Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 18:57
Static task
static1
Behavioral task
behavioral1
Sample
28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe
Resource
win10-20220901-en
General
-
Target
28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe
-
Size
160KB
-
MD5
e031a0e5c3c8e1757d38033b62795fe8
-
SHA1
8200f039f4c319622ec3e0974bc23c7c3c4f6604
-
SHA256
28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8
-
SHA512
c86dbcf7b769033bc79ced47cb0fbd329148f2477aad4fe634f949e8a3ed137763fe808bad5b85de8729aa920ac785388e7bc92acd679717fed37db43bbb3544
-
SSDEEP
3072:qCADcaN8iyu4fosLfBFzS5rz5F7oGWBQkAgetAy/m8ySwxD:uDvyu6xLfB451eBQXAy/CSwJ
Malware Config
Extracted
redline
KRIPT
212.8.246.157:32348
-
auth_value
80ebe4bab7a98a7ce9c75989ff9f40b4
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
Extracted
redline
NanoID2022
185.106.92.111:2510
-
auth_value
d5913c276c6c8b5735246051bef9a412
Extracted
redline
@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)
151.80.89.233:13553
-
auth_value
fbee175162920530e6bf470c8003fa1a
Extracted
redline
Variant01
51.89.199.106:41383
-
auth_value
f9edc1d0874114c97679c32d442c2c61
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2764-145-0x0000000000730000-0x0000000000739000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/4408-414-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1948-550-0x0000000002580000-0x00000000025BE000-memory.dmp family_redline behavioral1/memory/1948-567-0x0000000004C80000-0x0000000004CBC000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000202001\RLS.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000202001\RLS.exe family_redline behavioral1/memory/2540-1011-0x0000000000870000-0x0000000000898000-memory.dmp family_redline behavioral1/memory/3352-1183-0x00000000002F0000-0x0000000000340000-memory.dmp family_redline behavioral1/memory/2272-1701-0x00000000004221B6-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
276E.exedescription pid process target process PID 3448 created 2744 3448 276E.exe taskhostw.exe -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
276E.exe3615.exe4BC0.exe5518.exe61CB.exe6C9A.exerovwer.exesvchost.exeBB57.exe40Kdfdf.exeRLS.exerhbbbbb.exerovwer.exeCleanXW.exepid process 3448 276E.exe 2324 3615.exe 3596 4BC0.exe 5032 5518.exe 1948 61CB.exe 3936 6C9A.exe 3796 rovwer.exe 4796 svchost.exe 4896 BB57.exe 2540 40Kdfdf.exe 3352 RLS.exe 4272 rhbbbbb.exe 4768 rovwer.exe 1800 CleanXW.exe -
Deletes itself 1 IoCs
Processes:
pid process 2588 -
Loads dropped DLL 6 IoCs
Processes:
276E.exe3615.exe4BC0.exepid process 3448 276E.exe 2324 3615.exe 2324 3615.exe 2324 3615.exe 2324 3615.exe 3596 4BC0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\40Kdfdf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000199001\\40Kdfdf.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\RLS.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000202001\\RLS.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhbbbbb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000203001\\rhbbbbb.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
rhbbbbb.exepid process 4272 rhbbbbb.exe 4272 rhbbbbb.exe 4272 rhbbbbb.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
276E.exeBB57.exe6C9A.exedescription pid process target process PID 3448 set thread context of 4408 3448 276E.exe ngentask.exe PID 4896 set thread context of 4120 4896 BB57.exe vbc.exe PID 3936 set thread context of 2272 3936 6C9A.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3572 4796 WerFault.exe svchost.exe 4544 4896 WerFault.exe BB57.exe 3760 3936 WerFault.exe 6C9A.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exerhbbbbb.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 rhbbbbb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID rhbbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhbbbbb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhbbbbb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rhbbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
3615.exe4BC0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3615.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3615.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4BC0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4BC0.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 776 timeout.exe 4792 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exepid process 2764 28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe 2764 28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2588 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exepid process 2764 28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exe61CB.exengentask.exedescription pid process Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeDebugPrivilege 4796 svchost.exe Token: SeDebugPrivilege 1948 61CB.exe Token: SeDebugPrivilege 4408 ngentask.exe Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
276E.exe5518.exeBB57.exerovwer.exedescription pid process target process PID 2588 wrote to memory of 3448 2588 276E.exe PID 2588 wrote to memory of 3448 2588 276E.exe PID 2588 wrote to memory of 3448 2588 276E.exe PID 2588 wrote to memory of 2324 2588 3615.exe PID 2588 wrote to memory of 2324 2588 3615.exe PID 2588 wrote to memory of 2324 2588 3615.exe PID 2588 wrote to memory of 3596 2588 4BC0.exe PID 2588 wrote to memory of 3596 2588 4BC0.exe PID 2588 wrote to memory of 3596 2588 4BC0.exe PID 2588 wrote to memory of 5032 2588 5518.exe PID 2588 wrote to memory of 5032 2588 5518.exe PID 2588 wrote to memory of 5032 2588 5518.exe PID 3448 wrote to memory of 4408 3448 276E.exe ngentask.exe PID 3448 wrote to memory of 4408 3448 276E.exe ngentask.exe PID 3448 wrote to memory of 4408 3448 276E.exe ngentask.exe PID 2588 wrote to memory of 1948 2588 61CB.exe PID 2588 wrote to memory of 1948 2588 61CB.exe PID 2588 wrote to memory of 1948 2588 61CB.exe PID 3448 wrote to memory of 4408 3448 276E.exe ngentask.exe PID 3448 wrote to memory of 4408 3448 276E.exe ngentask.exe PID 2588 wrote to memory of 3936 2588 6C9A.exe PID 2588 wrote to memory of 3936 2588 6C9A.exe PID 2588 wrote to memory of 3936 2588 6C9A.exe PID 5032 wrote to memory of 3796 5032 5518.exe rovwer.exe PID 5032 wrote to memory of 3796 5032 5518.exe rovwer.exe PID 5032 wrote to memory of 3796 5032 5518.exe rovwer.exe PID 3448 wrote to memory of 4796 3448 276E.exe svchost.exe PID 3448 wrote to memory of 4796 3448 276E.exe svchost.exe PID 2588 wrote to memory of 4896 2588 BB57.exe PID 2588 wrote to memory of 4896 2588 BB57.exe PID 2588 wrote to memory of 4896 2588 BB57.exe PID 4896 wrote to memory of 4120 4896 BB57.exe vbc.exe PID 4896 wrote to memory of 4120 4896 BB57.exe vbc.exe PID 4896 wrote to memory of 4120 4896 BB57.exe vbc.exe PID 4896 wrote to memory of 4120 4896 BB57.exe vbc.exe PID 3796 wrote to memory of 4736 3796 rovwer.exe schtasks.exe PID 3796 wrote to memory of 4736 3796 rovwer.exe schtasks.exe PID 3796 wrote to memory of 4736 3796 rovwer.exe schtasks.exe PID 4896 wrote to memory of 4120 4896 BB57.exe vbc.exe PID 3796 wrote to memory of 4684 3796 rovwer.exe cmd.exe PID 3796 wrote to memory of 4684 3796 rovwer.exe cmd.exe PID 3796 wrote to memory of 4684 3796 rovwer.exe cmd.exe PID 2588 wrote to memory of 4772 2588 explorer.exe PID 2588 wrote to memory of 4772 2588 explorer.exe PID 2588 wrote to memory of 4772 2588 explorer.exe PID 2588 wrote to memory of 4772 2588 explorer.exe PID 2588 wrote to memory of 3808 2588 explorer.exe PID 2588 wrote to memory of 3808 2588 explorer.exe PID 2588 wrote to memory of 3808 2588 explorer.exe PID 2588 wrote to memory of 1556 2588 explorer.exe PID 2588 wrote to memory of 1556 2588 explorer.exe PID 2588 wrote to memory of 1556 2588 explorer.exe PID 2588 wrote to memory of 1556 2588 explorer.exe PID 2588 wrote to memory of 4440 2588 explorer.exe PID 2588 wrote to memory of 4440 2588 explorer.exe PID 2588 wrote to memory of 4440 2588 explorer.exe PID 2588 wrote to memory of 652 2588 explorer.exe PID 2588 wrote to memory of 652 2588 explorer.exe PID 2588 wrote to memory of 652 2588 explorer.exe PID 2588 wrote to memory of 652 2588 explorer.exe PID 3796 wrote to memory of 2540 3796 rovwer.exe 40Kdfdf.exe PID 3796 wrote to memory of 2540 3796 rovwer.exe 40Kdfdf.exe PID 3796 wrote to memory of 2540 3796 rovwer.exe 40Kdfdf.exe PID 2588 wrote to memory of 3920 2588 explorer.exe
Processes
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4796 -s 11163⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe"C:\Users\Admin\AppData\Local\Temp\28eb3b2d610d7526ca75770f869e86411ad681e4e98daece538c30edae2af3d8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\276E.exeC:\Users\Admin\AppData\Local\Temp\276E.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3615.exeC:\Users\Admin\AppData\Local\Temp\3615.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3615.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\4BC0.exeC:\Users\Admin\AppData\Local\Temp\4BC0.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4BC0.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\5518.exeC:\Users\Admin\AppData\Local\Temp\5518.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe"C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000202001\RLS.exe"C:\Users\Admin\AppData\Local\Temp\1000202001\RLS.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\CleanXW.exe"C:\Users\Admin\AppData\Local\Temp\CleanXW.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000203001\rhbbbbb.exe"C:\Users\Admin\AppData\Local\Temp\1000203001\rhbbbbb.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
-
C:\Users\Admin\AppData\Local\Temp\61CB.exeC:\Users\Admin\AppData\Local\Temp\61CB.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6C9A.exeC:\Users\Admin\AppData\Local\Temp\6C9A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 5242⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\BB57.exeC:\Users\Admin\AppData\Local\Temp\BB57.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 2282⤵
- Program crash
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\freebl3.dllFilesize
669KB
MD5550686c0ee48c386dfcb40199bd076ac
SHA1ee5134da4d3efcb466081fb6197be5e12a5b22ab
SHA256edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
SHA5120b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\msvcp140.dllFilesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
C:\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\ProgramData\softokn3.dllFilesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
C:\ProgramData\vcruntime140.dllFilesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771Filesize
1KB
MD597866be8a8da5203af7cda340a04a19a
SHA15e29e7a7a097a9a1a525601e5378aa8603e53cec
SHA25658dfcb26048eff48b06dbf6c59f835ce1147e82cd50a27f792045d76d1912f18
SHA512fb8638fc112d7b832cc4f1f115081ee55f15177ea553326685c8869ee88cfc582c1eb230245d487aa5c37b0d21fe997fd183cb7292ef3c3432487c781a807fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30Filesize
1KB
MD514c4ff20c14b43d75de3a5368cda87a5
SHA19dec120ca290d7c38a157fb0d431f4626f77d277
SHA2568c76a4c67d0197425e88a7e867f8307ce83beed87a37a316a16619204dab4ee1
SHA5124314080f3d58cbf8204989d13126fe63143e99bb800ec498148b420d8af4861e292f0474e33b071577653f0719a3c9f20b9c2701bfb72b5e2a5d109343d11efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DFilesize
1KB
MD5563a798517aa1c025c554188981e5c3e
SHA1162e80b60848fea96e7e78394e381b449c89fe6d
SHA2564cab502acc5f95101ed0d57383a218605a97aba76ca953d7a54220af12029eed
SHA5128f074465f30da9d3489983593cdc99e547d39050e8d9a0b66d5e5d1c0fc2e354af27dc2783271666c2a766f1f3fc3efe514ee6e5edb002e57361d5eda947a8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771Filesize
450B
MD543fd97ecb5b69a9e63b57b737cf9c5ac
SHA1668e8c31880e67a5aba9ba567e6a6723253fc0f2
SHA2568148d248d8f5979efa1319b3e06b3c5ff579d3dbb6ed9b2e5f1360033f24e0bf
SHA512233072befdb66a4ef06ed9c659960442d559617af57fbca5a52302be51dfb52ded4624895c031175400cba42d2ce31e988f24c4b83173cbfb964ffd2e7e5244c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30Filesize
474B
MD54bf78d43027db10fe074e3d9d49f1ef7
SHA15b26de22abf4d37b98d1ae150c95d413881f7c6f
SHA2568de66cf843fc5d2ed6bb3d8ca800f4c3c81b85101e850f74e992a104ee8cdcb7
SHA5122fad387779bdb48d2f4c295cb4e80f8b773b4138062ddc079c927e9aa4f17cb4c61379c086ef68ff12f688305009329ba04b2c3c063aa117c75e42cd3d780b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DFilesize
458B
MD53fee39f82c144d8db5b2dba82f2f7186
SHA15fad9b12a5959e76d8354a17bdb2b28a6fa7e2dd
SHA256856f1b5efe099e0c653c44fd88c215c4adb9174fe3978a066736a44454bc18a5
SHA51222ba10711bc49fcb942a66781fb0f0d430509a6f3bb1361f57a3d37cfb1201c20c72ce07c8a23dee9cafe153e0a9971bb0b1283d506d4edfb007939694708ee7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\47Y28O7X.cookieFilesize
103B
MD5a5c58e32affef8716fe21326af9f6f6f
SHA162f3b823ac9f088316ab8e76ec16102c0ff67e14
SHA25630dac5e2e467f25b10bd2e3846b743c7163e17f63bb6ce17f8e5ccf81e376832
SHA51253305bdee7e2fbfb259a7628caac452caae0ad6351c4fda5185c5a7673f11b65e7504d5ae5ad9b84f35f5233d9fc3153b8efbb31fa3ee59143e5e1a90c637de6
-
C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exeFilesize
137KB
MD587ef06885fd221a86bba9e5b86a7ea7d
SHA16644db86f2d557167f442a5fe72a82de3fe943ba
SHA256ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f
SHA512c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0
-
C:\Users\Admin\AppData\Local\Temp\1000199001\40Kdfdf.exeFilesize
137KB
MD587ef06885fd221a86bba9e5b86a7ea7d
SHA16644db86f2d557167f442a5fe72a82de3fe943ba
SHA256ab5026bf6fe5d692faaf86752b4c9fa226ec49ba54cfb625579287b498eab20f
SHA512c65b38856d4995b01454754044ae7373363a02b8e228c249fee3c1c2222f2348473f0bba5a5f2e4a280cd183e57dc13423bb09f86919ccb8968c8229310c5ad0
-
C:\Users\Admin\AppData\Local\Temp\1000202001\RLS.exeFilesize
299KB
MD5e727c1daa59ee4c65bf0aac991fde330
SHA1b442ab1ea68f978d64825c8108b2f800a8113908
SHA25638d5e22812d54ff37736eed314bbf4dbb8ab42a4c0129e164c002571da77d6a3
SHA5129eeda9805d7ef5b8a652c0f374da4b304bd4e8f3a728f0a800b905f7118c1b6e95045b35206843609a9c2948bd1058c1149b4a49684a16a057c9a42d640a6bce
-
C:\Users\Admin\AppData\Local\Temp\1000202001\RLS.exeFilesize
299KB
MD5e727c1daa59ee4c65bf0aac991fde330
SHA1b442ab1ea68f978d64825c8108b2f800a8113908
SHA25638d5e22812d54ff37736eed314bbf4dbb8ab42a4c0129e164c002571da77d6a3
SHA5129eeda9805d7ef5b8a652c0f374da4b304bd4e8f3a728f0a800b905f7118c1b6e95045b35206843609a9c2948bd1058c1149b4a49684a16a057c9a42d640a6bce
-
C:\Users\Admin\AppData\Local\Temp\1000203001\rhbbbbb.exeFilesize
194KB
MD57e07cc5f9efbf669db8ec836ecaccb8a
SHA11de6f0a9d10ced14739c5b8a2ffac96c0b8c114c
SHA25644212fc0e7338e59097d84235ef677051327e3486960b2801099ab57f51de83a
SHA5120dd1eb49caa9e565c528f403c1ce5e9cbe177abe55a6af9de7d7c8db57a277a6d8a14a7e4cae4c7f7e6bac134f6afbae88cbc068f7cc1c65ee2e897cc4d4f731
-
C:\Users\Admin\AppData\Local\Temp\1000203001\rhbbbbb.exeFilesize
194KB
MD57e07cc5f9efbf669db8ec836ecaccb8a
SHA11de6f0a9d10ced14739c5b8a2ffac96c0b8c114c
SHA25644212fc0e7338e59097d84235ef677051327e3486960b2801099ab57f51de83a
SHA5120dd1eb49caa9e565c528f403c1ce5e9cbe177abe55a6af9de7d7c8db57a277a6d8a14a7e4cae4c7f7e6bac134f6afbae88cbc068f7cc1c65ee2e897cc4d4f731
-
C:\Users\Admin\AppData\Local\Temp\276E.exeFilesize
1.0MB
MD5fc78f5650188734808f725d0934650a1
SHA1e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000
SHA256319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a
SHA512d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0
-
C:\Users\Admin\AppData\Local\Temp\276E.exeFilesize
1.0MB
MD5fc78f5650188734808f725d0934650a1
SHA1e5184b4aa5de2d1121572fbfd3c2f05bf2b9a000
SHA256319ead10ec14192ea1ba28c3079e72a581bbdbb13a67a3ccbe3066dfec86179a
SHA512d74f0f7e0fb32d3ac0ef09fdd6762032044bb48ca298ee68e9e7cfd327db812bff460efe89495778febddeb5fdb3d8aa3d6c1f61d1aff34dcaa0a2bf07f2f3f0
-
C:\Users\Admin\AppData\Local\Temp\3615.exeFilesize
4.2MB
MD57eaf5197588886b7b8938fc9a3ca5703
SHA1da182342d96bca85114a652c8931deefaf508e9c
SHA2564c7ce6c5e6d7de09a99ec183989046b84513c6ba9fd05c583b71b44638d16c18
SHA512260b063d0ddf2df8371e5194847b72363e5b496e0e8387e8a5d5cab9c73ea24f9326269aaa3a4f959ed0be61fbb3d7b4c11600b9a2d5d827be074300d70edf2a
-
C:\Users\Admin\AppData\Local\Temp\3615.exeFilesize
4.2MB
MD57eaf5197588886b7b8938fc9a3ca5703
SHA1da182342d96bca85114a652c8931deefaf508e9c
SHA2564c7ce6c5e6d7de09a99ec183989046b84513c6ba9fd05c583b71b44638d16c18
SHA512260b063d0ddf2df8371e5194847b72363e5b496e0e8387e8a5d5cab9c73ea24f9326269aaa3a4f959ed0be61fbb3d7b4c11600b9a2d5d827be074300d70edf2a
-
C:\Users\Admin\AppData\Local\Temp\4BC0.exeFilesize
870KB
MD512eb46ee8912279e308d88a363141e55
SHA13b7fcde0601c2caf1538775c2a041fbd63adeb1c
SHA256a5b10597178e46026905d54997a63da21c63a908ecbc2f5444456ac307339c14
SHA512cc7269bf8733fc86fda6561d438a8537086f9b9ad38e64098cdfc6d276f2e5c618e5b54364546dd0b7732140b08e3fc62e186732f97ee0a9e6180518e7ff5bad
-
C:\Users\Admin\AppData\Local\Temp\4BC0.exeFilesize
870KB
MD512eb46ee8912279e308d88a363141e55
SHA13b7fcde0601c2caf1538775c2a041fbd63adeb1c
SHA256a5b10597178e46026905d54997a63da21c63a908ecbc2f5444456ac307339c14
SHA512cc7269bf8733fc86fda6561d438a8537086f9b9ad38e64098cdfc6d276f2e5c618e5b54364546dd0b7732140b08e3fc62e186732f97ee0a9e6180518e7ff5bad
-
C:\Users\Admin\AppData\Local\Temp\5518.exeFilesize
218KB
MD5a580a3f6dfd26808af0e0c1d44df47e1
SHA1ac23f883d7e739a7bbde92549a838512f4f247cb
SHA256dde21c158a70187cafdd3763e1d38f3fed6cedba396228e10155a21e61f93721
SHA5124b1fadb92b74008bab2149501865c8328720322e67f3e9a9ee154aaae196d897427ef9553f4c996a576531731e4987c997555178a364ae9a93d1603250924ebd
-
C:\Users\Admin\AppData\Local\Temp\5518.exeFilesize
218KB
MD5a580a3f6dfd26808af0e0c1d44df47e1
SHA1ac23f883d7e739a7bbde92549a838512f4f247cb
SHA256dde21c158a70187cafdd3763e1d38f3fed6cedba396228e10155a21e61f93721
SHA5124b1fadb92b74008bab2149501865c8328720322e67f3e9a9ee154aaae196d897427ef9553f4c996a576531731e4987c997555178a364ae9a93d1603250924ebd
-
C:\Users\Admin\AppData\Local\Temp\61CB.exeFilesize
316KB
MD59ceb5f573deb561978d3ec937c1e7508
SHA18d0ab1c2ffbd840b712250d56032d08065381620
SHA256024cda3bd5937e1bcfaaa993c92c59744dca4567ed64b4cfdae870080b6c8046
SHA512d8a438915564f241934099f27f852c6a4670bdacd9dbea555b7a22da1e8ba941026572deb1499dabe1cb1b0ea5fb8d66523bf3f30fb778e540a039ee1c4bded4
-
C:\Users\Admin\AppData\Local\Temp\61CB.exeFilesize
316KB
MD59ceb5f573deb561978d3ec937c1e7508
SHA18d0ab1c2ffbd840b712250d56032d08065381620
SHA256024cda3bd5937e1bcfaaa993c92c59744dca4567ed64b4cfdae870080b6c8046
SHA512d8a438915564f241934099f27f852c6a4670bdacd9dbea555b7a22da1e8ba941026572deb1499dabe1cb1b0ea5fb8d66523bf3f30fb778e540a039ee1c4bded4
-
C:\Users\Admin\AppData\Local\Temp\6C9A.exeFilesize
217KB
MD5b67e4b134ab08107bcf196c7dc287ab7
SHA1c4869b48c45413565d422c88e7f1eae482498349
SHA256871546481d1e7ef58ee941366cfd776961d58996665e4e6f108f6b7bd58f188f
SHA51299cd23a8b2d4eb85c7559b0c8b7dffbf1688867bfeb15dbdc1df4176142a8d2a2b2845490509ef2acf1c7e4ccb3ce9d38747b33b83b060079d2decae0d9357f1
-
C:\Users\Admin\AppData\Local\Temp\6C9A.exeFilesize
217KB
MD5b67e4b134ab08107bcf196c7dc287ab7
SHA1c4869b48c45413565d422c88e7f1eae482498349
SHA256871546481d1e7ef58ee941366cfd776961d58996665e4e6f108f6b7bd58f188f
SHA51299cd23a8b2d4eb85c7559b0c8b7dffbf1688867bfeb15dbdc1df4176142a8d2a2b2845490509ef2acf1c7e4ccb3ce9d38747b33b83b060079d2decae0d9357f1
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
218KB
MD5a580a3f6dfd26808af0e0c1d44df47e1
SHA1ac23f883d7e739a7bbde92549a838512f4f247cb
SHA256dde21c158a70187cafdd3763e1d38f3fed6cedba396228e10155a21e61f93721
SHA5124b1fadb92b74008bab2149501865c8328720322e67f3e9a9ee154aaae196d897427ef9553f4c996a576531731e4987c997555178a364ae9a93d1603250924ebd
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
218KB
MD5a580a3f6dfd26808af0e0c1d44df47e1
SHA1ac23f883d7e739a7bbde92549a838512f4f247cb
SHA256dde21c158a70187cafdd3763e1d38f3fed6cedba396228e10155a21e61f93721
SHA5124b1fadb92b74008bab2149501865c8328720322e67f3e9a9ee154aaae196d897427ef9553f4c996a576531731e4987c997555178a364ae9a93d1603250924ebd
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
218KB
MD5a580a3f6dfd26808af0e0c1d44df47e1
SHA1ac23f883d7e739a7bbde92549a838512f4f247cb
SHA256dde21c158a70187cafdd3763e1d38f3fed6cedba396228e10155a21e61f93721
SHA5124b1fadb92b74008bab2149501865c8328720322e67f3e9a9ee154aaae196d897427ef9553f4c996a576531731e4987c997555178a364ae9a93d1603250924ebd
-
C:\Users\Admin\AppData\Local\Temp\BB57.exeFilesize
3.7MB
MD53f58fc4c5a06db1501ee90202434a24b
SHA1c8380642d68eb337c80dc65bb3b5a02ec98b0c35
SHA2565cabfe24e0be106db2b4394a611ea0187ddd60425d01aa1db5be558c5db50bcd
SHA5125819a184a2ab03cb08cd3c97b974d0f658ed022171a148b878e82671cb6ddf88fda93222a17f20dcb83b324359e814fb08ef764e79b6fb24287a62a800d36545
-
C:\Users\Admin\AppData\Local\Temp\BB57.exeFilesize
3.7MB
MD53f58fc4c5a06db1501ee90202434a24b
SHA1c8380642d68eb337c80dc65bb3b5a02ec98b0c35
SHA2565cabfe24e0be106db2b4394a611ea0187ddd60425d01aa1db5be558c5db50bcd
SHA5125819a184a2ab03cb08cd3c97b974d0f658ed022171a148b878e82671cb6ddf88fda93222a17f20dcb83b324359e814fb08ef764e79b6fb24287a62a800d36545
-
C:\Users\Admin\AppData\Local\Temp\CleanXW.exeFilesize
143KB
MD50cb3ac7cd47ab4deba79940a33ec102c
SHA1970f1e1a4ee74b5888be4feff5e83d35f1b060a1
SHA25675219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0
SHA512534b914537050035f556b9bdaac7207f2e64086a51c41ae52942bccc38e4dd43eaf94f69bc36fd5f6bdad54d632fd098cf5bd313c2ca61788937c954ea44e501
-
C:\Users\Admin\AppData\Local\Temp\CleanXW.exeFilesize
143KB
MD50cb3ac7cd47ab4deba79940a33ec102c
SHA1970f1e1a4ee74b5888be4feff5e83d35f1b060a1
SHA25675219979101d8d77ce67d5cc39fd1110135224ceb271efe5db2302cc38df6bb0
SHA512534b914537050035f556b9bdaac7207f2e64086a51c41ae52942bccc38e4dd43eaf94f69bc36fd5f6bdad54d632fd098cf5bd313c2ca61788937c954ea44e501
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
596KB
MD54e604bc28acac98fe832f831a010336f
SHA10aa1ef5898a583c2b56ce471f09c7be78cfbd0df
SHA256abb091c6141aee38cd754ef826d5bffc8e67a86a7ac260c912eba3f65e55ae8e
SHA51223b2d09a81da9afd5204d3cfae1f780c2defccb10745a928c4c6065a49a61fb4ade227f83d1a7e6b5310f8f188e99b10cce633778f05a43f3980c96cae1a4dd4
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
596KB
MD54e604bc28acac98fe832f831a010336f
SHA10aa1ef5898a583c2b56ce471f09c7be78cfbd0df
SHA256abb091c6141aee38cd754ef826d5bffc8e67a86a7ac260c912eba3f65e55ae8e
SHA51223b2d09a81da9afd5204d3cfae1f780c2defccb10745a928c4c6065a49a61fb4ade227f83d1a7e6b5310f8f188e99b10cce633778f05a43f3980c96cae1a4dd4
-
\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\Users\Admin\AppData\Local\Temp\advapi32.dllFilesize
426KB
MD55ddff3c6fd83d65811dcc6f08c9f84f4
SHA16c9326b30ddd5c154dda1257ffdd2c4cd9c51554
SHA256f2959b5a40ff7a49f44e2158f70d13ae7c4781a2c0242b2bc0aa049a5a927e21
SHA51235e54aa630f990eaf03b332e45d0b40a63bbfa046fccf40529d2be4bad61ff50f9a6947c5ea084b8c0f3d0e2033eb536b60a14a13fb7b9cc3480cbdf48f0d545
-
memory/216-1328-0x0000000000000000-mapping.dmp
-
memory/652-1144-0x0000000002D90000-0x0000000002DB2000-memory.dmpFilesize
136KB
-
memory/652-780-0x0000000000000000-mapping.dmp
-
memory/652-1195-0x0000000000920000-0x0000000000947000-memory.dmpFilesize
156KB
-
memory/776-1541-0x0000000000000000-mapping.dmp
-
memory/792-888-0x0000000000000000-mapping.dmp
-
memory/1392-1812-0x0000000000000000-mapping.dmp
-
memory/1556-1102-0x0000000003090000-0x0000000003099000-memory.dmpFilesize
36KB
-
memory/1556-1052-0x00000000030A0000-0x00000000030A5000-memory.dmpFilesize
20KB
-
memory/1556-721-0x0000000000000000-mapping.dmp
-
memory/1800-1592-0x0000000000000000-mapping.dmp
-
memory/1916-1301-0x0000000000000000-mapping.dmp
-
memory/1948-550-0x0000000002580000-0x00000000025BE000-memory.dmpFilesize
248KB
-
memory/1948-330-0x0000000000000000-mapping.dmp
-
memory/1948-620-0x0000000000740000-0x000000000088A000-memory.dmpFilesize
1.3MB
-
memory/1948-523-0x0000000000400000-0x000000000066D000-memory.dmpFilesize
2.4MB
-
memory/1948-518-0x0000000000670000-0x000000000071E000-memory.dmpFilesize
696KB
-
memory/1948-515-0x0000000000740000-0x000000000088A000-memory.dmpFilesize
1.3MB
-
memory/1948-563-0x0000000004D80000-0x000000000527E000-memory.dmpFilesize
5.0MB
-
memory/1948-617-0x0000000000670000-0x000000000071E000-memory.dmpFilesize
696KB
-
memory/1948-569-0x0000000004CC0000-0x0000000004D52000-memory.dmpFilesize
584KB
-
memory/1948-567-0x0000000004C80000-0x0000000004CBC000-memory.dmpFilesize
240KB
-
memory/2272-1701-0x00000000004221B6-mapping.dmp
-
memory/2324-186-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2324-187-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2324-188-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2324-189-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2324-190-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2324-191-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2324-185-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2324-183-0x0000000000000000-mapping.dmp
-
memory/2540-1011-0x0000000000870000-0x0000000000898000-memory.dmpFilesize
160KB
-
memory/2540-781-0x0000000000000000-mapping.dmp
-
memory/2648-1322-0x0000000000000000-mapping.dmp
-
memory/2764-135-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-126-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-137-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-136-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-117-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-139-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-140-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-134-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-133-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-132-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-131-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-130-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-129-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-141-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-142-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-143-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-128-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-118-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-127-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-154-0x0000000000400000-0x0000000000646000-memory.dmpFilesize
2.3MB
-
memory/2764-144-0x00000000008AA000-0x00000000008BA000-memory.dmpFilesize
64KB
-
memory/2764-138-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-124-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-125-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-145-0x0000000000730000-0x0000000000739000-memory.dmpFilesize
36KB
-
memory/2764-123-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-147-0x0000000000400000-0x0000000000646000-memory.dmpFilesize
2.3MB
-
memory/2764-122-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-148-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-146-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-149-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-121-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-120-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-119-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-150-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-152-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-151-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-153-0x00000000008AA000-0x00000000008BA000-memory.dmpFilesize
64KB
-
memory/3168-956-0x0000000000000000-mapping.dmp
-
memory/3352-932-0x0000000000000000-mapping.dmp
-
memory/3352-1183-0x00000000002F0000-0x0000000000340000-memory.dmpFilesize
320KB
-
memory/3448-169-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-174-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-155-0x0000000000000000-mapping.dmp
-
memory/3448-157-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-158-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-159-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-160-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-161-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-411-0x00000000024F0000-0x00000000025E3000-memory.dmpFilesize
972KB
-
memory/3448-328-0x0000000002640000-0x0000000002B18000-memory.dmpFilesize
4.8MB
-
memory/3448-310-0x000000000D9B0000-0x000000000DB20000-memory.dmpFilesize
1.4MB
-
memory/3448-162-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-163-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-165-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-166-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-167-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-168-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-170-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-171-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-172-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-173-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-463-0x000000000D9B0000-0x000000000DB20000-memory.dmpFilesize
1.4MB
-
memory/3448-175-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-176-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-239-0x00000000024F0000-0x00000000025E3000-memory.dmpFilesize
972KB
-
memory/3448-177-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-178-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-182-0x0000000002640000-0x0000000002B18000-memory.dmpFilesize
4.8MB
-
memory/3448-181-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-180-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-179-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3596-242-0x0000000000000000-mapping.dmp
-
memory/3796-863-0x0000000000660000-0x00000000007AA000-memory.dmpFilesize
1.3MB
-
memory/3796-904-0x0000000000400000-0x0000000000654000-memory.dmpFilesize
2.3MB
-
memory/3796-856-0x000000000094A000-0x0000000000969000-memory.dmpFilesize
124KB
-
memory/3796-511-0x0000000000000000-mapping.dmp
-
memory/3796-635-0x0000000000400000-0x0000000000654000-memory.dmpFilesize
2.3MB
-
memory/3796-625-0x0000000000660000-0x00000000007AA000-memory.dmpFilesize
1.3MB
-
memory/3796-622-0x000000000094A000-0x0000000000969000-memory.dmpFilesize
124KB
-
memory/3804-833-0x0000000000000000-mapping.dmp
-
memory/3804-1233-0x0000000003090000-0x000000000309B000-memory.dmpFilesize
44KB
-
memory/3804-1228-0x00000000030A0000-0x00000000030A6000-memory.dmpFilesize
24KB
-
memory/3808-1094-0x0000000000FE0000-0x0000000000FE9000-memory.dmpFilesize
36KB
-
memory/3808-713-0x0000000000FD0000-0x0000000000FDF000-memory.dmpFilesize
60KB
-
memory/3808-692-0x0000000000000000-mapping.dmp
-
memory/3808-707-0x0000000000FE0000-0x0000000000FE9000-memory.dmpFilesize
36KB
-
memory/3920-1201-0x0000000000820000-0x0000000000829000-memory.dmpFilesize
36KB
-
memory/3920-1188-0x0000000000830000-0x0000000000835000-memory.dmpFilesize
20KB
-
memory/3920-805-0x0000000000000000-mapping.dmp
-
memory/3936-375-0x0000000000000000-mapping.dmp
-
memory/4120-668-0x00000000004014B0-mapping.dmp
-
memory/4268-1283-0x00000000007D0000-0x00000000007D8000-memory.dmpFilesize
32KB
-
memory/4268-918-0x0000000000000000-mapping.dmp
-
memory/4272-1111-0x0000000000000000-mapping.dmp
-
memory/4408-614-0x00000000077E0000-0x0000000007D0C000-memory.dmpFilesize
5.2MB
-
memory/4408-480-0x0000000005730000-0x000000000583A000-memory.dmpFilesize
1.0MB
-
memory/4408-609-0x00000000070E0000-0x00000000072A2000-memory.dmpFilesize
1.8MB
-
memory/4408-414-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4408-591-0x0000000005AC0000-0x0000000005B26000-memory.dmpFilesize
408KB
-
memory/4408-608-0x00000000066C0000-0x0000000006710000-memory.dmpFilesize
320KB
-
memory/4408-607-0x0000000006E90000-0x0000000006F06000-memory.dmpFilesize
472KB
-
memory/4408-484-0x0000000005660000-0x0000000005672000-memory.dmpFilesize
72KB
-
memory/4408-494-0x00000000056C0000-0x000000000570B000-memory.dmpFilesize
300KB
-
memory/4408-477-0x0000000005C00000-0x0000000006206000-memory.dmpFilesize
6.0MB
-
memory/4408-489-0x0000000005840000-0x000000000587E000-memory.dmpFilesize
248KB
-
memory/4440-1184-0x0000000000DE0000-0x0000000000DE6000-memory.dmpFilesize
24KB
-
memory/4440-758-0x0000000000000000-mapping.dmp
-
memory/4440-772-0x0000000000DE0000-0x0000000000DE6000-memory.dmpFilesize
24KB
-
memory/4440-776-0x0000000000DD0000-0x0000000000DDC000-memory.dmpFilesize
48KB
-
memory/4512-1520-0x0000000000000000-mapping.dmp
-
memory/4684-669-0x0000000000000000-mapping.dmp
-
memory/4736-664-0x0000000000000000-mapping.dmp
-
memory/4772-971-0x0000000003090000-0x000000000309B000-memory.dmpFilesize
44KB
-
memory/4772-927-0x00000000030A0000-0x00000000030A7000-memory.dmpFilesize
28KB
-
memory/4772-671-0x0000000000000000-mapping.dmp
-
memory/4792-1818-0x0000000000000000-mapping.dmp
-
memory/4796-535-0x000001AC91240000-0x000001AC912D6000-memory.dmpFilesize
600KB
-
memory/4796-555-0x000001AC93220000-0x000001AC932AE000-memory.dmpFilesize
568KB
-
memory/4796-527-0x0000000000000000-mapping.dmp
-
memory/4852-1376-0x0000000000000000-mapping.dmp
-
memory/4896-601-0x0000000000000000-mapping.dmp
-
memory/4972-919-0x0000000000950000-0x000000000095D000-memory.dmpFilesize
52KB
-
memory/4972-876-0x0000000000000000-mapping.dmp
-
memory/4972-911-0x0000000000960000-0x0000000000967000-memory.dmpFilesize
28KB
-
memory/5032-519-0x0000000000400000-0x0000000000654000-memory.dmpFilesize
2.3MB
-
memory/5032-485-0x0000000000400000-0x0000000000654000-memory.dmpFilesize
2.3MB
-
memory/5032-466-0x0000000000780000-0x00000000008CA000-memory.dmpFilesize
1.3MB
-
memory/5032-299-0x0000000000000000-mapping.dmp
-
memory/5032-470-0x0000000000780000-0x00000000008CA000-memory.dmpFilesize
1.3MB