Analysis
-
max time kernel
186s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 21:52
Static task
static1
Behavioral task
behavioral1
Sample
f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe
Resource
win7-20230831-en
General
-
Target
f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe
-
Size
1.0MB
-
MD5
a63a902dfb9fc1e48b31397ae837c006
-
SHA1
ae737105ba77f00b4038d3c7ceef90cd08643277
-
SHA256
f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e
-
SHA512
85c1819dff76e27fe5cd015c744a054f8dfae1f34d3e89decbf0054e882beaddc574049b2d0940bf110c159a6951f9699ae87bebf4983fc36799ade081aec714
-
SSDEEP
24576:nyy/zk29xKQrDLVWsSuV8D56dGmz9yWDMTtGKD:yyLkwXrPVWs9VI4MR
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3768-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3768-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3768-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3768-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7017533.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7017533.exe healer behavioral2/memory/3224-35-0x0000000000A00000-0x0000000000A0A000-memory.dmp healer -
Processes:
q7017533.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q7017533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q7017533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q7017533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q7017533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q7017533.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q7017533.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
uHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exet7488385.exeexplothe.exeu0819129.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation uHg09PMgYHoloMh.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation uHg09PMgYHoloMh.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t7488385.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u0819129.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 24 IoCs
Processes:
z3680480.exez5282585.exez4720050.exez0569714.exeq7017533.exer6288267.exes2497507.exet7488385.exeexplothe.exeu0819129.exelegota.exew2638348.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exelegota.exeexplothe.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exeWindows.exepid process 1296 z3680480.exe 2176 z5282585.exe 4484 z4720050.exe 2076 z0569714.exe 3224 q7017533.exe 1356 r6288267.exe 3736 s2497507.exe 1416 t7488385.exe 1664 explothe.exe 4204 u0819129.exe 4884 legota.exe 4104 w2638348.exe 5056 uHg09PMgYHoloMh.exe 3108 uHg09PMgYHoloMh.exe 2620 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 5008 uHg09PMgYHoloMh.exe 1760 uHg09PMgYHoloMh.exe 4336 legota.exe 3760 explothe.exe 3216 uHg09PMgYHoloMh.exe 2620 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 4432 Windows.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4680 rundll32.exe 4876 rundll32.exe -
Processes:
q7017533.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q7017533.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exez3680480.exez5282585.exez4720050.exez0569714.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3680480.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5282585.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4720050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z0569714.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
r6288267.exes2497507.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exedescription pid process target process PID 1356 set thread context of 3768 1356 r6288267.exe AppLaunch.exe PID 3736 set thread context of 3812 3736 s2497507.exe AppLaunch.exe PID 5056 set thread context of 1760 5056 uHg09PMgYHoloMh.exe uHg09PMgYHoloMh.exe PID 1760 set thread context of 1972 1760 uHg09PMgYHoloMh.exe uHg09PMgYHoloMh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 392 3768 WerFault.exe AppLaunch.exe 4864 1356 WerFault.exe r6288267.exe 1680 3736 WerFault.exe s2497507.exe -
Checks SCSI registry key(s) 3 TTPs 22 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4420 schtasks.exe 2544 schtasks.exe 4984 schtasks.exe 2192 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1416 timeout.exe -
Processes:
SearchApp.exeSearchApp.exeSearchApp.exeSearchApp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
Processes:
explorer.exeSearchApp.exeSearchApp.exeSearchApp.exeSearchApp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKw SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133392317504598019" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
q7017533.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exepid process 3224 q7017533.exe 3224 q7017533.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 5056 uHg09PMgYHoloMh.exe 1760 uHg09PMgYHoloMh.exe 1760 uHg09PMgYHoloMh.exe 1760 uHg09PMgYHoloMh.exe 1760 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe 1972 uHg09PMgYHoloMh.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
q7017533.exeuHg09PMgYHoloMh.exeexplorer.exeuHg09PMgYHoloMh.exeuHg09PMgYHoloMh.exedescription pid process Token: SeDebugPrivilege 3224 q7017533.exe Token: SeDebugPrivilege 5056 uHg09PMgYHoloMh.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeDebugPrivilege 1760 uHg09PMgYHoloMh.exe Token: SeDebugPrivilege 1972 uHg09PMgYHoloMh.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe Token: SeShutdownPrivilege 848 explorer.exe Token: SeCreatePagefilePrivilege 848 explorer.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
Processes:
explorer.exepid process 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
explorer.exepid process 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe 848 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
StartMenuExperienceHost.exeSearchApp.exeSearchApp.exeSearchApp.exeSearchApp.exepid process 3204 StartMenuExperienceHost.exe 3976 SearchApp.exe 4244 SearchApp.exe 5036 SearchApp.exe 680 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exez3680480.exez5282585.exez4720050.exez0569714.exer6288267.exes2497507.exet7488385.exeu0819129.exeexplothe.exelegota.exedescription pid process target process PID 3760 wrote to memory of 1296 3760 f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe z3680480.exe PID 3760 wrote to memory of 1296 3760 f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe z3680480.exe PID 3760 wrote to memory of 1296 3760 f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe z3680480.exe PID 1296 wrote to memory of 2176 1296 z3680480.exe z5282585.exe PID 1296 wrote to memory of 2176 1296 z3680480.exe z5282585.exe PID 1296 wrote to memory of 2176 1296 z3680480.exe z5282585.exe PID 2176 wrote to memory of 4484 2176 z5282585.exe z4720050.exe PID 2176 wrote to memory of 4484 2176 z5282585.exe z4720050.exe PID 2176 wrote to memory of 4484 2176 z5282585.exe z4720050.exe PID 4484 wrote to memory of 2076 4484 z4720050.exe z0569714.exe PID 4484 wrote to memory of 2076 4484 z4720050.exe z0569714.exe PID 4484 wrote to memory of 2076 4484 z4720050.exe z0569714.exe PID 2076 wrote to memory of 3224 2076 z0569714.exe q7017533.exe PID 2076 wrote to memory of 3224 2076 z0569714.exe q7017533.exe PID 2076 wrote to memory of 1356 2076 z0569714.exe r6288267.exe PID 2076 wrote to memory of 1356 2076 z0569714.exe r6288267.exe PID 2076 wrote to memory of 1356 2076 z0569714.exe r6288267.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 1356 wrote to memory of 3768 1356 r6288267.exe AppLaunch.exe PID 4484 wrote to memory of 3736 4484 z4720050.exe s2497507.exe PID 4484 wrote to memory of 3736 4484 z4720050.exe s2497507.exe PID 4484 wrote to memory of 3736 4484 z4720050.exe s2497507.exe PID 3736 wrote to memory of 4020 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 4020 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 4020 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 3736 wrote to memory of 3812 3736 s2497507.exe AppLaunch.exe PID 2176 wrote to memory of 1416 2176 z5282585.exe t7488385.exe PID 2176 wrote to memory of 1416 2176 z5282585.exe t7488385.exe PID 2176 wrote to memory of 1416 2176 z5282585.exe t7488385.exe PID 1416 wrote to memory of 1664 1416 t7488385.exe explothe.exe PID 1416 wrote to memory of 1664 1416 t7488385.exe explothe.exe PID 1416 wrote to memory of 1664 1416 t7488385.exe explothe.exe PID 1296 wrote to memory of 4204 1296 z3680480.exe u0819129.exe PID 1296 wrote to memory of 4204 1296 z3680480.exe u0819129.exe PID 1296 wrote to memory of 4204 1296 z3680480.exe u0819129.exe PID 4204 wrote to memory of 4884 4204 u0819129.exe legota.exe PID 4204 wrote to memory of 4884 4204 u0819129.exe legota.exe PID 4204 wrote to memory of 4884 4204 u0819129.exe legota.exe PID 1664 wrote to memory of 4420 1664 explothe.exe schtasks.exe PID 1664 wrote to memory of 4420 1664 explothe.exe schtasks.exe PID 1664 wrote to memory of 4420 1664 explothe.exe schtasks.exe PID 1664 wrote to memory of 2344 1664 explothe.exe cmd.exe PID 1664 wrote to memory of 2344 1664 explothe.exe cmd.exe PID 1664 wrote to memory of 2344 1664 explothe.exe cmd.exe PID 3760 wrote to memory of 4104 3760 f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe w2638348.exe PID 3760 wrote to memory of 4104 3760 f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe w2638348.exe PID 3760 wrote to memory of 4104 3760 f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe w2638348.exe PID 4884 wrote to memory of 2544 4884 legota.exe schtasks.exe PID 4884 wrote to memory of 2544 4884 legota.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe"C:\Users\Admin\AppData\Local\Temp\f55bb7dc18e7c53132fa85ab1318295c3b606f8167372ca2a76ff1767fa4186e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3680480.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3680480.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5282585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5282585.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4720050.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4720050.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0569714.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0569714.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7017533.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7017533.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6288267.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6288267.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 5648⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 1487⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2497507.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2497507.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 6046⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7488385.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7488385.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0819129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0819129.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\utKbuj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp64CB.tmp"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"{path}"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"{path}"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"{path}"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"7⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"' & exit8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"'9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp87E3.tmp.bat""8⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 39⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"9⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exe"{path}"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2638348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2638348.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1356 -ip 13561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3736 -ip 37361⤵
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\uHg09PMgYHoloMh.exe.logFilesize
1KB
MD5bb3d30439ec1e6435c3eac4df8c1d2e3
SHA1c901d5946e53ae0a9e2417c8dfaf5786a0037422
SHA256182adf89e57f80a92db9a5e13105cd59544f37855ca35f98116a0182ddd3b2e6
SHA512d3547aadf665ce2552b3dfa350b80a5e813aa346870fb2b05a3b998096eebf563143bffe964e0f7243761b79420d1adf02f735779902901d1a41a1f35c557572
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xmlFilesize
96B
MD54114b63fafc98d9307dc8bfae1c379cd
SHA18959adf99facaf14c6be813470286c448b0e0b44
SHA256f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f
SHA51251eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xmlFilesize
96B
MD54114b63fafc98d9307dc8bfae1c379cd
SHA18959adf99facaf14c6be813470286c448b0e0b44
SHA256f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f
SHA51251eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xmlFilesize
96B
MD54114b63fafc98d9307dc8bfae1c379cd
SHA18959adf99facaf14c6be813470286c448b0e0b44
SHA256f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f
SHA51251eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\1000117001\uHg09PMgYHoloMh.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2638348.exeFilesize
23KB
MD5cb4c8f02ebfd0fba7f98c3f803d11b9b
SHA1d0ae9d023dfef87088593f216da48f974f024928
SHA25631a26c0c7033ac9efaa49f1b43efe67628318fe1f62e4fd7cfc4b6085cf0efed
SHA5125ae0e6b301bed6f68810c63c3b5e8e506f32daa63a4e1a745d9e45d06ab61289693dc712ed3a7ca4ad136755c043af8358cc79d6084813c753562d83e18d83c8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2638348.exeFilesize
23KB
MD5cb4c8f02ebfd0fba7f98c3f803d11b9b
SHA1d0ae9d023dfef87088593f216da48f974f024928
SHA25631a26c0c7033ac9efaa49f1b43efe67628318fe1f62e4fd7cfc4b6085cf0efed
SHA5125ae0e6b301bed6f68810c63c3b5e8e506f32daa63a4e1a745d9e45d06ab61289693dc712ed3a7ca4ad136755c043af8358cc79d6084813c753562d83e18d83c8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3680480.exeFilesize
973KB
MD5462cbc2e9e8099573446d1cd43b993ba
SHA1dcb9d2ca0e36eed35e2ef714f70a3bf310f9c885
SHA256d0eef463b7962a556af50fec8207085921aa34349e159fa5ec4f2a23bead0009
SHA512f0a63b408662a851340fea07f7ca8132a451a2761b2f21e9789d41d6bfcddab6a8ec0588f9bb1fb6832197d5ce524e785a9da02aa1a9e74de2765e35784c5393
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3680480.exeFilesize
973KB
MD5462cbc2e9e8099573446d1cd43b993ba
SHA1dcb9d2ca0e36eed35e2ef714f70a3bf310f9c885
SHA256d0eef463b7962a556af50fec8207085921aa34349e159fa5ec4f2a23bead0009
SHA512f0a63b408662a851340fea07f7ca8132a451a2761b2f21e9789d41d6bfcddab6a8ec0588f9bb1fb6832197d5ce524e785a9da02aa1a9e74de2765e35784c5393
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0819129.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0819129.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5282585.exeFilesize
790KB
MD50e965ae7931b3b24f92039e65ead7649
SHA1b1a8a02593a7b8bd4fe6d8fdb2695fa21dd822e7
SHA2565f0db37743d3842abccf7aa8227d45c41d1e0215e3efcab5af0ccf4a20f49dbf
SHA5121bf361d378352ce1c541434a7fdd6fc15590664ee4fb4a4c37185532024ababb1d570a5032fa97886b834f5f5b31b3f693cc99e57a45c9dec602c689f7c76985
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5282585.exeFilesize
790KB
MD50e965ae7931b3b24f92039e65ead7649
SHA1b1a8a02593a7b8bd4fe6d8fdb2695fa21dd822e7
SHA2565f0db37743d3842abccf7aa8227d45c41d1e0215e3efcab5af0ccf4a20f49dbf
SHA5121bf361d378352ce1c541434a7fdd6fc15590664ee4fb4a4c37185532024ababb1d570a5032fa97886b834f5f5b31b3f693cc99e57a45c9dec602c689f7c76985
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7488385.exeFilesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7488385.exeFilesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4720050.exeFilesize
607KB
MD5faad3ffc681bfc3affef7a7456a833ad
SHA15dc9ca813db7b226612671968f8a57eb980e8151
SHA2566605c517c191f3d0a0fb8b93dcd365e6ed829f6dab8cb8fe74f1d9374091b3c2
SHA5124b6130d4f48349e16057f2a80aea807d92d5e83f6bc3d2dae80f6425543a5c68c4b47f921fc3ef9394099ebddbef4cbd8769bf5c4ae7282d15b8619776b047c0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4720050.exeFilesize
607KB
MD5faad3ffc681bfc3affef7a7456a833ad
SHA15dc9ca813db7b226612671968f8a57eb980e8151
SHA2566605c517c191f3d0a0fb8b93dcd365e6ed829f6dab8cb8fe74f1d9374091b3c2
SHA5124b6130d4f48349e16057f2a80aea807d92d5e83f6bc3d2dae80f6425543a5c68c4b47f921fc3ef9394099ebddbef4cbd8769bf5c4ae7282d15b8619776b047c0
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2497507.exeFilesize
390KB
MD5a6ddae30b6b697b858741a87485f7b2f
SHA1f528bc094cd9752a80a91e91ce365190fe53e8f8
SHA256fbb0ebe229d47c95e71111a25e385ecca704249ddcf6069bfef5c812bb364f74
SHA51270dab95b8f2b1d04bf5a3cc154117063be7c381071211a9be3c9afed408437ba6acafc4b953b80a5279fe4eee10c5b666b2e8cf21995f6e98f6386289ac59ac6
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2497507.exeFilesize
390KB
MD5a6ddae30b6b697b858741a87485f7b2f
SHA1f528bc094cd9752a80a91e91ce365190fe53e8f8
SHA256fbb0ebe229d47c95e71111a25e385ecca704249ddcf6069bfef5c812bb364f74
SHA51270dab95b8f2b1d04bf5a3cc154117063be7c381071211a9be3c9afed408437ba6acafc4b953b80a5279fe4eee10c5b666b2e8cf21995f6e98f6386289ac59ac6
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0569714.exeFilesize
335KB
MD512c8a96482badd2cac4d8ceb6e18f63c
SHA1417f00dd8d38ae4ae7eca2e80ec674f5672b2cc1
SHA2568a34f5c532fb74ca816796c87d2aac025cd0f866740f7ca7ae61ca7d4be3753a
SHA5122dd894a10a5687fe9558db1f19161091f6d5f541f3a8a4f96c6090b2d3eaa8117d87101be43ed6df44bb8c832c4ec357e9353efa169a543daa0af7bcae79f452
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0569714.exeFilesize
335KB
MD512c8a96482badd2cac4d8ceb6e18f63c
SHA1417f00dd8d38ae4ae7eca2e80ec674f5672b2cc1
SHA2568a34f5c532fb74ca816796c87d2aac025cd0f866740f7ca7ae61ca7d4be3753a
SHA5122dd894a10a5687fe9558db1f19161091f6d5f541f3a8a4f96c6090b2d3eaa8117d87101be43ed6df44bb8c832c4ec357e9353efa169a543daa0af7bcae79f452
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7017533.exeFilesize
11KB
MD5d9df96e81b1268ea050163e53d8ffde3
SHA1ec163044735347804f92ff2d9a7c6f891835e623
SHA256bc718079551d5e7fbf9e0cea0857b2341e4d532d1fdad7e6807157f5058c3abe
SHA5127e4d94f38c55a108b6725213f6afce595061da0b9a89cff93e5c0920636550d0da171bf2df4b65938cf697b2b7bc4b7d079433d365a4c5e7d6bd73ebd3481a5e
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7017533.exeFilesize
11KB
MD5d9df96e81b1268ea050163e53d8ffde3
SHA1ec163044735347804f92ff2d9a7c6f891835e623
SHA256bc718079551d5e7fbf9e0cea0857b2341e4d532d1fdad7e6807157f5058c3abe
SHA5127e4d94f38c55a108b6725213f6afce595061da0b9a89cff93e5c0920636550d0da171bf2df4b65938cf697b2b7bc4b7d079433d365a4c5e7d6bd73ebd3481a5e
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6288267.exeFilesize
356KB
MD5850d3a8c4a2319f6986f1dc637ada6df
SHA18758651f9c2ec67e5a001a66f44c5eed49f8790f
SHA256516b07506888e7fd68c0b6eb0a8eb048553bb78f2e9b8e269c11019d78637214
SHA5123f61b3d128344471f0dba9fcad0119697fe45c0be12b439154e6b3063e69507ad7892645143903db771a9e44274661da61df370cf3ad46f0a6bb94ad91d51e44
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6288267.exeFilesize
356KB
MD5850d3a8c4a2319f6986f1dc637ada6df
SHA18758651f9c2ec67e5a001a66f44c5eed49f8790f
SHA256516b07506888e7fd68c0b6eb0a8eb048553bb78f2e9b8e269c11019d78637214
SHA5123f61b3d128344471f0dba9fcad0119697fe45c0be12b439154e6b3063e69507ad7892645143903db771a9e44274661da61df370cf3ad46f0a6bb94ad91d51e44
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeFilesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeFilesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeFilesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeFilesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
C:\Users\Admin\AppData\Local\Temp\tmp64CB.tmpFilesize
1KB
MD5b3c587ed8a5956850bb62155f143e010
SHA11961f980c1f74380b051a0d0bf221fe9cecf65e8
SHA256dec038086024fffd9f7c6d64bdd36fe7d28a6045cc8721ca1145eff83649a97c
SHA512e24e04cd30a9b08ea7b72b5e0a5c681df377a5eb2fa652cf16c386d4af34ad6d342ce6a3ba56ad51afafd731fbf49b7de64caf272c62c51e2eb6a14433c64225
-
C:\Users\Admin\AppData\Local\Temp\tmp87E3.tmp.batFilesize
151B
MD5574553f5bf1f10312f09fa0c808b3c24
SHA1e56899cb5d752b9f266cfb4a280fdace5f96e967
SHA2569a0668142d8d272c611a24aead2b1c3c78320f347cd4699adcdb2476d6e328a9
SHA512b170781b1cb9a4aabbec91182c4f9cd07c7b6c5c907ce7652e98372a5ad1f8f91c59d510d2a606527e2c37d9a0efd36ab195fc48f19eea92435b8267fe46d861
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
C:\Users\Admin\AppData\Roaming\Windows.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Roaming\Windows.exeFilesize
638KB
MD5c64c24e1d951676cbb654531afef8df2
SHA1b890f47ed399e734dc2508176397a15e8a95c831
SHA256a399f7f7abf4eef4fe4b16f67143076796c0391e6f3da869c043eb864dd9ef94
SHA512d5dbb41e1effc1c6502cb8210abf320bed597e2a0d3983655ec38a47748549d4aa355088a2356c71424abfb9939cbcd88ce2cbb0a996ff28e4038e39eb33cc91
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/680-243-0x000002CA37B60000-0x000002CA37B80000-memory.dmpFilesize
128KB
-
memory/680-245-0x000002CA38030000-0x000002CA38050000-memory.dmpFilesize
128KB
-
memory/680-241-0x000002CA37BA0000-0x000002CA37BC0000-memory.dmpFilesize
128KB
-
memory/848-140-0x0000000002DE0000-0x0000000002DE1000-memory.dmpFilesize
4KB
-
memory/1760-129-0x0000000000400000-0x00000000004B6000-memory.dmpFilesize
728KB
-
memory/1760-177-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/1760-135-0x0000000005620000-0x0000000005630000-memory.dmpFilesize
64KB
-
memory/1760-134-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/1972-173-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1972-175-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/1972-176-0x0000000005AB0000-0x0000000005AC0000-memory.dmpFilesize
64KB
-
memory/1972-181-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/3224-36-0x00007FFD81A50000-0x00007FFD82511000-memory.dmpFilesize
10.8MB
-
memory/3224-35-0x0000000000A00000-0x0000000000A0A000-memory.dmpFilesize
40KB
-
memory/3224-40-0x00007FFD81A50000-0x00007FFD82511000-memory.dmpFilesize
10.8MB
-
memory/3768-43-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3768-44-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3768-46-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3768-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3812-50-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3812-77-0x000000000A940000-0x000000000AF58000-memory.dmpFilesize
6.1MB
-
memory/3812-117-0x0000000002900000-0x0000000002910000-memory.dmpFilesize
64KB
-
memory/3812-85-0x000000000A580000-0x000000000A5CC000-memory.dmpFilesize
304KB
-
memory/3812-115-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/3812-51-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/3812-55-0x0000000000F80000-0x0000000000F86000-memory.dmpFilesize
24KB
-
memory/3812-81-0x000000000A3A0000-0x000000000A3B2000-memory.dmpFilesize
72KB
-
memory/3812-84-0x000000000A400000-0x000000000A43C000-memory.dmpFilesize
240KB
-
memory/3812-82-0x0000000002900000-0x0000000002910000-memory.dmpFilesize
64KB
-
memory/3812-78-0x000000000A470000-0x000000000A57A000-memory.dmpFilesize
1.0MB
-
memory/3976-153-0x000002696F280000-0x000002696F2A0000-memory.dmpFilesize
128KB
-
memory/3976-149-0x000002696EE70000-0x000002696EE90000-memory.dmpFilesize
128KB
-
memory/3976-147-0x000002696EEB0000-0x000002696EED0000-memory.dmpFilesize
128KB
-
memory/4244-199-0x000001F909710000-0x000001F909730000-memory.dmpFilesize
128KB
-
memory/4244-196-0x000001F909340000-0x000001F909360000-memory.dmpFilesize
128KB
-
memory/4244-198-0x000001F909300000-0x000001F909320000-memory.dmpFilesize
128KB
-
memory/4432-186-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/4432-219-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/4432-188-0x00000000059E0000-0x00000000059F0000-memory.dmpFilesize
64KB
-
memory/4432-189-0x00000000062C0000-0x0000000006614000-memory.dmpFilesize
3.3MB
-
memory/5036-234-0x000002DE6B750000-0x000002DE6B770000-memory.dmpFilesize
128KB
-
memory/5036-229-0x000002DE6B300000-0x000002DE6B320000-memory.dmpFilesize
128KB
-
memory/5036-227-0x000002DE6B340000-0x000002DE6B360000-memory.dmpFilesize
128KB
-
memory/5056-120-0x00000000057D0000-0x00000000057DC000-memory.dmpFilesize
48KB
-
memory/5056-111-0x00000000054B0000-0x0000000005542000-memory.dmpFilesize
584KB
-
memory/5056-116-0x0000000005F70000-0x00000000062C4000-memory.dmpFilesize
3.3MB
-
memory/5056-114-0x0000000005550000-0x00000000055A6000-memory.dmpFilesize
344KB
-
memory/5056-113-0x0000000005420000-0x000000000542A000-memory.dmpFilesize
40KB
-
memory/5056-112-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/5056-119-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/5056-118-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/5056-136-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB
-
memory/5056-121-0x0000000006D80000-0x0000000006E2A000-memory.dmpFilesize
680KB
-
memory/5056-122-0x0000000006F80000-0x000000000704C000-memory.dmpFilesize
816KB
-
memory/5056-110-0x00000000059C0000-0x0000000005F64000-memory.dmpFilesize
5.6MB
-
memory/5056-109-0x0000000005370000-0x000000000540C000-memory.dmpFilesize
624KB
-
memory/5056-108-0x0000000000A10000-0x0000000000AB6000-memory.dmpFilesize
664KB
-
memory/5056-107-0x00000000742C0000-0x0000000074A70000-memory.dmpFilesize
7.7MB