Analysis
-
max time kernel
163s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 14:38
Static task
static1
Behavioral task
behavioral1
Sample
4D670AC64FAE74BD0C53F58673C6D826.exe
Resource
win7-20230831-en
General
-
Target
4D670AC64FAE74BD0C53F58673C6D826.exe
-
Size
422KB
-
MD5
4d670ac64fae74bd0c53f58673c6d826
-
SHA1
5fcfe71b322f91bc65f58892bb7024d78bb9b43b
-
SHA256
12975bce5682b4d6a0849c73a8924f074e9fc12e9807e1773e3d80656851d1d2
-
SHA512
f777331088ec03e39b4370a7958c4187410741ae430582943478cf7558f2c6e8152f4799f7dd121ef79abc0ae126db69ade14ea1227617fb2e50e362cb005427
-
SSDEEP
6144:WIA2TfeZd+WnuiCrnluCuSD/Tmd6et08DOUlNre2fUOi3Mw4NwoGC0vQhvxeexNh:S2G+WufnQQ/ff8DdNC/Oi3rBvQhUCjV
Malware Config
Extracted
cybergate
2.6
Victima
boxdmz.freeddns.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
COM HOST.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
gxwd
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Modifies firewall policy service 2 TTPs 5 IoCs
Processes:
regedit.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" regedit.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
regedit.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" regedit.exe -
Processes:
regedit.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" regedit.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
COM.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\COM HOST.exe" COM.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run COM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\dir\\install\\install\\COM HOST.exe" COM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run COM.exe -
Disables taskbar notifications via registry modification
-
Disables use of System Restore points 1 TTPs
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
COM.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{70NBI643-N58H-54IB-NF57-KHIF8DH40O3D} COM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70NBI643-N58H-54IB-NF57-KHIF8DH40O3D}\StubPath = "c:\\dir\\install\\install\\COM HOST.exe Restart" COM.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{70NBI643-N58H-54IB-NF57-KHIF8DH40O3D} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70NBI643-N58H-54IB-NF57-KHIF8DH40O3D}\StubPath = "c:\\dir\\install\\install\\COM HOST.exe" explorer.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4D670AC64FAE74BD0C53F58673C6D826.exe00.exeCOM.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 4D670AC64FAE74BD0C53F58673C6D826.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 00.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation COM.exe -
Executes dropped EXE 5 IoCs
Processes:
00.exeCOM.exeserver.exeCOM.exeCOM HOST.exepid process 1636 00.exe 240 COM.exe 1524 server.exe 2676 COM.exe 2792 COM HOST.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\COM.exe upx C:\Users\Admin\AppData\Local\Temp\COM.exe upx behavioral2/memory/240-26-0x0000000000400000-0x0000000000457000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\COM.exe upx behavioral2/memory/240-44-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/240-51-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4204-123-0x0000000024080000-0x00000000240E2000-memory.dmp upx \??\c:\dir\install\install\COM HOST.exe upx C:\Users\Admin\AppData\Local\Temp\COM.exe upx behavioral2/memory/2676-136-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/4204-196-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/240-197-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2676-198-0x0000000024160000-0x00000000241C2000-memory.dmp upx C:\dir\install\install\COM HOST.exe upx behavioral2/memory/2676-224-0x0000000007B70000-0x0000000007BBB000-memory.dmp upx behavioral2/memory/2676-226-0x0000000007CC0000-0x0000000007D0B000-memory.dmp upx behavioral2/memory/2676-228-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/2676-229-0x0000000007E10000-0x0000000007E5B000-memory.dmp upx behavioral2/memory/2792-552-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2676-657-0x0000000007B70000-0x0000000007BBB000-memory.dmp upx behavioral2/memory/2676-733-0x0000000007CC0000-0x0000000007D0B000-memory.dmp upx behavioral2/memory/2676-825-0x0000000007E10000-0x0000000007E5B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
COM.exeserver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "c:\\dir\\install\\install\\COM HOST.exe" COM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Windows\\win_sp.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "c:\\dir\\install\\install\\COM HOST.exe" COM.exe -
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe -
Drops file in Windows directory 5 IoCs
Processes:
4D670AC64FAE74BD0C53F58673C6D826.exeserver.exedescription ioc process File opened for modification C:\Windows\2-Alertas.reg 4D670AC64FAE74BD0C53F58673C6D826.exe File opened for modification C:\Windows\00.exe 4D670AC64FAE74BD0C53F58673C6D826.exe File created C:\Windows\win_sp.exe server.exe File opened for modification C:\Windows\win_sp.exe server.exe File opened for modification C:\Windows\1-seguridad.bat 4D670AC64FAE74BD0C53F58673C6D826.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2416 2792 WerFault.exe COM HOST.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
COM.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 COM.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom COM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 COM.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom COM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 COM.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags COM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 COM.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags COM.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
COM.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 COM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString COM.exe -
Modifies registry class 2 IoCs
Processes:
4D670AC64FAE74BD0C53F58673C6D826.exeCOM.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000_Classes\Local Settings 4D670AC64FAE74BD0C53F58673C6D826.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ COM.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 3472 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
COM.exepid process 240 COM.exe 240 COM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
COM.exepid process 2676 COM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
COM.exedescription pid process Token: SeDebugPrivilege 2676 COM.exe Token: SeDebugPrivilege 2676 COM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
COM.exepid process 240 COM.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
4D670AC64FAE74BD0C53F58673C6D826.exeserver.exepid process 2216 4D670AC64FAE74BD0C53F58673C6D826.exe 1524 server.exe 1524 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4D670AC64FAE74BD0C53F58673C6D826.execmd.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2216 wrote to memory of 2512 2216 4D670AC64FAE74BD0C53F58673C6D826.exe cmd.exe PID 2216 wrote to memory of 2512 2216 4D670AC64FAE74BD0C53F58673C6D826.exe cmd.exe PID 2216 wrote to memory of 2512 2216 4D670AC64FAE74BD0C53F58673C6D826.exe cmd.exe PID 2512 wrote to memory of 1472 2512 cmd.exe net.exe PID 2512 wrote to memory of 1472 2512 cmd.exe net.exe PID 2512 wrote to memory of 1472 2512 cmd.exe net.exe PID 1472 wrote to memory of 4084 1472 net.exe net1.exe PID 1472 wrote to memory of 4084 1472 net.exe net1.exe PID 1472 wrote to memory of 4084 1472 net.exe net1.exe PID 2216 wrote to memory of 3472 2216 4D670AC64FAE74BD0C53F58673C6D826.exe regedit.exe PID 2216 wrote to memory of 3472 2216 4D670AC64FAE74BD0C53F58673C6D826.exe regedit.exe PID 2216 wrote to memory of 3472 2216 4D670AC64FAE74BD0C53F58673C6D826.exe regedit.exe PID 2512 wrote to memory of 3532 2512 cmd.exe net.exe PID 2512 wrote to memory of 3532 2512 cmd.exe net.exe PID 2512 wrote to memory of 3532 2512 cmd.exe net.exe PID 3532 wrote to memory of 4260 3532 net.exe net1.exe PID 3532 wrote to memory of 4260 3532 net.exe net1.exe PID 3532 wrote to memory of 4260 3532 net.exe net1.exe PID 2512 wrote to memory of 4124 2512 cmd.exe net.exe PID 2512 wrote to memory of 4124 2512 cmd.exe net.exe PID 2512 wrote to memory of 4124 2512 cmd.exe net.exe PID 4124 wrote to memory of 3260 4124 net.exe net1.exe PID 4124 wrote to memory of 3260 4124 net.exe net1.exe PID 4124 wrote to memory of 3260 4124 net.exe net1.exe PID 2512 wrote to memory of 780 2512 cmd.exe net.exe PID 2512 wrote to memory of 780 2512 cmd.exe net.exe PID 2512 wrote to memory of 780 2512 cmd.exe net.exe PID 780 wrote to memory of 3180 780 net.exe net1.exe PID 780 wrote to memory of 3180 780 net.exe net1.exe PID 780 wrote to memory of 3180 780 net.exe net1.exe PID 2512 wrote to memory of 472 2512 cmd.exe net.exe PID 2512 wrote to memory of 472 2512 cmd.exe net.exe PID 2512 wrote to memory of 472 2512 cmd.exe net.exe PID 472 wrote to memory of 872 472 net.exe net1.exe PID 472 wrote to memory of 872 472 net.exe net1.exe PID 472 wrote to memory of 872 472 net.exe net1.exe PID 2512 wrote to memory of 2496 2512 cmd.exe net.exe PID 2512 wrote to memory of 2496 2512 cmd.exe net.exe PID 2512 wrote to memory of 2496 2512 cmd.exe net.exe PID 2496 wrote to memory of 1644 2496 net.exe net1.exe PID 2496 wrote to memory of 1644 2496 net.exe net1.exe PID 2496 wrote to memory of 1644 2496 net.exe net1.exe PID 2512 wrote to memory of 3256 2512 cmd.exe net.exe PID 2512 wrote to memory of 3256 2512 cmd.exe net.exe PID 2512 wrote to memory of 3256 2512 cmd.exe net.exe PID 3256 wrote to memory of 3992 3256 net.exe net1.exe PID 3256 wrote to memory of 3992 3256 net.exe net1.exe PID 3256 wrote to memory of 3992 3256 net.exe net1.exe PID 2512 wrote to memory of 2764 2512 cmd.exe net.exe PID 2512 wrote to memory of 2764 2512 cmd.exe net.exe PID 2512 wrote to memory of 2764 2512 cmd.exe net.exe PID 2764 wrote to memory of 1656 2764 net.exe net1.exe PID 2764 wrote to memory of 1656 2764 net.exe net1.exe PID 2764 wrote to memory of 1656 2764 net.exe net1.exe PID 2512 wrote to memory of 2860 2512 cmd.exe net.exe PID 2512 wrote to memory of 2860 2512 cmd.exe net.exe PID 2512 wrote to memory of 2860 2512 cmd.exe net.exe PID 2860 wrote to memory of 2516 2860 net.exe net1.exe PID 2860 wrote to memory of 2516 2860 net.exe net1.exe PID 2860 wrote to memory of 2516 2860 net.exe net1.exe PID 2512 wrote to memory of 4368 2512 cmd.exe net.exe PID 2512 wrote to memory of 4368 2512 cmd.exe net.exe PID 2512 wrote to memory of 4368 2512 cmd.exe net.exe PID 4368 wrote to memory of 2116 4368 net.exe net1.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\4D670AC64FAE74BD0C53F58673C6D826.exe"C:\Users\Admin\AppData\Local\Temp\4D670AC64FAE74BD0C53F58673C6D826.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\1-seguridad.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exeNET STOP "Dispositivo host de UPnP"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Dispositivo host de UPnP"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "AntiVirService"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "AntiVirService"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "PDAgent"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "PDAgent"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Telefonia"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Telefonia"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Temas"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Temas"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Centro de Seguridad"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Centro de Seguridad"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Windows Defender"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Windows Defender"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Firewall de Windows"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Firewall de Windows"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Ready Boost"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Ready Boost"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Busqueda de Windows"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Busqueda de Windows"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Windows Update"4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Windows Update"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "Inicio de Sesion secundario"4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "Inicio de Sesion secundario"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "TapiSrv"4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "TapiSrv"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "CryptSvc"4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "CryptSvc"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "WPDBusEnum"4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "WPDBusEnum"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "BITS"4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "BITS"5⤵
-
C:\Windows\SysWOW64\net.exeNET STOP "seclogon"4⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP "seclogon"5⤵
-
C:\Windows\SysWOW64\regedit.exe"regedit.exe" "C:\Windows\2-Alertas.reg"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Runs .reg file with regedit
-
C:\Windows\00.exe"C:\Windows\00.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\COM.exe"C:\Users\Admin\AppData\Local\Temp\COM.exe"4⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies Installed Components in the registry
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\COM.exe"C:\Users\Admin\AppData\Local\Temp\COM.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\dir\install\install\COM HOST.exe"C:\dir\install\install\COM HOST.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 5767⤵
- Program crash
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Users\Admin\AppData\Local\Temp\teste.vbs"6⤵
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2792 -ip 27921⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\COM.exeFilesize
276KB
MD58c3c042dc1acef4d449684c2ca72c801
SHA14dcdfa3a99f873f9434743b4db0ae084c1d8d3ff
SHA25644dbcb5ef68916b91e16cbe932a1116f2de4e04b8be9905912272156d90187c4
SHA51270bf770fce85285908f55fa782ac0082a4b1d4e204931b8563b72b8930416997be3e7712a97b060f02bae86dffba97414cb9cb7d762cdb5c45a5c990e072278e
-
C:\Users\Admin\AppData\Local\Temp\COM.exeFilesize
276KB
MD58c3c042dc1acef4d449684c2ca72c801
SHA14dcdfa3a99f873f9434743b4db0ae084c1d8d3ff
SHA25644dbcb5ef68916b91e16cbe932a1116f2de4e04b8be9905912272156d90187c4
SHA51270bf770fce85285908f55fa782ac0082a4b1d4e204931b8563b72b8930416997be3e7712a97b060f02bae86dffba97414cb9cb7d762cdb5c45a5c990e072278e
-
C:\Users\Admin\AppData\Local\Temp\COM.exeFilesize
276KB
MD58c3c042dc1acef4d449684c2ca72c801
SHA14dcdfa3a99f873f9434743b4db0ae084c1d8d3ff
SHA25644dbcb5ef68916b91e16cbe932a1116f2de4e04b8be9905912272156d90187c4
SHA51270bf770fce85285908f55fa782ac0082a4b1d4e204931b8563b72b8930416997be3e7712a97b060f02bae86dffba97414cb9cb7d762cdb5c45a5c990e072278e
-
C:\Users\Admin\AppData\Local\Temp\COM.exeFilesize
276KB
MD58c3c042dc1acef4d449684c2ca72c801
SHA14dcdfa3a99f873f9434743b4db0ae084c1d8d3ff
SHA25644dbcb5ef68916b91e16cbe932a1116f2de4e04b8be9905912272156d90187c4
SHA51270bf770fce85285908f55fa782ac0082a4b1d4e204931b8563b72b8930416997be3e7712a97b060f02bae86dffba97414cb9cb7d762cdb5c45a5c990e072278e
-
C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txtFilesize
229KB
MD549fe94e7028ff83096397b41d46202fb
SHA19deceafcead2f448631c1b98c40755817f08011b
SHA2560e7f581d2633f52bd4c7c5253e1754c85e60fbbb384b3610413f23ac2addc86b
SHA5123c615aab5f4ac3ca0b718a55cc27df7b61638a324007a6733bc5fed4c1a46f8f9be509e518fe837cc5b1b943560838b147ac23a93bf7946c1149e2016b5658a1
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5b6dcf8c41e0a0f271c78d74b4a75a8d4
SHA173120870e977cd855f638d08846cb3848cba0222
SHA256d415c7bdc53f0726dd82370b647e6b17c4c8d07ef311e71c81ce4a18a6de7297
SHA512725e039ef07afaa43a1b719db2e1e928b526318cb049c7a12702cf0db46fa2f76574e3796f97869710f98df6cac6b0eda0e7158f830002ab6f7857e22aef0bd5
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5bedb7dd1da6a4cf0c75a41297c87f266
SHA1553cfec62cc165ab8b8a5a05e2a44bfecf11f0f3
SHA256240395fd6e6854a21000f1a8e25d2f2c633940e272cf0a5d1e50dea24afb6143
SHA5128faeda2bd58d0a9ff9ad8ba42edffd28c8eed20f0d8a9b7868ad7500f36cafd1298c6b982e868588ebea564989ba2175467c9d37df4eb8acf67dc1ac9a877bed
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ece34f5784b447e3d81be2c22c647420
SHA101cdb170993d1e9117aebc23883a23b7eb4b7002
SHA256c3cf1cbe35b518e46a2453274ff0025c207e46e0f9a5f59cbf9b163125f0821d
SHA512adcc48d5e5959c836ec3d7ad27c6a52ca8e2465f6e77cc76f21ecbdd734e61c6d50ad5162ac4b7aaa81e3b211874dd1995cd852595ad05a897ea975994ffc84a
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5a01a57fc6f4cfc85d6df7eb51dcafc1c
SHA1427c0f86de995a835b9450e60f79e51a918c4346
SHA256248872f712b4f709be6b09b89ba7cd9935d1c070a604babac87e3a6fbe7ef4fc
SHA5126a2ab852960f8bc22301e4efc89efcad066b0ba8f17e0579bf91cd421b8cb57010575eaa5fd133b0bb9d2faaa8d9c2481eb48f3c4fca2f8b9d801865999917f6
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5fa79a4063b06bd269da4b8bfd4ff7ff0
SHA1d732db6266d10367f9986d575c9f457915332a25
SHA2563461858dc556c7b49d8adbf2155bc65b1a42e8efa5e0359b7b70b91056c4c5f3
SHA51240aa694cf272b6d777fb77282ce2087f610bdbacd234a6419790bccfd1adf257b36ae385725c85117f7e937827841d78860caef10d7a5fdd48f0b24e9256e01e
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD56afa2e35ca13c3715e956d12e175afb6
SHA128406225a167cb54f08bcf0fbf53097f2844ec87
SHA2565ba2d601dfda7e022ffb2197b9be412e1db7842fffc2e5222d487c25e70b0b15
SHA512736126e1378f7f48a917a8805a6437e132c05532a1c627889c59ee37899e7eb2396566e3f01dea5dcee8f6d8c8da8ad333182c7ff6ce42f9bc8dc9f8f3c31c78
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5af0de9338cea2db88994daefcfc765d8
SHA1e702841acd9996bdc7cef6083eddeb4f068fdc71
SHA25633cfa483e7536f5443377634f9305c91d8df73ea39f90f054fab48edd5f9fdcf
SHA512566315c978dbea0015f0961bc058bfac656da9c4832a380f639113fa4d2c9214cd34519c0d893cd745b6e4ffe4bc69509c995d337df5485f76388daabcdf13c3
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ef3587b0945895937ce6e0aac17fce7a
SHA199ecd67e5416827c1564ca823081b5ddb67512ea
SHA256c60bcf782c1b6bdb383d416c96df74e6e9202cd5471a9200dbbd2e465c2e62cd
SHA5122004c325aaf4b8a6dc5e237623d89987e0229528f5529dff8628c4a4ec69bd254d77a26ab7fa786ba342c9c87aff4fa76bb5d3061ff11887fa3433aeb824dd63
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD575c69dda546d4195f070ee49b18052ef
SHA1b658b2d69e491b1f41fb791db84cd82a74fe3efa
SHA256dbbc127f8a563e45cc6721ae9b31e209813a2b31f0b1f97cbb37a27b16eb52ff
SHA512339fcd247b7ee0a0195bb5999258ae09c78edcf58d0f953a0eb8b315b753f3d74c3916c50b25b63311f0c982fc50cbc55a39af212872e7f03dbdc2dc87f77d8c
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD50cfc4582bbf3719ba39b151307b4843c
SHA150834036066564aa098e0f0dba09e1155f2996b4
SHA256ca2bb50a463a688025215eaafa4164f8fb36a5a223230ef31333cce6669cc292
SHA512a13553070ee0a8ca137b11828db17926d46e5686331b6d396628915e5f447a9d4ae44fe030a393caa47f0086ef4fa782a59e4c00abacd960d1a4bf4a433aac4d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD502fa13b2ea302d5a140514ff6720a36a
SHA1ed65cf7ace457d6025a1a3cdf1690535910554a3
SHA256da5119a0eac9d74b03e9d94b8924b164c1c1e8922936d2fd69c839d7d1483bf9
SHA512d2080027d5485ee6a6bc2bb42ef0b0a2929f0e860b5e201303010d193690152a057982541c16e099bbde66b49d237ac5ef7f5f5b056201a2af8430169e966c19
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD52f3316f9e702d7911ca64f6be921d86d
SHA15429022fda8e364be1b8bc19b257a55adb06a888
SHA256e48db7d1caf43db9f0c08100a3076b8a1456ca84ca2c9979b12b348b028fdf58
SHA512bdbdf95400af3838110e3795bd554686e5aef6df8b8f1f34af5cdf1130317745ea8f93b7592e498e71390f431e9537da98c2cfd90b8cd5ffcfa3e9305f6c990f
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5860887185dbbb78fcbd3950db0e9a603
SHA14b0511108db0c24b050ba9caf62abdebf1143d38
SHA256388e727a8b1358bf8f3e2d0c2bc07218d7bea93b849e856871117e17d2325517
SHA512ce4b103e716f3bfafcf164e6a8c570b868f1f8a99be84040fd3d4e784f05f5118808a1b3cc195529120bb776fbc864ea6c06b5ba4114bfcb7446f0c33929aa19
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD524a3e16c108690b121910bfeed338c54
SHA196241e149edb574e910043bb197ac4880b6bb74d
SHA256dd766b2dfba15b4735693d44475b53ecbb22564c990ab12d618471cdd43efc2c
SHA512b10ac790731f09ffa538ecfbe1d1e436647737f3fb6b520d474c491a27a941cd2759ed3b5061bbf8d1ae056c19d6c5827a80af2da1b613a37e87691dded55b68
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5528a28b07ec80507a8cc8aef47a598e0
SHA1fccb7c34734734d2dc208367e8e895f826d5abd6
SHA25682611bc127b76e189e876e370274245d74b82c762365504dbb1df2598a201a51
SHA5124be4d637db8344e92dc31d3b7c40b3434277d469427f2d4ddd44103b1d539fef99719da393c6fb023da0680c9feb0c5148f6d4ed75a778eb7949bea016b32d38
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD57b536d75ebf2c1f7b51cbac58a0851c5
SHA1753658e1d5452796a37d62f3b8edf0b636bb2df7
SHA256fe634519c520abfb5a9920876c7b80d14404c5f3c39d7f886c1531c113ce0db1
SHA512f8b15a8935c0ec24b3b7555c1a2b6133354c08c7338972f0123746c5768f1138ed318bdc567d7695c23f4857a51c1a131376ba27e066b37333e0eebac31ad7a0
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD51ec16bb723109482bb164281598ad369
SHA1052afff78bf146ae5c74a5cd8a9f3e921c531072
SHA256a8203ab1b945fd43b6e83bd12778c68cd791e08a3303b818655679979b7b71f2
SHA512ef344a68711e8b313ae447f3871b9e1fc8856112b628f5d87ba3f9111c8f4cbda346c6529c43760ad104829fe51730a900dcf30e2b8986c7f3a322c743c02cf1
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD506a145f0b9aaffb00c4edf86b53decd4
SHA1f706d49dc9f5e4b317343430851ebcf0074bc3b0
SHA25691a1ee6200c7afa7ce7b85a6229d9cfbd5f3a972f035d1b123822c8d4f856ed2
SHA512538d0d45cbbed0e3bf23b178a61f8f4a83e19f0fe732c3a9b33364f12bfec65c41e881cc7505c8fee25f1a69aab558f1e3b913a9b6ebe74ee7f44f493f41692d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD556167cca56d7007e8ff1a29b08ef0b1f
SHA124ac9038235438c5272eef1987a26d6a4d0e337b
SHA256026992f09aa03d8d1cdf53356845ab50b4e1435c3ab21d5f5b6c7c2062b5c936
SHA512175feba5ec8c22613d07591267b18aca7101e96efcde83fb1af67aacf5f334f989b141bf8b6aeeedf4a0575ac38d4a80079794d7c7c27c9dc0ea13951169f3d4
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD58303b12c6c10ad070c32d69d5cdbc681
SHA152ee95e28d2768d4b94512df09d25b1ba1d73435
SHA256440632344853b9ec82cd16b4fd697bf9c78b47a4fb35461a8e6d1257670455b7
SHA512e76847d1b8c9522af223f075a4d7524735af575f84cfe7fb03354c17fc95557cfb2ccc1a9e29436f07743720dd78b104a95bf6efa841f0b00ad84fb5a3124d7e
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD58f8173ee2de8c71af255fa1423b164c3
SHA1fda940476273115eb34098873420d0feee22491a
SHA2564a93320b7b4ed054a1d6fb54454789e1068cac3738a92710c41fc25e138a2871
SHA5122ae00e60d61dd15287b99a04c323d6e8bb445d101565b24be339532c3eb5ca4dce7a077a3272344b608248914284df0362ac0268083858b41557188d7e5b1f56
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD50deb86e31a644518d13b6c40fe1affae
SHA12171ad3a805ae699632cb52ff62970b2d66f4ff4
SHA256f29010dede7be6483088b3d6c4ce70afb7f738bcfb0aa4cfb905ec67b57a20d0
SHA5123d5159fd6f2e52df02de55b9ae0a97c5553c25f4d8e2bd0ffb79458eabe962b3ccd17a04bcccbd5d7f2f2d5e8c0409ee4584517cb637e30c630b9e225f91a317
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ced5621553eb05021201abb4690ec786
SHA120fc8567b39595dfad00c72a4a80456fc716930f
SHA25682f3059c083ed797254192085cb89850fa63956fa921314a59fc8ca12032d0e1
SHA5126c97e50ad8fbc7bdc2923127776967db6a31285a2d1f2c94ab2d635641a7edf528959954f51416960328dbaba936b149291019023394c26672d88addd0b733ed
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5027bcfdc5ce0267b0b518f45da0add47
SHA1193d610233b4a0c70cba914d4dd8d2ab47e9265a
SHA25611816ac2b84fda2de03d40d233555eef72ffe83dfbb9e74aafa1891dd1958e9c
SHA512073f66666727bd4539501f6bf0add466579295e4547809cb46dd4437eb0e53e7dbaf3c926153eae61de3ff63da8c6852e808b08e0980ca4193e0430660bf3c51
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5cdba38bf077337048413ce47e369d6cd
SHA108dcb8b01d18c0360187802f3c6469ce324fcbc0
SHA25695755c2b03f77a964589d830cba71e39e64f83dd68fc3f69de99c4147cbd274c
SHA512e3f70a73208f87937163f970a760af84f1569bdf145076f6a4dd42ad0df8ef9c7a31aad518ab53c69031f41cd79a4faccac32beebd6082be1ca7c2ab8df65602
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD58d456ba528e62286d040fd4fc57413bf
SHA1d26e2c4ade8c80336f504d2b593dbd4182da63a8
SHA256443232fb597c699247388d469459cef582854b980a64245ed40e93284f89fd1d
SHA51266d3e2a78f7e6c6cf61d0639713e9ae59546192fb7c8812e1970a863d210d68f150953badc7b268d53cbb94fca2d37ef483c0ab45e3db34fc653843fcb80372a
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ab6f618e79fa6773607dece610cc6e58
SHA11889fefb0b7bc1bc2611d96ba297750fea41fc8d
SHA2568fb7d2c9c29c00a2071f17f3d82ca361da2f594c4bcca1dcf2abee135683bca9
SHA5128913aba1089fbfb3b8d5a476f256645ddbcc08ef1200dae35967c810027602df466e4dec9ad9b2804f5ada548ea0843982beb53957face3ccbdb4d916129e852
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5a3be56d58510d7206d03e6dc8f2f8eec
SHA1667fec20165a00d0be39985f720203856ce34d80
SHA256b928c781e29ac5d7da03e5476522a8509fbb3de4cb715e709f0c37590067dbf3
SHA51262f3680dffc2d803d02ebf01751445ba0cd650e46c1540fff09b18709b3801f0e37067eb8f104a3ff85762d343fc122e35d0dae937faa2df419f51f0a469e305
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD519fdaa823bbb499867f3356b9cabf663
SHA175afa517e890847aa49e7e3f4f8da75712d7de79
SHA25625b9092feecbd59f863404d36a847b3d34c1eb6493a1d9e33a8def42ec8da5b2
SHA512d7ec15a0fffa47259d0b84f43df849dbad78d0116fa275a2e6ce278e0555cf4c28bab47e55345f4fd9b0dabf1fde980f7ef049246e745a5faccb59b59190fec7
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD56974369cecdb17e6c8ddd9a7ff653139
SHA1835306e515d381deac1dd79e5dcb52fb7047e441
SHA2564effa19ace5a0abc377007356f4a4cbb4b6f74f0c6a76138deec994af28d7a59
SHA512bd3c4b92fb426661799d93e5f80c90c6c8627b23774f912424870d7fbab149cebfaac8fec353e4bce8b2df27227d38cbe61370fdc5237009331b711f5a7224b8
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5255bd57f7dda614d784bb22bc3208353
SHA1c07d763edc9c408f8ab1a6f41ec6dbebd2d638e2
SHA25688bd4deb46c94b02fb1b1e8ba132461c6cba5d68ef171aa371d0e16e38b7be18
SHA5129981bf822421b819b3e72b95a373fc840d4f94ed059ef4f47c2bb923541a9b7b6c0f54847b0e073305db6754a09fd89489415d150172b6a03cb0eabe33c988a5
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD56a80464602114ed0ef03065006738535
SHA147f9aac03e88a640a2d0b7c2d00853e778c26480
SHA2562b2f7561acf18b5ea9675e26fcaca67260ec2fdecb5fdaf47f719f4a3f484d57
SHA512bfc41ca2469d6ec19c4c91b4adb3547335bdac29775bba72df396985b54261a1c57a0c2819f80a189cd5a03cb65f83dcf03f61b9faf2db873b10cf1dc2d7e12d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5aff591cd145047fd2f3b70ab11eabf32
SHA14f189a0c0b508e0981c7b6119ea430d6cba31df3
SHA25690de30357e8fd9696daa1e5620c2c221fabb468587dc964ef219b03df9288d94
SHA5125819366d3a8161c6c3b38853bbd1e2cdfffddb13c65d4ac7dc7a503cd3f12893e6513cd27bab02dccfd451d06ca099d03333858fc8a22b02b0c3ee0c56e50afb
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD50dfe52906d4c5d209137e9c90fa0c1ae
SHA19132885d69534f81e8c6a7421ebf80e886cbf1a5
SHA256d15add36f609471a378b999c27c0c2ac1f8eda0de2328006921f87e2697330dd
SHA51285a3499f5453e323084591fef5850704b474aeceaa0ff31d46c80ba56c3a8f91ed086647ddeabe4f9aec51181ec5f9edf7d07c2374ff4de6223b71dcdb83e74d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD514fd9e02ceed34edd52bdd2ee2920d8a
SHA12dc654ccde7a3acee8c57cb0f57eba5935a05335
SHA25677c2c5d57d554a19ed935f0e058f00de8b3bbd8584d85840b5fa50b71da00a14
SHA512a9fcdad4863d34540bcd0df1b62c3d479039eb58dcf21741b837eb7955b1160412664244f8641da7e7bac5db71bbf8d47534afbba876c45d9f85ce5015efbfb5
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD505b94ab2f06c7c488c2f8a5ee20c43b1
SHA184a047a5e0eb432e3d4cd26d7d6d5d754e873f6a
SHA2565ad9da9b0ac65cb267b8a383bad9a52a9fe21cddb34f7963cba233647bd58948
SHA51240cdab4e32ee33e4ebfa4387efdee5992fe1f61e5c01a2744fbc83b4faca1020ab88e5cceb8ab6a72e1a6c68e51ef69628b958233dca220dbc72f5190653110d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD510609f869d19ab605aff5f4baa4915de
SHA1ea1321f658301ffff1748f52ecee2005a193d60a
SHA256f209ba4bb90526d9b087cf24521969d97e171066bbedd848de0bcf8778be6d84
SHA512e238705b1a9dd2493e979d2b55a8f0ec57387c6920441de77b9942f456c56ec0d9c960b68d001fbd76049c7c0150adc6f93374053481627a57e6c192b70469a5
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5e43a588e29c07233792e0bc89b3ed26a
SHA10c9921481e00947f8ad85fd5f55992305f1d538c
SHA25693b7ae3405865010dbecfdcc24068a71cfc58f837651050824f57e9ef4b90ab8
SHA5124c9596ee11557ced7a3566536e38ad8298cee172ed623aedf6865b3aa466ed6b70f52e31f86afde76d612946f30a79c56aab6cec4423f7d966cffc97cb1d3f2d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD584def7ba1c9669bd66816e01e58a9ab9
SHA1eaf65580bdb3d2239ef888a4bc3342bd72e5bf2f
SHA25643f00fbe419daa9144148fbef4de97f5dd2811967aeae4148f38ba52dc74ca8b
SHA512d1125d3f63e1c6139be24d1cb80a76856463ebf00f4b4fdd88623b8cb95ed5387c32728ada6baaec37be0086a6a7e964a08440fe662174efba519ef21738499c
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5390a0136e229ab8a2d734b62af610e1e
SHA1024a281d397c1bf1ad2bfd3dafd6b8a94f364ed9
SHA2568c44b5f6bfe302d5f13dc18007aa922c8f6cbd7c74c7d8eee5804b8842723e76
SHA512d843085ec251415b2a2c112f1e932b083debf19b25f249313f6606a040ac8e7715a70962c5b2139d87c7186ca2a8a24022bff2897d2049801ad2f266d51f0f47
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5aa0aa4e4b8a70771325d0d0674feca25
SHA197d51f29a8ad89ec3fd249df7fe863030508755c
SHA2569628af9a6167955f7cb96ce38dfaeb60a15e8675bfb9014bd159aa541bbc13f5
SHA512a676ab4bcdc442c393009da888cf1af9b891a891c42ff3b0e719f75f66dc9c28e07d3795c4d223b4d697a958ea2019be6c8ec8321919ffd432a26ccd8a2791f9
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5f44c42ae7a993862753465435f300cc3
SHA1efa50274c0e727e33b274f723188fb417fc5a28a
SHA2567f47bc0a2b645c78fd2f61e0e6c109fa65e8989490da6987fe3fb91bbcb354a6
SHA512ebc6e6a92e46fe6f7ef27b3a2190b71007bfd68ac3c898c1228f1eabe4e0f560dd31cc297291c9ebc76396bb59db9a90912e7c29ea26e25a0130b85387ec3d6c
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD582795b2c7b137acbd4ca1d9a707ac959
SHA17a9d063c506318de0625177afc8cf802ea4dfdeb
SHA256bd8b7e85312c391f05609b5d974b67a744de35354a814fa39896db4a92ac4ba4
SHA512a24df58b2e20937ef36876b67d836af30aac5463c1abce25a11c7e37092def19447aa1d82956a4fc488faa8f70011c42f729d2bfb93217945327c2caf6e4d58d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD547f0b45473259b1be7da4c335367998f
SHA1256c05825d65db7a6d5430bc731ad23c9ff2e37e
SHA25656ecb6ad5b2a6203ed513eff55f01adc6bfd3bea91a4975a8b2570331a611b3f
SHA512ad014040925021fe7fb3edd98bd80ff0182f82ae6fceb5bba1b6872cf49253d6c85574c17ba65413df4ffd0475980555a27b0f891e0b600b005f75ac3fc0db47
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5b5660c65893fc929fda9e5c94eff55b1
SHA1d6ad1c98ab462ecf391babfc1fd6863431503e85
SHA256e46f75ef7b9e93fc6172d67ab950026316db3a883cad9409af6829911317cbc7
SHA5121aa268791652e81828893dda1569b3bba1315ce3a16717c6e9fa9dc771769a2d5c55d1f8627c972ce3eba7b2fd17fa8ef67510bac1fed45bf424e7645a8238e3
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5c33f88be4f23ee20f905d2fa76b1cf45
SHA17b7b42c65da6952deb835ab3c4f585d39d4f67f1
SHA256635ac1fd685fc9c03a8c14a5ca7734039aad0f715766dee770776657e663ddd6
SHA5129dfae97037e28f5ca71a7a80d487b357048268bbe8eefa23187210c91af82834e21f92aed53d8708515b11ac8cd2b70932196047b59ed555414cde54c2a36292
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD53a2b38bcfc4cb048b4b2fc08f78e4d61
SHA1137e2f0158447659f4eb0a95202a68b5c441dd1f
SHA2564b281b8e3c59ca71cb2d0baf4220a076048b8d410967f9e5d6ed201a6f4e418d
SHA512e13e5b1594ea7211afae054490a1f2bda55721637d3d961a1c28c66d533e6b1925035f5d21f38153e2e0fbf52cbca90e37389915b2f510c84bbd24aac3573882
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5bbd2b96104152c57da6991f84ac219e4
SHA1e240f86281ea25f0f44f050c09dece8ef0b6d929
SHA256da0f77b86a7362e022d948bf57babad5922b699bef4ee817471a485d2e6768f9
SHA512b0d2bd4dac60b1e4dcda9efe5cad728e21454cc159c44569c802204c201ffc40a8cc0d43cd4081e0d50818f0936d03f1f4f56de6d7ba4ba9caf894953f320d48
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ca37670cca1e651d4f224e5a6aa69127
SHA1cd6cd3ec1fc35ed36221a4ba14814ed4a91fb77d
SHA256df133acd8ad14367187ffcc0ebbb67b94f1358ffef6d54ca1123dde5c2123f98
SHA51294b3f9e99d5c7e2e84c9b730ab01677872365c7d1674b6a38994d85a0b4a81a31fd8b17fba38202d49b6b1e13522dbe54797a4227eb5d4350a9df25e38aeaec5
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD570fd6481d5ce90b0378da594668297f6
SHA14116fb7abeed8f706b9b2a88e61ea5cae9209821
SHA2560d0866d4bde35ef117620a997aba2aa6f4740144b62a6e12e9142f33cbebc39e
SHA5129f6e220fcd5433798405cfadcd40e8c3c9c05d56d452d863e850a78511f0c8623c5b705d8126af225608a12f0e807f6f59b16d93b960d66543e377c22aea7331
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ba6cecf489e717c4b5db4b7bf4e4e598
SHA184d1f50510eed86bbcaa1fced6dce530d0a337cb
SHA2560d68cf6325ee63c839a1f6b7252d9045f85f27c41df5163c63d1a5c81c0e85cb
SHA512f28e607c9c759d63e011d963873baf4c7e70d4a3c9ada79f0bba4da67391213ff804c7463b573a69f1cfb11837a9e7e4b1171344a3bcd159a8b7f2143f7ead46
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD552630de90234a3dfcf1487c66747e787
SHA1a27000707ea046ec85fd50e74494b75d8f96740c
SHA2565f3c691aba405d8d8a24bc78973a00147f759d0c7fd1a61836571f3f32cf0075
SHA5126fcc6d2cb87c021607aebecc8c595d8a2e9c0ea9ba644471dbc51f1b664d2821597913d47114563cd501e7be6f317a3fb74382d738a9f1cb6edd046d7286daef
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5f0a8a094cb7c31ffe58ddc0319270821
SHA12f318e6ac7ead87271f4fab15631ce29e6508a04
SHA256b020e0042a52912fdbba3c8af605de515dce8183d8224217f8a02361f6f9f615
SHA512360e209bd606b93b37e8a99faa58f3946301e0b51e8fd2189d8b24694ed150e2ed83a468e9d35fe6af01462900cdcbc56994cc170cf8e04f4665403169c4b0ad
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5ccf069cd1599485c1b335b41dd585ec4
SHA13163e777419e76ac0df9437779058e831b6c3d00
SHA25612d87735d769de5fbe9f04c7b5c1bc6fe60e269b5d791cb9293e214ec9277dae
SHA5125b8966e653e7df799247842d719692fbb65c9f9d28630cc1add5b99048284d7323c3ab835070055af63c86a4273498e16ef86e5723faea9b98b1facc7b8a36b1
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5cca9d4ed6a9625472afdb9f0544e6d81
SHA1130a1e5df6bd8537804a1d03bfa19ffa55e9fff9
SHA256c63f84bd6a67e45e150ad48c12b082e92c31b3d3cdc8494e851f635568cfb26c
SHA5122869da6dd4883dc8d06bf0982f9c6986ef269319ae3a0eba56ecaed23ba1d8366baff593594ac9bb08c1e052a0d1ad71c27fea708537944eafbc28999ff05983
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD585fec945ad1377fc9e2a8beb2435b9b6
SHA135885239007069cc051f171f00a6e72a998632ec
SHA256853d6dc7cb4ebff5cd6f3466fbb42a47d4355316b51d37b07016d251d3212cb3
SHA5120d06a1ec9a9a673bf27ebb82733909e1dd9ed95a141c539fe39ffc303bd3869856b28e95d65796a63728a52c3b9ce90bb05b285a81daa468f252918f3ad2eee4
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD538d270ade65c9d760da1f241c9a0a30c
SHA1d90e451ccf5156e4af4bc3b4b5c99d9650fffaff
SHA256b8da8f76a67d4adf3aa8cfa184097f1df766cf691174c675f25970b5809fab63
SHA51212772226b974431c5cd25405d77021d0c5bfbd2b404577283169588264e15c125ebd02bc0d43d43330f3e2171eaf24d6929feeb64b60f9d32afc7aa42aae4d6d
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD599e76d9d3d567978961809f4f3f524aa
SHA177551c68b8003847d1969b3e8822220ff9500e3c
SHA2567bd3afe3f3496cad853e1fb4bc2d45e1e6c95dfb9c8cb53d84915749449dcd71
SHA5129c0444278b4c91c45f044b35a6516be5c60e184ae8910527b0c2d24830f758b4f641ccccc92c080c929ba6c3ef7c6317439d1dee5fb965ad74af984d78dfdff5
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5542c877d1fa1ac126218b8c09c1c8d62
SHA16215514ceb7fa6fea22477ac6b4d927d9e7294e2
SHA2564a56f970e3227720639045f99333d7fb22ee0b7eb46a5663a8d8079d589fe86d
SHA51265a568266f102ec39e5a3b26acd7b55c9a898d464c2a95bbc7eb1e62cadd8f87014d1edaa446bb8624f2af067f7b5f67c6322041cbcaeca506ac1a5364da84a8
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD59f0604eee89644825928e54fb979a6be
SHA15e04027e188b856a172ada265ea61cde9401b243
SHA2564f4b369fb839d568ec806ce33ff3b07b56e9ff811a49fde88cc90f07edef6d6d
SHA512db7b5dbac83c9a413aa16bd6112345d568b90c4d4d09bc8035dc3682b96abb4998b37402eb3d55178b4a6e8c7e57c1e01dbdcc3982ef163aced34cc525861203
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD557fba539666dc1fef2602e8b4a8b2cdf
SHA1bab8537f8d9f788c5e25c3030aeb00de2a40cbf2
SHA256064776243da2737293ebff6e2c1e81177d7f9875268e4ef2c1abc2c32f7b97f3
SHA5125470de397bf79e09f9e8bdceda474363b6c8ba6207bf85e721b3644ffdf9d7bc8758547454de9c8f1812f5647beaa86e036d8c5954d50a66a38ec81557542527
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD57f0b1beba1ede3cd9270a2898d31ca1c
SHA1633402a17fbf0adacabc953519e86013c52e78a4
SHA2569cbe04ed346ea939b22bb504cf15188c0e274b8f3ffc01a73137112dbfaa5fbc
SHA51228dcf85719ffdf4cf96a5a002466e666574487cad3ef345ab4d73d093917a35fa0e13fa94c24a239b685f2d9c1bd808014bbd5129b9eb9e589876394c13b916a
-
C:\Users\Admin\AppData\Local\Temp\XxX.xXxFilesize
8B
MD5b9b1f14ff706ae0200313e0c7e3746d9
SHA1680fb201c2d798bbd594e312a1f7b323bfc19a58
SHA2568824a0ad324fa6a14729a804860046de6506bf72d15fa9e34f549d51214357a7
SHA51249ab8776f715ee4d590fb0399b4a09d4d05d6af97b08491e97b8e2ec29260e3abaf2d116851f2a1031ed03e2567d6a2b6971412273e30ac17e66ede07cc0511f
-
C:\Users\Admin\AppData\Local\Temp\server.exeFilesize
140KB
MD5a00fbc1815a7d3cdcd23306479e39abe
SHA1669de9d6eff2e3f0902803af84cea2bede3d574b
SHA256aad774ae320e01c6c7bce53ded9714d53142f784ebe090da64fbea832ad6ce6e
SHA512d79966ec41c57425a4c646d00b508daf80befcb5e81127b4c141b5c5031ae75bece59abe6aba775dbacd13cce06bd4d7e5dcb146c42a4c1a41bcb3b7641bfdca
-
C:\Users\Admin\AppData\Local\Temp\server.exeFilesize
140KB
MD5a00fbc1815a7d3cdcd23306479e39abe
SHA1669de9d6eff2e3f0902803af84cea2bede3d574b
SHA256aad774ae320e01c6c7bce53ded9714d53142f784ebe090da64fbea832ad6ce6e
SHA512d79966ec41c57425a4c646d00b508daf80befcb5e81127b4c141b5c5031ae75bece59abe6aba775dbacd13cce06bd4d7e5dcb146c42a4c1a41bcb3b7641bfdca
-
C:\Users\Admin\AppData\Local\Temp\server.exeFilesize
140KB
MD5a00fbc1815a7d3cdcd23306479e39abe
SHA1669de9d6eff2e3f0902803af84cea2bede3d574b
SHA256aad774ae320e01c6c7bce53ded9714d53142f784ebe090da64fbea832ad6ce6e
SHA512d79966ec41c57425a4c646d00b508daf80befcb5e81127b4c141b5c5031ae75bece59abe6aba775dbacd13cce06bd4d7e5dcb146c42a4c1a41bcb3b7641bfdca
-
C:\Users\Admin\AppData\Local\Temp\teste.vbsFilesize
841B
MD5615964e5ab63a70f0e205a476c48e356
SHA1292620321db69d57ba23fa98d2a89484ddcf83d0
SHA25638a2c0e90a7c86eb5355710dd205f22f84dbba59e688cd3da6394af8c924a102
SHA51269886825baf2075f8e6cdc50b0b34f92d5d06d42db4586396fb3db806fef79986ba5754c7b1251b007cde4f943efe9e3d27800dd7e15f8084fd7e7e6046c3ccc
-
C:\Users\Admin\AppData\Roaming\logs.datFilesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
C:\Windows\00.exeFilesize
425KB
MD508499bf7ebbf11f3408c8e7d99949b86
SHA12c860fd0b9cf8afc05e5b03c0830da57d97d0436
SHA25662717294ff87c7f3cf74bdd2b4c2948bd492d72e9d2bf0f27c868cffec9249c5
SHA51205611ec377317cc6b186ddf92d66187066cc0ab2a3ce5d7f133d7d3b32b4540d0081e6c51c22c1e2e31dd60b9b498b0b6f55bfd24d1eaefdfc5c1fd893ef693a
-
C:\Windows\00.exeFilesize
425KB
MD508499bf7ebbf11f3408c8e7d99949b86
SHA12c860fd0b9cf8afc05e5b03c0830da57d97d0436
SHA25662717294ff87c7f3cf74bdd2b4c2948bd492d72e9d2bf0f27c868cffec9249c5
SHA51205611ec377317cc6b186ddf92d66187066cc0ab2a3ce5d7f133d7d3b32b4540d0081e6c51c22c1e2e31dd60b9b498b0b6f55bfd24d1eaefdfc5c1fd893ef693a
-
C:\Windows\00.exeFilesize
425KB
MD508499bf7ebbf11f3408c8e7d99949b86
SHA12c860fd0b9cf8afc05e5b03c0830da57d97d0436
SHA25662717294ff87c7f3cf74bdd2b4c2948bd492d72e9d2bf0f27c868cffec9249c5
SHA51205611ec377317cc6b186ddf92d66187066cc0ab2a3ce5d7f133d7d3b32b4540d0081e6c51c22c1e2e31dd60b9b498b0b6f55bfd24d1eaefdfc5c1fd893ef693a
-
C:\Windows\1-seguridad.batFilesize
440B
MD53480889014c6ab1d72ebe13df6c5f2bb
SHA15de690e8d732de74542ac78c007ec307ef28d3e8
SHA256e44a336e4a891bb6e253c12b64e99d7bcca369948bc80cde967c0a3fe9892820
SHA512442af2778b3debd4372123b08cd02e4dcd14b14fa7a3a77b3691fdd2ea9fcb31af2a6425fb81d1aa34b00dc35cec72deff68472593b327eae55fb2c77d70870c
-
C:\Windows\2-Alertas.regFilesize
2KB
MD521b2a7b50dd2c5653e30877c94cc04b3
SHA161bae94b04566c8e0a31e87aedb13c02e8bfbf8d
SHA2562024c7572789b9d4863895b721211ccc1a66063f204d9cb07ede48d848ff6007
SHA51266d82c1e40c5c348ff768c695ffd58050b91cbfdeab1e1339e8b1da9b44bada11482d95aedac8071124a77187f160052ecd9200962776c1e06f7da152363e954
-
C:\dir\install\install\COM HOST.exeFilesize
276KB
MD58c3c042dc1acef4d449684c2ca72c801
SHA14dcdfa3a99f873f9434743b4db0ae084c1d8d3ff
SHA25644dbcb5ef68916b91e16cbe932a1116f2de4e04b8be9905912272156d90187c4
SHA51270bf770fce85285908f55fa782ac0082a4b1d4e204931b8563b72b8930416997be3e7712a97b060f02bae86dffba97414cb9cb7d762cdb5c45a5c990e072278e
-
\??\c:\dir\install\install\COM HOST.exeFilesize
276KB
MD58c3c042dc1acef4d449684c2ca72c801
SHA14dcdfa3a99f873f9434743b4db0ae084c1d8d3ff
SHA25644dbcb5ef68916b91e16cbe932a1116f2de4e04b8be9905912272156d90187c4
SHA51270bf770fce85285908f55fa782ac0082a4b1d4e204931b8563b72b8930416997be3e7712a97b060f02bae86dffba97414cb9cb7d762cdb5c45a5c990e072278e
-
memory/240-44-0x0000000024010000-0x0000000024072000-memory.dmpFilesize
392KB
-
memory/240-51-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/240-26-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/240-197-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/904-63-0x00000265F23A0000-0x00000265F23B0000-memory.dmpFilesize
64KB
-
memory/904-71-0x00000265F2B40000-0x00000265F2B50000-memory.dmpFilesize
64KB
-
memory/1524-3749-0x0000000000400000-0x00000000004259CC-memory.dmpFilesize
150KB
-
memory/1524-36-0x0000000000400000-0x00000000004259CC-memory.dmpFilesize
150KB
-
memory/1636-35-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2676-226-0x0000000007CC0000-0x0000000007D0B000-memory.dmpFilesize
300KB
-
memory/2676-825-0x0000000007E10000-0x0000000007E5B000-memory.dmpFilesize
300KB
-
memory/2676-733-0x0000000007CC0000-0x0000000007D0B000-memory.dmpFilesize
300KB
-
memory/2676-224-0x0000000007B70000-0x0000000007BBB000-memory.dmpFilesize
300KB
-
memory/2676-228-0x0000000024160000-0x00000000241C2000-memory.dmpFilesize
392KB
-
memory/2676-229-0x0000000007E10000-0x0000000007E5B000-memory.dmpFilesize
300KB
-
memory/2676-198-0x0000000024160000-0x00000000241C2000-memory.dmpFilesize
392KB
-
memory/2676-657-0x0000000007B70000-0x0000000007BBB000-memory.dmpFilesize
300KB
-
memory/2676-136-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/2792-552-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/4204-123-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/4204-196-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/4204-49-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/4204-48-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB