Analysis
-
max time kernel
206s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 17:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
710KB
-
MD5
e403c2bbdd544797a9d702de09165779
-
SHA1
f47a7dd5095cca86ec026990a6ca66465139c1b1
-
SHA256
3873c3bbf02f10de5e67b0da4c9002d4f936bae5aa287a83b078ae208e94f381
-
SHA512
4a0a65ddaa920fb8e1cfc525cf9efc905d98376ee46f7d0b22ca1e477c20f1b33ed426b5ce225ad05839f90a8816bb7cc58ab0ed2a1effafb92e3c4354fee5b5
-
SSDEEP
6144:tbFfUhXQel80lOImzwFO/ChdqoQ+S8BZu+2MLjb2KPhZ8NjEmfQGX3bzhj9rUrmi:tFfSQel80MUFO/Chd1q8kehZOYmDb
Malware Config
Signatures
-
Detects Smokeloader packer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/832-134-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/832-135-0x0000000000402EBC-mapping.dmp family_smokeloader behavioral1/memory/832-139-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/832-141-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
udwebn.exegeomnv.exetmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Meow\\Meow.exe\"," udwebn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Colors\\Pink.exe\"," geomnv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Google\\Plugin1.exe\"," tmp.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1804-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1804-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1804-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1804-64-0x000000000040C79E-mapping.dmp asyncrat behavioral1/memory/1804-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1804-66-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1804-70-0x0000000000450000-0x000000000045C000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
Processes:
udwebn.exegeomnv.exebajkpe.exepid process 1756 udwebn.exe 1996 geomnv.exe 976 bajkpe.exe -
Loads dropped DLL 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 1364 powershell.exe 1564 powershell.exe 1468 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tmp.exeudwebn.exegeomnv.exedescription pid process target process PID 1128 set thread context of 1804 1128 tmp.exe RegAsm.exe PID 1756 set thread context of 1868 1756 udwebn.exe RegAsm.exe PID 1996 set thread context of 832 1996 geomnv.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
tmp.exepowershell.exeRegAsm.exepowershell.exegeomnv.exepowershell.exeudwebn.exepowershell.exeRegAsm.exepowershell.exepid process 1128 tmp.exe 1364 powershell.exe 1804 RegAsm.exe 1364 powershell.exe 1364 powershell.exe 1564 powershell.exe 1564 powershell.exe 1564 powershell.exe 1804 RegAsm.exe 1996 geomnv.exe 1996 geomnv.exe 268 powershell.exe 1756 udwebn.exe 1756 udwebn.exe 1804 RegAsm.exe 1468 powershell.exe 1468 powershell.exe 1468 powershell.exe 1804 RegAsm.exe 1996 geomnv.exe 832 RegAsm.exe 832 RegAsm.exe 692 powershell.exe 1244 1244 1244 1244 1244 1244 1244 1244 1244 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
RegAsm.exepid process 832 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
tmp.exeRegAsm.exepowershell.exepowershell.exegeomnv.exepowershell.exeudwebn.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1128 tmp.exe Token: SeDebugPrivilege 1804 RegAsm.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 1996 geomnv.exe Token: SeDebugPrivilege 268 powershell.exe Token: SeDebugPrivilege 1756 udwebn.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeDebugPrivilege 692 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exeRegAsm.execmd.exepowershell.execmd.exepowershell.exegeomnv.exeudwebn.execmd.exepowershell.exedescription pid process target process PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1128 wrote to memory of 1804 1128 tmp.exe RegAsm.exe PID 1804 wrote to memory of 1424 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 1424 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 1424 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 1424 1804 RegAsm.exe cmd.exe PID 1424 wrote to memory of 1364 1424 cmd.exe powershell.exe PID 1424 wrote to memory of 1364 1424 cmd.exe powershell.exe PID 1424 wrote to memory of 1364 1424 cmd.exe powershell.exe PID 1424 wrote to memory of 1364 1424 cmd.exe powershell.exe PID 1364 wrote to memory of 1756 1364 powershell.exe udwebn.exe PID 1364 wrote to memory of 1756 1364 powershell.exe udwebn.exe PID 1364 wrote to memory of 1756 1364 powershell.exe udwebn.exe PID 1364 wrote to memory of 1756 1364 powershell.exe udwebn.exe PID 1804 wrote to memory of 1588 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 1588 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 1588 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 1588 1804 RegAsm.exe cmd.exe PID 1588 wrote to memory of 1564 1588 cmd.exe powershell.exe PID 1588 wrote to memory of 1564 1588 cmd.exe powershell.exe PID 1588 wrote to memory of 1564 1588 cmd.exe powershell.exe PID 1588 wrote to memory of 1564 1588 cmd.exe powershell.exe PID 1564 wrote to memory of 1996 1564 powershell.exe geomnv.exe PID 1564 wrote to memory of 1996 1564 powershell.exe geomnv.exe PID 1564 wrote to memory of 1996 1564 powershell.exe geomnv.exe PID 1564 wrote to memory of 1996 1564 powershell.exe geomnv.exe PID 1996 wrote to memory of 268 1996 geomnv.exe powershell.exe PID 1996 wrote to memory of 268 1996 geomnv.exe powershell.exe PID 1996 wrote to memory of 268 1996 geomnv.exe powershell.exe PID 1996 wrote to memory of 268 1996 geomnv.exe powershell.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1756 wrote to memory of 1868 1756 udwebn.exe RegAsm.exe PID 1804 wrote to memory of 524 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 524 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 524 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 524 1804 RegAsm.exe cmd.exe PID 524 wrote to memory of 1468 524 cmd.exe powershell.exe PID 524 wrote to memory of 1468 524 cmd.exe powershell.exe PID 524 wrote to memory of 1468 524 cmd.exe powershell.exe PID 524 wrote to memory of 1468 524 cmd.exe powershell.exe PID 1468 wrote to memory of 976 1468 powershell.exe bajkpe.exe PID 1468 wrote to memory of 976 1468 powershell.exe bajkpe.exe PID 1468 wrote to memory of 976 1468 powershell.exe bajkpe.exe PID 1468 wrote to memory of 976 1468 powershell.exe bajkpe.exe PID 1804 wrote to memory of 1460 1804 RegAsm.exe cmd.exe PID 1804 wrote to memory of 1460 1804 RegAsm.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\udwebn.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\udwebn.exe"'4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\udwebn.exe"C:\Users\Admin\AppData\Local\Temp\udwebn.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\geomnv.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\geomnv.exe"'4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\geomnv.exe"C:\Users\Admin\AppData\Local\Temp\geomnv.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe6⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bajkpe.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bajkpe.exe"'4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bajkpe.exe"C:\Users\Admin\AppData\Local\Temp\bajkpe.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lexnye.exe"' & exit3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lexnye.exe"'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bajkpe.exeFilesize
1.0MB
MD57217f672995942607eba0cd4fb1bb117
SHA1c0079cdb09360d3e2e9f449035f38c9dad5cad1d
SHA256ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1
SHA512d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2
-
C:\Users\Admin\AppData\Local\Temp\bajkpe.exeFilesize
1.0MB
MD57217f672995942607eba0cd4fb1bb117
SHA1c0079cdb09360d3e2e9f449035f38c9dad5cad1d
SHA256ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1
SHA512d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2
-
C:\Users\Admin\AppData\Local\Temp\geomnv.exeFilesize
2.3MB
MD5a08e5952ddaaabe4b7deaf30e3e522d3
SHA1d111978b9e2ea04f53ce48a36a4fde0e0e900ba3
SHA25652e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f
SHA5122f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea
-
C:\Users\Admin\AppData\Local\Temp\geomnv.exeFilesize
2.3MB
MD5a08e5952ddaaabe4b7deaf30e3e522d3
SHA1d111978b9e2ea04f53ce48a36a4fde0e0e900ba3
SHA25652e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f
SHA5122f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea
-
C:\Users\Admin\AppData\Local\Temp\udwebn.exeFilesize
828KB
MD5494969d84ee004227da4051403cbc098
SHA1befd216439b68c83899476ea7bf5c7eff025bdc6
SHA256c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48
SHA512ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676
-
C:\Users\Admin\AppData\Local\Temp\udwebn.exeFilesize
828KB
MD5494969d84ee004227da4051403cbc098
SHA1befd216439b68c83899476ea7bf5c7eff025bdc6
SHA256c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48
SHA512ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD57f82892467ea7d8e4f069642e2cd7bc3
SHA1d8d49ddbf77270e179a531f54facbc7ee09a51a5
SHA2568cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282
SHA512a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD57f82892467ea7d8e4f069642e2cd7bc3
SHA1d8d49ddbf77270e179a531f54facbc7ee09a51a5
SHA2568cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282
SHA512a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD57f82892467ea7d8e4f069642e2cd7bc3
SHA1d8d49ddbf77270e179a531f54facbc7ee09a51a5
SHA2568cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282
SHA512a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD57f82892467ea7d8e4f069642e2cd7bc3
SHA1d8d49ddbf77270e179a531f54facbc7ee09a51a5
SHA2568cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282
SHA512a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\bajkpe.exeFilesize
1.0MB
MD57217f672995942607eba0cd4fb1bb117
SHA1c0079cdb09360d3e2e9f449035f38c9dad5cad1d
SHA256ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1
SHA512d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2
-
\Users\Admin\AppData\Local\Temp\geomnv.exeFilesize
2.3MB
MD5a08e5952ddaaabe4b7deaf30e3e522d3
SHA1d111978b9e2ea04f53ce48a36a4fde0e0e900ba3
SHA25652e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f
SHA5122f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea
-
\Users\Admin\AppData\Local\Temp\udwebn.exeFilesize
828KB
MD5494969d84ee004227da4051403cbc098
SHA1befd216439b68c83899476ea7bf5c7eff025bdc6
SHA256c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48
SHA512ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676
-
memory/268-94-0x0000000000000000-mapping.dmp
-
memory/268-114-0x000000006D550000-0x000000006DAFB000-memory.dmpFilesize
5.7MB
-
memory/268-119-0x000000006D550000-0x000000006DAFB000-memory.dmpFilesize
5.7MB
-
memory/268-97-0x000000006D550000-0x000000006DAFB000-memory.dmpFilesize
5.7MB
-
memory/524-115-0x0000000000000000-mapping.dmp
-
memory/692-126-0x0000000000000000-mapping.dmp
-
memory/692-140-0x000000006E8E0000-0x000000006EE8B000-memory.dmpFilesize
5.7MB
-
memory/832-131-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/832-132-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/832-134-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/832-135-0x0000000000402EBC-mapping.dmp
-
memory/832-141-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/832-139-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/976-137-0x0000000000AB0000-0x0000000000BC2000-memory.dmpFilesize
1.1MB
-
memory/976-142-0x00000000020E0000-0x0000000002128000-memory.dmpFilesize
288KB
-
memory/976-123-0x0000000000000000-mapping.dmp
-
memory/976-138-0x0000000002030000-0x00000000020E6000-memory.dmpFilesize
728KB
-
memory/1128-56-0x0000000004870000-0x0000000004902000-memory.dmpFilesize
584KB
-
memory/1128-55-0x00000000004B0000-0x000000000050C000-memory.dmpFilesize
368KB
-
memory/1128-57-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/1128-54-0x00000000000C0000-0x0000000000178000-memory.dmpFilesize
736KB
-
memory/1364-74-0x000000006E3D0000-0x000000006E97B000-memory.dmpFilesize
5.7MB
-
memory/1364-72-0x0000000000000000-mapping.dmp
-
memory/1364-79-0x000000006E3D0000-0x000000006E97B000-memory.dmpFilesize
5.7MB
-
memory/1424-71-0x0000000000000000-mapping.dmp
-
memory/1460-125-0x0000000000000000-mapping.dmp
-
memory/1468-130-0x000000006CFA0000-0x000000006D54B000-memory.dmpFilesize
5.7MB
-
memory/1468-121-0x000000006CFA0000-0x000000006D54B000-memory.dmpFilesize
5.7MB
-
memory/1468-116-0x0000000000000000-mapping.dmp
-
memory/1564-81-0x0000000000000000-mapping.dmp
-
memory/1564-89-0x000000006E390000-0x000000006E93B000-memory.dmpFilesize
5.7MB
-
memory/1588-80-0x0000000000000000-mapping.dmp
-
memory/1756-98-0x000000001B070000-0x000000001B134000-memory.dmpFilesize
784KB
-
memory/1756-77-0x0000000000000000-mapping.dmp
-
memory/1756-83-0x000000013FDA0000-0x000000013FE72000-memory.dmpFilesize
840KB
-
memory/1804-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1804-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1804-70-0x0000000000450000-0x000000000045C000-memory.dmpFilesize
48KB
-
memory/1804-66-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1804-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1804-68-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1804-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1804-64-0x000000000040C79E-mapping.dmp
-
memory/1804-62-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1868-102-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-109-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-104-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-100-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-99-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-107-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-113-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-112-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1868-110-0x0000000140095CF4-mapping.dmp
-
memory/1868-106-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1996-87-0x0000000000000000-mapping.dmp
-
memory/1996-90-0x0000000000840000-0x0000000000A96000-memory.dmpFilesize
2.3MB
-
memory/1996-91-0x0000000004490000-0x0000000004538000-memory.dmpFilesize
672KB
-
memory/1996-92-0x0000000002250000-0x00000000022E2000-memory.dmpFilesize
584KB