Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 13:53
Static task
static1
General
-
Target
b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe
-
Size
212KB
-
MD5
53f5844929192b3997f4dfc3e75ff9ff
-
SHA1
84edbe452fd3b46e18fbcb47d124ef1eebe1cc79
-
SHA256
b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404
-
SHA512
3cc682b121ba6f2c938add607cff597da2347d82aef378695fd87a823056f0aaa4190bab2a612b4a1baf4b19dbbc0e39eada534704c55bd3fe2bc5e680984fd8
-
SSDEEP
3072:n9BeddrIYVMjiISjLva3ad78GcP55OfR7xcZPuXtCoywgr05iWmo4H:9gdZ8ILiad78GcifR7xcZ2dCbwJido
Malware Config
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
569235DCA8F16ED8310BBACCB674F896
-
type
loader
Extracted
vidar
55.2
937
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
937
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2268-133-0x00000000001F0000-0x00000000001F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 84 632 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
1F6F.exe9CAE.exepid process 4704 1F6F.exe 3492 9CAE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9CAE.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 9CAE.exe -
Loads dropped DLL 3 IoCs
Processes:
9CAE.exepid process 3492 9CAE.exe 3492 9CAE.exe 3492 9CAE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1F6F.exedescription pid process target process PID 4704 set thread context of 632 4704 1F6F.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2840 3492 WerFault.exe 9CAE.exe 4680 4704 WerFault.exe 1F6F.exe 1808 4704 WerFault.exe 1F6F.exe 2400 4704 WerFault.exe 1F6F.exe 4844 4704 WerFault.exe 1F6F.exe 2460 4704 WerFault.exe 1F6F.exe 3608 4704 WerFault.exe 1F6F.exe 5080 4704 WerFault.exe 1F6F.exe 4192 4704 WerFault.exe 1F6F.exe 4668 4704 WerFault.exe 1F6F.exe -
Checks SCSI registry key(s) 3 TTPs 39 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exeb970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe -
Checks processor information in registry 2 TTPs 48 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1F6F.exerundll32.exe9CAE.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1F6F.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 1F6F.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9CAE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1F6F.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 1F6F.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9CAE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 1F6F.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 1F6F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet 1F6F.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 1F6F.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4216 timeout.exe -
Processes:
description ioc process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser -
Modifies registry class 21 IoCs
Processes:
OpenWith.exe1F6F.exerundll32.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 1F6F.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 2736 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exepid process 2268 b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe 2268 b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 2736 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2736 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exepid process 2268 b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 424 svchost.exe Token: SeShutdownPrivilege 424 svchost.exe Token: SeCreatePagefilePrivilege 424 svchost.exe Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 Token: SeShutdownPrivilege 2736 Token: SeCreatePagefilePrivilege 2736 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 632 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
OpenWith.exepid process 4456 OpenWith.exe 2736 2736 -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
1F6F.exe9CAE.execmd.exedescription pid process target process PID 2736 wrote to memory of 4704 2736 1F6F.exe PID 2736 wrote to memory of 4704 2736 1F6F.exe PID 2736 wrote to memory of 4704 2736 1F6F.exe PID 4704 wrote to memory of 4628 4704 1F6F.exe agentactivationruntimestarter.exe PID 4704 wrote to memory of 4628 4704 1F6F.exe agentactivationruntimestarter.exe PID 4704 wrote to memory of 4628 4704 1F6F.exe agentactivationruntimestarter.exe PID 2736 wrote to memory of 3492 2736 9CAE.exe PID 2736 wrote to memory of 3492 2736 9CAE.exe PID 2736 wrote to memory of 3492 2736 9CAE.exe PID 3492 wrote to memory of 920 3492 9CAE.exe cmd.exe PID 3492 wrote to memory of 920 3492 9CAE.exe cmd.exe PID 3492 wrote to memory of 920 3492 9CAE.exe cmd.exe PID 920 wrote to memory of 4216 920 cmd.exe timeout.exe PID 920 wrote to memory of 4216 920 cmd.exe timeout.exe PID 920 wrote to memory of 4216 920 cmd.exe timeout.exe PID 4704 wrote to memory of 632 4704 1F6F.exe rundll32.exe PID 4704 wrote to memory of 632 4704 1F6F.exe rundll32.exe PID 4704 wrote to memory of 632 4704 1F6F.exe rundll32.exe PID 4704 wrote to memory of 632 4704 1F6F.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe"C:\Users\Admin\AppData\Local\Temp\b970ea956c0e0ea1ca38400e4693fd7ea6d72195d15f476b1c240c65b4225404.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1F6F.exeC:\Users\Admin\AppData\Local\Temp\1F6F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\agentactivationruntimestarter.exeC:\Windows\system32\agentactivationruntimestarter.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 6522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 9322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10082⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 11442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 12122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 12202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 10682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 14882⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x320 0x33c1⤵
-
C:\Users\Admin\AppData\Local\Temp\9CAE.exeC:\Users\Admin\AppData\Local\Temp\9CAE.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9CAE.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 19242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3492 -ip 34921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4704 -ip 47041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4704 -ip 47041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4704 -ip 47041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4704 -ip 47041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4704 -ip 47041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4704 -ip 47041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4704 -ip 47041⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4704 -ip 47041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4704 -ip 47041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\ProgramData\sqlite3.dllFilesize
1.1MB
MD51f44d4d3087c2b202cf9c90ee9d04b0f
SHA1106a3ebc9e39ab6ddb3ff987efb6527c956f192d
SHA2564841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
SHA512b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45
-
C:\Users\Admin\AppData\Local\Temp\06e2a386-e288-47d2-9ed4-4891d5859cba.tmpFilesize
25KB
MD59f670566b87be47f09e3871cd67ed6d9
SHA18b49dd7fb4bf06df0a16cfc03a42832b78bdfabd
SHA256d7089602fa181dfd161165dc1bb34271e7481f88ee2ca06230da2a2269a68c80
SHA5126e53a2d3c4329114f7e562d84bcb6345176ce4d7006c9d699d6dab9886d5aa277b5b8fe5cfb9e574a49e0c1de6414efa913cf9b3ffecd95e9fafa28370fc2456
-
C:\Users\Admin\AppData\Local\Temp\1F6F.exeFilesize
8.4MB
MD5203629921fccb8846f944f46ca80498a
SHA1de60c837f0faa8f8dfa26710f2d74d1048bace09
SHA2564f3b96b84ed2763ac10ea655ae70be9f9445b5b48f5aa10ffc91df2649c3b9a1
SHA512edd6cace28d1c7c87d9358d7d521860cec967f896ceb2350e24d43b84388d239852af2193075c714aabbde9619f6dc758d244eefd1fc9fedefd151ebf398b72b
-
C:\Users\Admin\AppData\Local\Temp\1F6F.exeFilesize
8.4MB
MD5203629921fccb8846f944f46ca80498a
SHA1de60c837f0faa8f8dfa26710f2d74d1048bace09
SHA2564f3b96b84ed2763ac10ea655ae70be9f9445b5b48f5aa10ffc91df2649c3b9a1
SHA512edd6cace28d1c7c87d9358d7d521860cec967f896ceb2350e24d43b84388d239852af2193075c714aabbde9619f6dc758d244eefd1fc9fedefd151ebf398b72b
-
C:\Users\Admin\AppData\Local\Temp\33656f68-1eda-4542-a840-febaee7bb38c.tmpFilesize
21KB
MD5301ea18f32584b0102b1e4f710c6054d
SHA1e970ec47138c443ec94a4c3671622f578ed09a26
SHA2567f4e382d1c6724a5f173f3617e35d5ad74c28ffce9a918f00b48c88f978dc34e
SHA5123c1dd0687ff4a98324f8f0c054e2bf24a3adc2edb28a4ee095f5e71d5943702bcdf36b4c5b2e163e17cc207833194539ed98b7830e94ac446a9d48d29837627b
-
C:\Users\Admin\AppData\Local\Temp\9CAE.exeFilesize
332KB
MD5e75ec445beb33e400201791a3fba433d
SHA1a2c29449d05c2a26077e45dfcb45e37ef7c638a8
SHA256f16953dfb98fb54bde6e9410883839e228ee09aa0a09892ab56a5ddfc76e7a0e
SHA5124efdb748bcaef9aa1ca5bc934d5797f692a7bbd974fc675318124a4bfce62e074fd32a3033a10057a5af5cc1b9d2c7d87de316c31bce0f5b7d61983f1f967134
-
C:\Users\Admin\AppData\Local\Temp\9CAE.exeFilesize
332KB
MD5e75ec445beb33e400201791a3fba433d
SHA1a2c29449d05c2a26077e45dfcb45e37ef7c638a8
SHA256f16953dfb98fb54bde6e9410883839e228ee09aa0a09892ab56a5ddfc76e7a0e
SHA5124efdb748bcaef9aa1ca5bc934d5797f692a7bbd974fc675318124a4bfce62e074fd32a3033a10057a5af5cc1b9d2c7d87de316c31bce0f5b7d61983f1f967134
-
C:\Users\Admin\AppData\Local\Temp\JavaDeployReg.logFilesize
25KB
MD59d10f854940df634ca840710b5bab312
SHA14fbced512f60578a918a6a099b1d898586204add
SHA256d29a41b75f239f44583c1bba3120b2adaea44e4a3e22a75609590ce213d1690c
SHA51219a28b906bc1353def4dc3012c282ad313edcd8279931228bd7d5e124872c0b2b6baf033302ae3ba6fb4a84caf0d581856b79405117e9605838f163ad1ec9381
-
C:\Users\Admin\AppData\Local\Temp\StructuredQuery.logFilesize
4KB
MD5b2c73bb7e8ac5639eec536a1cee5abd5
SHA127ac80503aa3827fef879b5ae4e8546da1285f3d
SHA256c7ac663de6c20c909c93ed1fa786259400c56bee376191eeb3c1534ea66a2357
SHA51257c6314370840a96847d16f26a1f60b1e57647b67692f8deab92e4120b657a3eac7d001cdca0467c32cefe74a0450f1076d7eb484712a4e45edc0d0bd3db3de8
-
C:\Users\Admin\AppData\Local\Temp\Syhidsduo.tmpFilesize
3.3MB
MD513d0ff809f24a408728fd6fe00241020
SHA1fde8484da982eceb86cf6959460ffc4ce33271a9
SHA256db9190e9eb5298547a3d266f298ec1e7ede0426841da9512f2827f1e7c027520
SHA51238dd1c523eb9f5aa1c3da0e95f4064f22fc191ce8cea20803c5f60fcbc40d83f5c3545529863ca18f4e65b3ea7a8eddc247ae0db11c6ffa70af560998611e768
-
C:\Users\Admin\AppData\Local\Temp\cfe41bad-7702-44b9-a75b-0d441f0b4c89.tmpFilesize
19KB
MD5613b4d43b64a6d9630f389c4e12295b4
SHA106bef00ff378997f9b05d77c78563e01fb713e2d
SHA256bbe5def034f4c1e6c16beb775ecbbbbe5e6f1aa8100639e87997c9f656a002c6
SHA5123d48d3dbd49750d6154a3ecde4f60b7ba0cdfbf4781357971102222707ff9a6ee34f5cdbbb64111e3b43bf3946c1fdfb5024d1bcf710e13a850b257c61e5a365
-
C:\Users\Admin\AppData\Local\Temp\chrome_installer.logFilesize
1KB
MD5091273cc1c8af4685479773a5b6e934c
SHA1ca85fe18112ec1d5ed96c92b028d89fff2a3e7ec
SHA25620474d11631d0ff4a3c85b6c2f72b83dc866b20564f524e8dc4fb48120218432
SHA51232038cbe5275a92da8a2473965fb8a01d9cd3f5e8732575bbab3880d029a4cb67e19d8aae4026122b7f209c5d82222bcd150008fdd6f21f2c43851c3a18fa5dd
-
C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI75EB.txtFilesize
427KB
MD53985038f29b713900987fcec7309e4a4
SHA1a4efcafafc5f74db7531afd05d04ebb9b295091a
SHA256473401815de632e2a0991f99eeec41b583aa0256a3df3538af444ca2275a6af1
SHA5125d7d994b49c3c21ef0a7e71ec729b2e857f2596500f6fa000c3229fcfd32b6a3f0f4316d3ef8b4e7585ab21a34c71388154ed61fe65e5ed8a02c883de72ed828
-
C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI75EB.txtFilesize
11KB
MD530641abfdbbbfae51f702a1c8c8ddbef
SHA1ffcb0ed2708904f75756cc834fe004a0070994d2
SHA256095ff071270b4125d9b1260caaa26c27d2045fd10245691b72a9132213e74f15
SHA5128edb8eee4e0112d6140ccc7dcbd7cb4acd8c6ffa1625bf537605e144a516ea9596d5a864b91b34ede51f42c0ad6abd1c41557d15a64912502ecea67b8e8d42c3
-
C:\Users\Admin\AppData\Local\Temp\f1289b69-6512-49b4-94c5-178649e284db.tmpFilesize
22KB
MD599e972f6d63ded5a9f3d6a06ff481bec
SHA1b3c98ed6975c649454bce3d88806ad1883e22327
SHA256d6f11c606729d553e9c9b3d0db9e5d51567ea969bedd98008cce7b9415a17490
SHA512ecc322a906b25ea835fdfcb528fb0bc11ade80112b9d0783f0c02100a83368b718c45ca5bdbe38c106e3559db7723dc2fdf38e2bf473fb461ddade999d02f416
-
C:\Users\Admin\AppData\Local\Temp\jawshtml.htmlFilesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
C:\Users\Admin\AppData\Local\Temp\wct3A06.tmpFilesize
62KB
MD52e8f497235815362c3d2fe5f4d56010c
SHA1c6c9c84fbdb7b85261ba818adbc18cab8158d692
SHA2564420111c2dcd4928407eb5dec0c7270d382375392635959c816faf8b50cb95e3
SHA512046993e0cbc526bda57a098cbe3902cc1ee81f90540fadd9004a2ac800b6f37703222986de994a07c175555c51cb641e2f71e9c560b6f174fe039b8dc1217133
-
C:\Users\Admin\AppData\Local\Temp\wctFE60.tmpFilesize
62KB
MD52e8f497235815362c3d2fe5f4d56010c
SHA1c6c9c84fbdb7b85261ba818adbc18cab8158d692
SHA2564420111c2dcd4928407eb5dec0c7270d382375392635959c816faf8b50cb95e3
SHA512046993e0cbc526bda57a098cbe3902cc1ee81f90540fadd9004a2ac800b6f37703222986de994a07c175555c51cb641e2f71e9c560b6f174fe039b8dc1217133
-
C:\Users\Admin\AppData\Local\Temp\wmsetup.logFilesize
697B
MD5fe4f6a24e5ab9d2d90051411307cf3a8
SHA1a65b12b4d8e225eda13862b7ed6f30f56abb9569
SHA2565ffbef5b65d7969e912ccdad478d225a1927480b6da0f6fa30156ca5eddb7ef5
SHA5126e6159b5b13f21a2c13cffd92496d384aad7871fc2af079870b12068f9b646a785841b486c94993076cd25638ec8a0abb4aee5451d9602f05469e220f0747c0d
-
memory/632-191-0x00000000033A0000-0x0000000003E52000-memory.dmpFilesize
10.7MB
-
memory/632-170-0x0000000000000000-mapping.dmp
-
memory/632-176-0x00000000033A0000-0x0000000003E52000-memory.dmpFilesize
10.7MB
-
memory/632-173-0x0000000000EC0000-0x0000000001852000-memory.dmpFilesize
9.6MB
-
memory/632-174-0x0000000003EA0000-0x0000000003FE0000-memory.dmpFilesize
1.2MB
-
memory/632-175-0x0000000003EA0000-0x0000000003FE0000-memory.dmpFilesize
1.2MB
-
memory/632-172-0x00000000033A0000-0x0000000003E52000-memory.dmpFilesize
10.7MB
-
memory/920-153-0x0000000000000000-mapping.dmp
-
memory/2268-132-0x0000000000862000-0x0000000000872000-memory.dmpFilesize
64KB
-
memory/2268-135-0x0000000000400000-0x0000000000592000-memory.dmpFilesize
1.6MB
-
memory/2268-134-0x0000000000400000-0x0000000000592000-memory.dmpFilesize
1.6MB
-
memory/2268-133-0x00000000001F0000-0x00000000001F9000-memory.dmpFilesize
36KB
-
memory/3492-148-0x0000000000A90000-0x0000000000AD9000-memory.dmpFilesize
292KB
-
memory/3492-156-0x0000000000400000-0x00000000005B1000-memory.dmpFilesize
1.7MB
-
memory/3492-144-0x0000000000000000-mapping.dmp
-
memory/3492-147-0x00000000008A3000-0x00000000008CF000-memory.dmpFilesize
176KB
-
memory/3492-149-0x0000000000400000-0x00000000005B1000-memory.dmpFilesize
1.7MB
-
memory/3492-155-0x00000000008A3000-0x00000000008CF000-memory.dmpFilesize
176KB
-
memory/4216-154-0x0000000000000000-mapping.dmp
-
memory/4628-139-0x0000000000000000-mapping.dmp
-
memory/4704-165-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-171-0x0000000000400000-0x0000000000DE1000-memory.dmpFilesize
9.9MB
-
memory/4704-161-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-160-0x0000000004C70000-0x0000000005722000-memory.dmpFilesize
10.7MB
-
memory/4704-159-0x0000000004C70000-0x0000000005722000-memory.dmpFilesize
10.7MB
-
memory/4704-158-0x0000000000400000-0x0000000000DE1000-memory.dmpFilesize
9.9MB
-
memory/4704-157-0x0000000000400000-0x0000000000DE1000-memory.dmpFilesize
9.9MB
-
memory/4704-163-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-164-0x0000000004C70000-0x0000000005722000-memory.dmpFilesize
10.7MB
-
memory/4704-162-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-166-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-169-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-168-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-143-0x0000000000400000-0x0000000000DE1000-memory.dmpFilesize
9.9MB
-
memory/4704-142-0x0000000000400000-0x0000000000DE1000-memory.dmpFilesize
9.9MB
-
memory/4704-141-0x00000000033A0000-0x0000000003D76000-memory.dmpFilesize
9.8MB
-
memory/4704-140-0x00000000011BE000-0x00000000019F9000-memory.dmpFilesize
8.2MB
-
memory/4704-167-0x00000000059D0000-0x0000000005B10000-memory.dmpFilesize
1.2MB
-
memory/4704-136-0x0000000000000000-mapping.dmp
-
memory/4704-192-0x0000000004C70000-0x0000000005722000-memory.dmpFilesize
10.7MB