\AppData\Local\Temp\7zSCC49.tmp\Install.exeFilesize
6.8MB
MD5ad10a30760d467dade24f430b558b465
SHA17aaa56e80264c27d080c3b77055294593eacca1b
SHA25644c717fd08281b16f266bd9bc037fc16713a8ac02e1dfe519ba3be49bac8442a
SHA51223c13f8c865da24d848b2843b67190188048e7383dcb2dff10f8e8e94862a8ae1916aef3566cd2ce4346c816f7e8301912a9fff4a04bb5380b75b98bd7154e63
-
C:\Users\Admin\AppData\Local\Temp\CC4F.tmpFilesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~1.EXEFilesize
95.4MB
MD52b987f92c4645d1590d77cdd580a83d0
SHA1b735870ae488cb652fd9f7f90394f757ae46184c
SHA256c46ac8c008b28266d134a9e7eb2cf1df80b20a072354336bd59190038a26fa1a
SHA5126059fc2425f3e2ea4e0698011aee6c56c24b8ed2583d581577add435118037c3dcfb12e3f9036c1600f5754461a552545336ef2e3bb906504cc82cfaf4e3e5e5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SETUP_~1.EXEFilesize
95.4MB
MD52b987f92c4645d1590d77cdd580a83d0
SHA1b735870ae488cb652fd9f7f90394f757ae46184c
SHA256c46ac8c008b28266d134a9e7eb2cf1df80b20a072354336bd59190038a26fa1a
SHA5126059fc2425f3e2ea4e0698011aee6c56c24b8ed2583d581577add435118037c3dcfb12e3f9036c1600f5754461a552545336ef2e3bb906504cc82cfaf4e3e5e5
-
C:\Users\Admin\AppData\Local\Temp\axhub.datFilesize
552KB
MD599ab358c6f267b09d7a596548654a6ba
SHA1d5a643074b69be2281a168983e3f6bef7322f676
SHA256586339f93c9c0eed8a42829ab307f2c5381a636edbcf80df3770c27555034380
SHA512952040785a3c1dcaea613d2e0d46745d5b631785d26de018fd9f85f8485161d056bf67b19c96ae618d35de5d5991a0dd549d749949faea7a2e0f9991a1aa2b2b
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllFilesize
73KB
MD51c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllFilesize
73KB
MD51c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
2.5MB
MD523b40478a61a00df0473d1f56cc4ff62
SHA164257c787846db476c4cd71464af58fae87b26a9
SHA25655f22aa33b837e543e8a58408ed843e41515292dead43b57b2ae42b735c34f11
SHA5123f861177bfafeaee6f682704b066a6c42242fb425fb79e4e43b28187d97b2c5b68717775f62962c7d169ac2de61fbec32079434b293523d95de17fd273479bf5
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
2.5MB
MD523b40478a61a00df0473d1f56cc4ff62
SHA164257c787846db476c4cd71464af58fae87b26a9
SHA25655f22aa33b837e543e8a58408ed843e41515292dead43b57b2ae42b735c34f11
SHA5123f861177bfafeaee6f682704b066a6c42242fb425fb79e4e43b28187d97b2c5b68717775f62962c7d169ac2de61fbec32079434b293523d95de17fd273479bf5
-
C:\Users\Admin\Documents\9QzFWE_pem83FBeI7vQsnsFU.exeFilesize
352KB
MD51cb98dcf13fe3ed5d9587974dc00627e
SHA10a2fe3e222f0f2ca0e0d3feeec82661872b8fd16
SHA256f8fe8387d832b8c37675138d09df2406c7ffe34d007419f6646425cd894ed7b0
SHA512324cd93b665dd2507361cd3ad1435e5238cb519b85e4d1b4df4f1a87f4e7b82abed9941ddbf1171bbf0e5112091cdfb8bbd8e6c938b5b96a39d90320f8510937
-
C:\Users\Admin\Documents\9QzFWE_pem83FBeI7vQsnsFU.exeFilesize
352KB
MD51cb98dcf13fe3ed5d9587974dc00627e
SHA10a2fe3e222f0f2ca0e0d3feeec82661872b8fd16
SHA256f8fe8387d832b8c37675138d09df2406c7ffe34d007419f6646425cd894ed7b0
SHA512324cd93b665dd2507361cd3ad1435e5238cb519b85e4d1b4df4f1a87f4e7b82abed9941ddbf1171bbf0e5112091cdfb8bbd8e6c938b5b96a39d90320f8510937
-
C:\Users\Admin\Documents\F_Qw445qjIdhSD0Y3IBsfhaQ.exeFilesize
228KB
MD5ff10f9a0f2e550a402f2a58c130670ba
SHA120ae921216a8ff801402423f4cc14130c6cd18ac
SHA2568987486a7d6a0ded39ad78bebafb2828be0d927b178ef7bdac71ed2901f755cd
SHA512e71b70b997db272e9d15089e46b0dc4ae503da8aa840bcba484bb7e07173198e5e610e7471844518579c474376287b2fb869629e45707cc83538c4c0b00327df
-
C:\Users\Admin\Documents\F_Qw445qjIdhSD0Y3IBsfhaQ.exeFilesize
228KB
MD5ff10f9a0f2e550a402f2a58c130670ba
SHA120ae921216a8ff801402423f4cc14130c6cd18ac
SHA2568987486a7d6a0ded39ad78bebafb2828be0d927b178ef7bdac71ed2901f755cd
SHA512e71b70b997db272e9d15089e46b0dc4ae503da8aa840bcba484bb7e07173198e5e610e7471844518579c474376287b2fb869629e45707cc83538c4c0b00327df
-
C:\Users\Admin\Documents\MWendDapqHOZc3rw922StliA.exeFilesize
3.2MB
MD581298a52170dd27d8afb431efa78e784
SHA11bad395207cc7769f321a6f6e8a7f149ec3bc34a
SHA256e8075dd2f74391aabe1a85eeb7282620b5be0236d6d0a23e7474cf033dd1628a
SHA512e1872c02d0029cb68230a3e34677adcb064d4c5f96e1e5ccbe667e5a7cb4e0b92207290154bf62736faa561c33a7b1ff8198fd23742e2bf305c6913050e7c1ea
-
C:\Users\Admin\Documents\MWendDapqHOZc3rw922StliA.exeFilesize
3.2MB
MD581298a52170dd27d8afb431efa78e784
SHA11bad395207cc7769f321a6f6e8a7f149ec3bc34a
SHA256e8075dd2f74391aabe1a85eeb7282620b5be0236d6d0a23e7474cf033dd1628a
SHA512e1872c02d0029cb68230a3e34677adcb064d4c5f96e1e5ccbe667e5a7cb4e0b92207290154bf62736faa561c33a7b1ff8198fd23742e2bf305c6913050e7c1ea
-
C:\Users\Admin\Documents\Ni8ZzArnA9_TP4qNbOVAiiEk.exeFilesize
203KB
MD5f73d211e5b99426bdaa32d50369dd54a
SHA11b56fca828f1e472e5395c28c775386b31e7719e
SHA2564ff17757e7b6d0d9abea660efaf9efeb28ee85f5d2841fe27321588dc74a7e69
SHA512ac4a4bd5488c9a6d445be9691c18a678700bb15250bf6493680be310e020467bf66e991cae184b0845d2fb413026ee63c5edd035efa03f03c81b058c52addab3
-
C:\Users\Admin\Documents\Oj11E2bcEzztHsAAaBJ_ycix.exeFilesize
3.5MB
MD504aeaa8f06b71a72b8905da20f679b10
SHA1ebfa60215fcce5a369f1b340f1232125e37f7a68
SHA25655c1cbe7368ef1eafbd435a2b570f362868bd2afda1ddbe59bcbb51b7fc63383
SHA5125c393a8e6b3327ece1555aa73111f67e4858898efbbe38ac757a96d91da26a83f0b130e18b6955796e76bd4300475e8eeec63171c8ef407a09069874f48d5774
-
C:\Users\Admin\Documents\Oj11E2bcEzztHsAAaBJ_ycix.exeFilesize
3.5MB
MD504aeaa8f06b71a72b8905da20f679b10
SHA1ebfa60215fcce5a369f1b340f1232125e37f7a68
SHA25655c1cbe7368ef1eafbd435a2b570f362868bd2afda1ddbe59bcbb51b7fc63383
SHA5125c393a8e6b3327ece1555aa73111f67e4858898efbbe38ac757a96d91da26a83f0b130e18b6955796e76bd4300475e8eeec63171c8ef407a09069874f48d5774
-
C:\Users\Admin\Documents\XrJjgyXOrk_4Hpw7aoHKbbY0.exeFilesize
1.9MB
MD5985ae5baeedf9db6ef0c14af926898ee
SHA12963fd4c2a573b4cdbc22347275bfd73258d1ef2
SHA256e26d0a103a75266b70b220d15ce4dad3bdfdc655ac50587ac0ed0dc96b2548aa
SHA5120954a568081234c907a0c1fe254ebae7c76baeef3b2d6266d5b51f63d37b8a9801a44d315a89c5de123f88a954360099a60c7053351bf56a2850e0cffbb60a4f
-
C:\Users\Admin\Documents\XrJjgyXOrk_4Hpw7aoHKbbY0.exeFilesize
1.9MB
MD5985ae5baeedf9db6ef0c14af926898ee
SHA12963fd4c2a573b4cdbc22347275bfd73258d1ef2
SHA256e26d0a103a75266b70b220d15ce4dad3bdfdc655ac50587ac0ed0dc96b2548aa
SHA5120954a568081234c907a0c1fe254ebae7c76baeef3b2d6266d5b51f63d37b8a9801a44d315a89c5de123f88a954360099a60c7053351bf56a2850e0cffbb60a4f
-
C:\Users\Admin\Documents\YHucwUKxtMoV0ytDNX7BK_kO.exeFilesize
4.9MB
MD5a4a6f0811502830f5fb6f14117063b0c
SHA12715df40c141a7878e4c8e87dacfb72fa938576a
SHA256ba4f20dce97640a72783e91f1ae72f6d49379d19f96af1ee16411d0e03588027
SHA5123762a1423a3a81869c4dfc63cdd67a57281df1a38291e0beff697506abd05eaadd39df017155bf2cfca6f2dbe10aeb2e55e93c14cbe8f17e94014f7d1dc39df4
-
C:\Users\Admin\Documents\YHucwUKxtMoV0ytDNX7BK_kO.exeFilesize
4.9MB
MD5a4a6f0811502830f5fb6f14117063b0c
SHA12715df40c141a7878e4c8e87dacfb72fa938576a
SHA256ba4f20dce97640a72783e91f1ae72f6d49379d19f96af1ee16411d0e03588027
SHA5123762a1423a3a81869c4dfc63cdd67a57281df1a38291e0beff697506abd05eaadd39df017155bf2cfca6f2dbe10aeb2e55e93c14cbe8f17e94014f7d1dc39df4
-
C:\Users\Admin\Documents\egfSGYPgyplSLrwbrV3u6a8Y.exeFilesize
265KB
MD5bbe6d20b7f00e927104d51ab7c8b4861
SHA1ffe2883fa9aa455056fc2290b2cd2c4493252f1d
SHA25680bf09424e359558567c85c94e70c8ee4c13d2676f4d52b694da1692c34f0f06
SHA512371d00c444a097022db2d09403b684713a29ace7a22b6aadb25c43f15a07a48ce5b8425dc4b3c5dc338bf6e20cf22ea2524d2d14492451ee3d11604d35e6424b
-
C:\Users\Admin\Documents\egfSGYPgyplSLrwbrV3u6a8Y.exeFilesize
265KB
MD5bbe6d20b7f00e927104d51ab7c8b4861
SHA1ffe2883fa9aa455056fc2290b2cd2c4493252f1d
SHA25680bf09424e359558567c85c94e70c8ee4c13d2676f4d52b694da1692c34f0f06
SHA512371d00c444a097022db2d09403b684713a29ace7a22b6aadb25c43f15a07a48ce5b8425dc4b3c5dc338bf6e20cf22ea2524d2d14492451ee3d11604d35e6424b
-
C:\Users\Admin\Documents\fic68gnDkH3ni2WUDFie5TwN.exeFilesize
7.2MB
MD5da04e9fe5f578379fd38f7a33a3a8081
SHA1fabf1798e975d7e5c8898206ea11c019108c4af3
SHA256a3264b5e44a76b86048741d7902a298a56c72da7ed384e5886103d310dfa1aab
SHA512fc83ed752cd2b417a424d70dd406e2a000bb1633dcbdbce32bf88ed9b2ba0a8a726b3de732483ef87a69e5e1b8520b4512089600e87454392bc9e43ac0730a5c
-
C:\Users\Admin\Documents\fic68gnDkH3ni2WUDFie5TwN.exeFilesize
7.2MB
MD5da04e9fe5f578379fd38f7a33a3a8081
SHA1fabf1798e975d7e5c8898206ea11c019108c4af3
SHA256a3264b5e44a76b86048741d7902a298a56c72da7ed384e5886103d310dfa1aab
SHA512fc83ed752cd2b417a424d70dd406e2a000bb1633dcbdbce32bf88ed9b2ba0a8a726b3de732483ef87a69e5e1b8520b4512089600e87454392bc9e43ac0730a5c
-
C:\Users\Admin\Documents\jlag7WZ7N4ujo9KwZyPuZMP0.exeFilesize
363KB
MD557610e7dfccda35f75555807779e8035
SHA116c53f026853455bae6ba39e1634f41befd11480
SHA256bba50bad1c1ca3d8e311cf17c45693949838403569d6fdb49fe0699eb9ee3202
SHA51232d45d5230f1634f33387553d3cdb90a2c67830b02aae694850b164d4686d5ffef410928619d7b616123c070d93b748d7e17d07fca215ab2466ea51cee892a8a
-
C:\Users\Admin\Documents\jlag7WZ7N4ujo9KwZyPuZMP0.exeFilesize
363KB
MD557610e7dfccda35f75555807779e8035
SHA116c53f026853455bae6ba39e1634f41befd11480
SHA256bba50bad1c1ca3d8e311cf17c45693949838403569d6fdb49fe0699eb9ee3202
SHA51232d45d5230f1634f33387553d3cdb90a2c67830b02aae694850b164d4686d5ffef410928619d7b616123c070d93b748d7e17d07fca215ab2466ea51cee892a8a
-
C:\Users\Admin\Documents\mQdMiBTPOobi_BuHy8FCwY8K.exeFilesize
88KB
MD5f6aa6172364aab7cafa13ec2510fd309
SHA1ab9a888325de1b892c983f4e5c1d519e31a7c95a
SHA2565344eb798da4a39ccf5efc7249bbc1c9347a42fa3b67739eac718b8ed9907cab
SHA512659bdbbd76352c56eb571308a02c60039b1d323af02a5f5f25f8fadb765636cb6697e64f05813e23cf2e80a206c1f80c526ebbc7468acf412f64081cc411b4de
-
C:\Users\Admin\Documents\mQdMiBTPOobi_BuHy8FCwY8K.exeFilesize
88KB
MD5f6aa6172364aab7cafa13ec2510fd309
SHA1ab9a888325de1b892c983f4e5c1d519e31a7c95a
SHA2565344eb798da4a39ccf5efc7249bbc1c9347a42fa3b67739eac718b8ed9907cab
SHA512659bdbbd76352c56eb571308a02c60039b1d323af02a5f5f25f8fadb765636cb6697e64f05813e23cf2e80a206c1f80c526ebbc7468acf412f64081cc411b4de
-
C:\Users\Admin\Documents\mQdMiBTPOobi_BuHy8FCwY8K.exeFilesize
88KB
MD5f6aa6172364aab7cafa13ec2510fd309
SHA1ab9a888325de1b892c983f4e5c1d519e31a7c95a
SHA2565344eb798da4a39ccf5efc7249bbc1c9347a42fa3b67739eac718b8ed9907cab
SHA512659bdbbd76352c56eb571308a02c60039b1d323af02a5f5f25f8fadb765636cb6697e64f05813e23cf2e80a206c1f80c526ebbc7468acf412f64081cc411b4de
-
C:\Users\Admin\Documents\uJZS7zpTOdtevWirz9JQX_W8.exeFilesize
265KB
MD590308535d64a0cb257f281c8e1029c9d
SHA1a196d76773444d8993581d85b085ce7a72a5d6e4
SHA256862f2ac9073c5b8064a02ab8c65ab5c7eba7634fa9d4a36c5171df488f2aedf5
SHA51220d82ff69d7fa5e84de147c450ba3c35774b591a29ccf9636a079366c05e71abb04eff2f9552f1bc8689f3418727a6afdfb4ff533436efa1d5e46641e6e318e6
-
C:\Users\Admin\Documents\uJZS7zpTOdtevWirz9JQX_W8.exeFilesize
265KB
MD590308535d64a0cb257f281c8e1029c9d
SHA1a196d76773444d8993581d85b085ce7a72a5d6e4
SHA256862f2ac9073c5b8064a02ab8c65ab5c7eba7634fa9d4a36c5171df488f2aedf5
SHA51220d82ff69d7fa5e84de147c450ba3c35774b591a29ccf9636a079366c05e71abb04eff2f9552f1bc8689f3418727a6afdfb4ff533436efa1d5e46641e6e318e6
-
C:\Users\Admin\Documents\yAmHiinfk87qmj1zSSi5kxS9.exeFilesize
900KB
MD5c340449d532642420d4bedc2e9f7ce7c
SHA16153df468674d2eb1680eb6bb0e1bdbc0d6856b7
SHA256a233b76767157c012c4d1ec34726d87ea1efac01e49efd9fef394c7e84966103
SHA512c9a085e30ed056c819b992bbe34d606d9fca0704362917ad226b64d233b4800be5fb9de35150f2cdd6bc0f3f1132ac77f558f00dd27ca8d474df4a056a7ff4d3
-
memory/216-186-0x0000000000000000-mapping.dmp
-
memory/364-323-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/364-316-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/364-311-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/364-343-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/364-291-0x0000000000000000-mapping.dmp
-
memory/364-371-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/364-319-0x0000000077A70000-0x0000000077C13000-memory.dmpFilesize
1.6MB
-
memory/364-344-0x0000000077A70000-0x0000000077C13000-memory.dmpFilesize
1.6MB
-
memory/364-303-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/364-306-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/364-308-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/364-310-0x0000000000C60000-0x0000000001519000-memory.dmpFilesize
8.7MB
-
memory/440-283-0x0000000000000000-mapping.dmp
-
memory/488-422-0x0000000000000000-mapping.dmp
-
memory/640-374-0x0000000000000000-mapping.dmp
-
memory/692-415-0x0000000000000000-mapping.dmp
-
memory/764-402-0x0000000000000000-mapping.dmp
-
memory/776-428-0x0000000000000000-mapping.dmp
-
memory/924-330-0x0000000000000000-mapping.dmp
-
memory/972-312-0x0000000000000000-mapping.dmp
-
memory/972-325-0x0000000000180000-0x0000000000188000-memory.dmpFilesize
32KB
-
memory/1044-132-0x0000000000000000-mapping.dmp
-
memory/1080-416-0x0000000000000000-mapping.dmp
-
memory/1096-256-0x0000000000000000-mapping.dmp
-
memory/1176-213-0x00007FFE80AD0000-0x00007FFE81591000-memory.dmpFilesize
10.8MB
-
memory/1176-191-0x0000000000000000-mapping.dmp
-
memory/1176-197-0x0000000000D20000-0x0000000000D48000-memory.dmpFilesize
160KB
-
memory/1176-198-0x00007FFE80AD0000-0x00007FFE81591000-memory.dmpFilesize
10.8MB
-
memory/1228-135-0x0000000000000000-mapping.dmp
-
memory/1228-159-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/1228-162-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1228-175-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1228-164-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/1228-165-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1228-163-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/1228-218-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1228-217-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1228-216-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1228-149-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1228-150-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1228-215-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1228-148-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1228-152-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1228-214-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/1228-174-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1228-161-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/1228-158-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/1228-157-0x0000000000400000-0x000000000051D000-memory.dmpFilesize
1.1MB
-
memory/1228-154-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1228-153-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1228-151-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1228-156-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1228-155-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1356-182-0x0000000000000000-mapping.dmp
-
memory/1408-281-0x0000000000000000-mapping.dmp
-
memory/1568-412-0x0000000000000000-mapping.dmp
-
memory/1584-177-0x0000000000000000-mapping.dmp
-
memory/1708-427-0x0000000000000000-mapping.dmp
-
memory/1864-200-0x00007FFE80AD0000-0x00007FFE81591000-memory.dmpFilesize
10.8MB
-
memory/1864-196-0x00000000002F0000-0x00000000002F8000-memory.dmpFilesize
32KB
-
memory/1864-192-0x0000000000000000-mapping.dmp
-
memory/1864-221-0x00007FFE80AD0000-0x00007FFE81591000-memory.dmpFilesize
10.8MB
-
memory/2000-423-0x0000000000000000-mapping.dmp
-
memory/2064-432-0x0000000000000000-mapping.dmp
-
memory/2112-407-0x0000000000000000-mapping.dmp
-
memory/2124-178-0x0000000000000000-mapping.dmp
-
memory/2132-263-0x0000000000000000-mapping.dmp
-
memory/2140-420-0x0000000000000000-mapping.dmp
-
memory/2164-208-0x0000000000A20000-0x0000000000A29000-memory.dmpFilesize
36KB
-
memory/2164-220-0x0000000000400000-0x00000000009A5000-memory.dmpFilesize
5.6MB
-
memory/2164-180-0x0000000000000000-mapping.dmp
-
memory/2164-209-0x0000000000400000-0x00000000009A5000-memory.dmpFilesize
5.6MB
-
memory/2164-207-0x0000000000B5D000-0x0000000000B66000-memory.dmpFilesize
36KB
-
memory/2304-338-0x0000000005ED0000-0x0000000005FDA000-memory.dmpFilesize
1.0MB
-
memory/2304-299-0x0000000000000000-mapping.dmp
-
memory/2304-339-0x0000000006000000-0x0000000006012000-memory.dmpFilesize
72KB
-
memory/2304-336-0x0000000005810000-0x0000000005E28000-memory.dmpFilesize
6.1MB
-
memory/2304-334-0x0000000005730000-0x00000000057C2000-memory.dmpFilesize
584KB
-
memory/2304-333-0x00000000050F0000-0x0000000005694000-memory.dmpFilesize
5.6MB
-
memory/2304-314-0x0000000000400000-0x0000000000BD4000-memory.dmpFilesize
7.8MB
-
memory/2328-438-0x0000000000000000-mapping.dmp
-
memory/2592-251-0x0000000002A90000-0x0000000002AA0000-memory.dmpFilesize
64KB
-
memory/2592-225-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-227-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-228-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-368-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-367-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-365-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-366-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-363-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-361-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-351-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-350-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-349-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-348-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-347-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-346-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-345-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-253-0x0000000002A90000-0x0000000002AA0000-memory.dmpFilesize
64KB
-
memory/2592-252-0x0000000002A90000-0x0000000002AA0000-memory.dmpFilesize
64KB
-
memory/2592-231-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-250-0x0000000007B40000-0x0000000007B50000-memory.dmpFilesize
64KB
-
memory/2592-229-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-248-0x0000000002A90000-0x0000000002AA0000-memory.dmpFilesize
64KB
-
memory/2592-249-0x0000000002A90000-0x0000000002AA0000-memory.dmpFilesize
64KB
-
memory/2592-247-0x0000000002A90000-0x0000000002AA0000-memory.dmpFilesize
64KB
-
memory/2592-246-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-245-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-230-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-244-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-243-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-236-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-242-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-241-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-240-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-239-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-238-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-234-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-235-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-237-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2592-233-0x00000000071E0000-0x00000000071F0000-memory.dmpFilesize
64KB
-
memory/2784-204-0x0000000000000000-mapping.dmp
-
memory/3060-426-0x0000000000000000-mapping.dmp
-
memory/3292-404-0x0000000000000000-mapping.dmp
-
memory/3396-257-0x0000000000000000-mapping.dmp
-
memory/3420-418-0x0000000000000000-mapping.dmp
-
memory/3540-337-0x0000000000000000-mapping.dmp
-
memory/3552-309-0x0000000000000000-mapping.dmp
-
memory/3704-425-0x0000000000000000-mapping.dmp
-
memory/3748-212-0x0000000000ADD000-0x0000000000B42000-memory.dmpFilesize
404KB
-
memory/3748-219-0x0000000000400000-0x0000000000A00000-memory.dmpFilesize
6.0MB
-
memory/3748-224-0x0000000000400000-0x0000000000A00000-memory.dmpFilesize
6.0MB
-
memory/3748-223-0x0000000000ADD000-0x0000000000B42000-memory.dmpFilesize
404KB
-
memory/3748-222-0x0000000002530000-0x00000000025CD000-memory.dmpFilesize
628KB
-
memory/3748-315-0x0000000000000000-mapping.dmp
-
memory/3748-226-0x0000000000ADD000-0x0000000000B42000-memory.dmpFilesize
404KB
-
memory/3748-340-0x0000000010000000-0x0000000010F04000-memory.dmpFilesize
15.0MB
-
memory/3748-190-0x0000000000000000-mapping.dmp
-
memory/3748-211-0x0000000002530000-0x00000000025CD000-memory.dmpFilesize
628KB
-
memory/3864-424-0x0000000000000000-mapping.dmp
-
memory/3868-273-0x0000000000000000-mapping.dmp
-
memory/3872-185-0x0000000000000000-mapping.dmp
-
memory/3888-284-0x0000000000000000-mapping.dmp
-
memory/4020-447-0x0000000000000000-mapping.dmp
-
memory/4192-270-0x00000000006EC000-0x00000000006FD000-memory.dmpFilesize
68KB
-
memory/4192-254-0x0000000000000000-mapping.dmp
-
memory/4192-271-0x00000000006B0000-0x00000000006B9000-memory.dmpFilesize
36KB
-
memory/4192-275-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4192-272-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4200-439-0x0000000000000000-mapping.dmp
-
memory/4296-267-0x000000000057C000-0x00000000005A2000-memory.dmpFilesize
152KB
-
memory/4296-313-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/4296-268-0x00000000004F0000-0x000000000052F000-memory.dmpFilesize
252KB
-
memory/4296-269-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/4296-255-0x0000000000000000-mapping.dmp
-
memory/4300-279-0x0000000000000000-mapping.dmp
-
memory/4324-176-0x0000000000000000-mapping.dmp
-
memory/4396-417-0x0000000000000000-mapping.dmp
-
memory/4468-184-0x0000000000000000-mapping.dmp
-
memory/4500-297-0x0000000140000000-0x000000014060D000-memory.dmpFilesize
6.1MB
-
memory/4500-276-0x0000000000000000-mapping.dmp
-
memory/4500-173-0x0000000000000000-mapping.dmp
-
memory/4544-181-0x0000000000000000-mapping.dmp
-
memory/4584-331-0x0000000000560000-0x0000000000571000-memory.dmpFilesize
68KB
-
memory/4584-282-0x0000000000000000-mapping.dmp
-
memory/4584-332-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4584-329-0x000000000063C000-0x000000000064D000-memory.dmpFilesize
68KB
-
memory/4748-326-0x0000000000DC0000-0x0000000000DFE000-memory.dmpFilesize
248KB
-
memory/4748-335-0x00000000056A0000-0x0000000005706000-memory.dmpFilesize
408KB
-
memory/4748-280-0x0000000000000000-mapping.dmp
-
memory/4768-199-0x0000000000000000-mapping.dmp
-
memory/4768-210-0x00000234E9370000-0x00000234E93E0000-memory.dmpFilesize
448KB
-
memory/4932-449-0x0000000000000000-mapping.dmp
-
memory/4956-327-0x0000000000000000-mapping.dmp
-
memory/4980-431-0x0000000000000000-mapping.dmp
-
memory/5000-456-0x0000000000000000-mapping.dmp
-
memory/5096-187-0x0000000000000000-mapping.dmp
-
memory/5096-433-0x0000000000000000-mapping.dmp