Analysis
-
max time kernel
116s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
explorhe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
explorhe.exe
Resource
win10v2004-20231215-en
General
-
Target
explorhe.exe
-
Size
790KB
-
MD5
b7668e16e00cfa7aab4fd5833311a9d3
-
SHA1
81f2ecd89774c56e0cc9cdb9dfe273df76dfefa7
-
SHA256
3954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366
-
SHA512
7e2146e5e8b28830208a92ddcb57075fd0e046856c0564e3faf5f0d71a6dbe5454c16b45664da4277de795eb53f1be447de4aae2a0a5a0d12eefe9d5be6d96e4
-
SSDEEP
12288:r9SJ++jmIFElFpRqH1YWGn1Io7YNQZDzdYD/jGW/nSkxgsDggauUPnIpm68fuvQR:r0g9/nREmWGn/wQFRHW/nSkx4dk4qo
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
redline
@Pixelscloud
94.156.65.198:13781
Extracted
redline
LiveTraffic
20.79.30.95:33223
Extracted
redline
2024
195.20.16.103:20440
Extracted
redline
@RLREBORN Cloud TG: @FATHEROFCARDERS)
141.95.211.148:46011
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
redline
Legaa
185.172.128.33:38294
Signatures
-
Detect ZGRat V1 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4736-233-0x0000000000400000-0x0000000000458000-memory.dmp family_zgrat_v1 behavioral2/memory/2884-571-0x00000000007D0000-0x000000000082A000-memory.dmp family_zgrat_v1 -
Glupteba payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4328-417-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4328-538-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 11 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\ms_updater.exe family_redline behavioral2/memory/2320-128-0x0000000000010000-0x0000000000062000-memory.dmp family_redline behavioral2/memory/1760-131-0x00000000025E0000-0x0000000002620000-memory.dmp family_redline behavioral2/memory/3364-136-0x0000000000400000-0x0000000000454000-memory.dmp family_redline behavioral2/memory/1760-138-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000491001\2024.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000491001\2024.exe family_redline behavioral2/memory/4672-191-0x00000000002E0000-0x0000000000332000-memory.dmp family_redline behavioral2/memory/4736-233-0x0000000000400000-0x0000000000458000-memory.dmp family_redline behavioral2/memory/2596-323-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/memory/1076-547-0x0000000001380000-0x00000000013D2000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 53 2560 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
iojmibhyhiws.exeiojmibhyhiws.exeMiner-XMR1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Miner-XMR1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Miner-XMR1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
legnew.exeexplorhe.exeexplorhe.exenewbuild.exelatestrocki.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation legnew.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation newbuild.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation latestrocki.exe -
Executes dropped EXE 25 IoCs
Processes:
explorhe.exe322321.execrypted.exelegnew.exenewbuild.exems_updater.exedata.exe2024.execrypteddaisy.exeexplorhe.exelatestrocki.exerdx1122.exeInstallSetup7.exetoolspub1.exe31839b57a4f11171d6abc8bbc4451ee4.exerty25.exeBroomSetup.exeqemu-ga.exensxBE0E.tmpSetupPowerGREPDemo.exeMiner-XMR1.exeflesh.exeiojmibhyhiws.exezonak.exeiojmibhyhiws.exepid process 2236 explorhe.exe 1340 322321.exe 1936 crypted.exe 1760 legnew.exe 3140 newbuild.exe 2320 ms_updater.exe 4496 data.exe 4672 2024.exe 3504 crypteddaisy.exe 4504 explorhe.exe 1116 latestrocki.exe 4384 rdx1122.exe 936 InstallSetup7.exe 2004 toolspub1.exe 4328 31839b57a4f11171d6abc8bbc4451ee4.exe 5100 rty25.exe 3344 BroomSetup.exe 4788 qemu-ga.exe 4948 nsxBE0E.tmp 1848 SetupPowerGREPDemo.exe 2368 Miner-XMR1.exe 2884 flesh.exe 4976 iojmibhyhiws.exe 2496 zonak.exe 3292 iojmibhyhiws.exe -
Loads dropped DLL 6 IoCs
Processes:
rundll32.exeInstallSetup7.exedata.exensxBE0E.tmppid process 2560 rundll32.exe 936 InstallSetup7.exe 936 InstallSetup7.exe 4496 data.exe 4948 nsxBE0E.tmp 4948 nsxBE0E.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorhe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zonak.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000498001\\zonak.exe" explorhe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
explorhe.exeexplorhe.exezonak.exepid process 1972 explorhe.exe 2236 explorhe.exe 2236 explorhe.exe 2236 explorhe.exe 2236 explorhe.exe 2236 explorhe.exe 2496 zonak.exe 2236 explorhe.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
crypteddaisy.exerdx1122.exedata.exe322321.exeiojmibhyhiws.exeiojmibhyhiws.exedescription pid process target process PID 1936 set thread context of 3364 1936 RegAsm.exe PID 3504 set thread context of 4736 3504 crypteddaisy.exe RegAsm.exe PID 4384 set thread context of 2596 4384 rdx1122.exe RegAsm.exe PID 4496 set thread context of 3448 4496 data.exe MsBuild.exe PID 1340 set thread context of 1076 1340 322321.exe jsc.exe PID 4976 set thread context of 3284 4976 iojmibhyhiws.exe conhost.exe PID 4976 set thread context of 768 4976 iojmibhyhiws.exe conhost.exe PID 3292 set thread context of 2244 3292 iojmibhyhiws.exe conhost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2748 sc.exe 4724 sc.exe 620 sc.exe 2256 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
nsxBE0E.tmpdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsxBE0E.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsxBE0E.tmp -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3328 schtasks.exe 4296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
legnew.exe2024.exetoolspub1.exeRegAsm.exeRegAsm.exensxBE0E.tmppid process 1760 legnew.exe 1760 legnew.exe 4672 2024.exe 4672 2024.exe 2004 toolspub1.exe 2004 toolspub1.exe 4736 RegAsm.exe 4736 RegAsm.exe 4672 2024.exe 3364 RegAsm.exe 3364 RegAsm.exe 3588 3588 3364 RegAsm.exe 3588 3588 3588 3588 4672 2024.exe 4672 2024.exe 3588 3588 3588 3588 3588 3588 3588 3588 4672 2024.exe 4672 2024.exe 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 4948 nsxBE0E.tmp 4948 nsxBE0E.tmp 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 3588 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
toolspub1.exepid process 2004 toolspub1.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
legnew.exe2024.exeRegAsm.exeRegAsm.exeRegAsm.execonhost.exeflesh.exepowershell.exejsc.exedescription pid process Token: SeDebugPrivilege 1760 legnew.exe Token: SeDebugPrivilege 4672 2024.exe Token: SeDebugPrivilege 4736 RegAsm.exe Token: SeDebugPrivilege 3364 RegAsm.exe Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeDebugPrivilege 2596 RegAsm.exe Token: SeLockMemoryPrivilege 768 conhost.exe Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeDebugPrivilege 2884 flesh.exe Token: SeDebugPrivilege 4588 powershell.exe Token: SeDebugPrivilege 1076 jsc.exe Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 Token: SeShutdownPrivilege 3588 Token: SeCreatePagefilePrivilege 3588 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
explorhe.exepid process 1972 explorhe.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
explorhe.exeexplorhe.exeBroomSetup.exezonak.exeexplorhe.exepid process 1972 explorhe.exe 2236 explorhe.exe 3344 BroomSetup.exe 2496 zonak.exe 4504 explorhe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
explorhe.exeexplorhe.exenewbuild.execrypteddaisy.exelatestrocki.exerdx1122.exedescription pid process target process PID 1972 wrote to memory of 2236 1972 explorhe.exe explorhe.exe PID 1972 wrote to memory of 2236 1972 explorhe.exe explorhe.exe PID 1972 wrote to memory of 2236 1972 explorhe.exe explorhe.exe PID 2236 wrote to memory of 3328 2236 explorhe.exe schtasks.exe PID 2236 wrote to memory of 3328 2236 explorhe.exe schtasks.exe PID 2236 wrote to memory of 3328 2236 explorhe.exe schtasks.exe PID 2236 wrote to memory of 1340 2236 explorhe.exe 322321.exe PID 2236 wrote to memory of 1340 2236 explorhe.exe 322321.exe PID 2236 wrote to memory of 1936 2236 explorhe.exe crypted.exe PID 2236 wrote to memory of 1936 2236 explorhe.exe crypted.exe PID 2236 wrote to memory of 1936 2236 explorhe.exe crypted.exe PID 2236 wrote to memory of 1760 2236 explorhe.exe legnew.exe PID 2236 wrote to memory of 1760 2236 explorhe.exe legnew.exe PID 2236 wrote to memory of 1760 2236 explorhe.exe legnew.exe PID 2236 wrote to memory of 3140 2236 explorhe.exe newbuild.exe PID 2236 wrote to memory of 3140 2236 explorhe.exe newbuild.exe PID 2236 wrote to memory of 3140 2236 explorhe.exe newbuild.exe PID 3140 wrote to memory of 2320 3140 newbuild.exe ms_updater.exe PID 3140 wrote to memory of 2320 3140 newbuild.exe ms_updater.exe PID 3140 wrote to memory of 2320 3140 newbuild.exe ms_updater.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 1936 wrote to memory of 3364 1936 RegAsm.exe PID 2236 wrote to memory of 4496 2236 explorhe.exe data.exe PID 2236 wrote to memory of 4496 2236 explorhe.exe data.exe PID 2236 wrote to memory of 4496 2236 explorhe.exe data.exe PID 2236 wrote to memory of 4672 2236 explorhe.exe 2024.exe PID 2236 wrote to memory of 4672 2236 explorhe.exe 2024.exe PID 2236 wrote to memory of 4672 2236 explorhe.exe 2024.exe PID 2236 wrote to memory of 2560 2236 explorhe.exe rundll32.exe PID 2236 wrote to memory of 2560 2236 explorhe.exe rundll32.exe PID 2236 wrote to memory of 2560 2236 explorhe.exe rundll32.exe PID 2236 wrote to memory of 3504 2236 explorhe.exe crypteddaisy.exe PID 2236 wrote to memory of 3504 2236 explorhe.exe crypteddaisy.exe PID 2236 wrote to memory of 3504 2236 explorhe.exe crypteddaisy.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 3504 wrote to memory of 4736 3504 crypteddaisy.exe RegAsm.exe PID 2236 wrote to memory of 1116 2236 explorhe.exe latestrocki.exe PID 2236 wrote to memory of 1116 2236 explorhe.exe latestrocki.exe PID 2236 wrote to memory of 1116 2236 explorhe.exe latestrocki.exe PID 2236 wrote to memory of 4384 2236 explorhe.exe rdx1122.exe PID 2236 wrote to memory of 4384 2236 explorhe.exe rdx1122.exe PID 2236 wrote to memory of 4384 2236 explorhe.exe rdx1122.exe PID 1116 wrote to memory of 936 1116 latestrocki.exe InstallSetup7.exe PID 1116 wrote to memory of 936 1116 latestrocki.exe InstallSetup7.exe PID 1116 wrote to memory of 936 1116 latestrocki.exe InstallSetup7.exe PID 1116 wrote to memory of 2004 1116 latestrocki.exe toolspub1.exe PID 1116 wrote to memory of 2004 1116 latestrocki.exe toolspub1.exe PID 1116 wrote to memory of 2004 1116 latestrocki.exe toolspub1.exe PID 4384 wrote to memory of 2596 4384 rdx1122.exe RegAsm.exe PID 4384 wrote to memory of 2596 4384 rdx1122.exe RegAsm.exe PID 4384 wrote to memory of 2596 4384 rdx1122.exe RegAsm.exe PID 4384 wrote to memory of 2596 4384 rdx1122.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\explorhe.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000486001\322321.exe"C:\Users\Admin\AppData\Local\Temp\1000486001\322321.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000487001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000487001\crypted.exe"3⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000488001\legnew.exe"C:\Users\Admin\AppData\Local\Temp\1000488001\legnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000489001\newbuild.exe"C:\Users\Admin\AppData\Local\Temp\1000489001\newbuild.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\ms_updater.exe"C:\Users\Admin\AppData\Roaming\ms_updater.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000490001\data.exe"C:\Users\Admin\AppData\Local\Temp\1000490001\data.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000491001\2024.exe"C:\Users\Admin\AppData\Local\Temp\1000491001\2024.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000492001\crypteddaisy.exe"C:\Users\Admin\AppData\Local\Temp\1000492001\crypteddaisy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exe"C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\nsxBE0E.tmpC:\Users\Admin\AppData\Local\Temp\nsxBE0E.tmp5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000494001\rdx1122.exe"C:\Users\Admin\AppData\Local\Temp\1000494001\rdx1122.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exe"C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000496001\Miner-XMR1.exe"C:\Users\Admin\AppData\Local\Temp\1000496001\Miner-XMR1.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"4⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000496001\Miner-XMR1.exe"4⤵
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 35⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\1000497001\flesh.exe"C:\Users\Admin\AppData\Local\Temp\1000497001\flesh.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000498001\zonak.exe"C:\Users\Admin\AppData\Local\Temp\1000498001\zonak.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe"C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\system32\conhost.execonhost.exe4⤵
-
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Are.docxFilesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeFilesize
3.0MB
MD5508cd3ed0077794d23adafb23d1309d7
SHA17d6a826a7c4dd30dd66255f0696bb97da7d0c977
SHA2569beda3c5d7d351f6e76526c948345400edc34033aa34619dee05fa68404ce644
SHA5123afdbc5cf7299e4121e818dcfae7cfa23fad91fe368d2581bce284a8d5e908d1cefd976226efb5b8166afddf64c0f9eacfbf9ed7134609dd80cba9fd9657db52
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeFilesize
2.6MB
MD5cd02c76f399bdbf3ac0f25b22ce219a6
SHA1657a7b63251605be541a889f4f0cc02e99715230
SHA25661cdd12897c8b6913ddef4bf9b0c0166abe6f7e74a71935d12c563d7e43a3a44
SHA512b5007d43744c25d938b6b7b9ba70ab81c64d3fc7f73894946fafb73130bfecb3e3cb41362e42474f1636174dfd0d51f32a05976f3a7392e4963129f0781f96ec
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeFilesize
6.2MB
MD555e36dbca0f7e75cc7cb898b6b23038f
SHA19ade178b5a2fc821c1efd4b4615b2d768230372f
SHA256fa0844e266a746487ba6deccdf811ad2fb56ddd662320310cb16f7511622c428
SHA512a959a24befd6132e90c7ead0c6eb8ff80491ad015da1d95fd889f9c559fb03fed4bdfac163f78f34ed4662be0c9c62622b87fb85cb2351989a372556c03aab06
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\nss3.dllFilesize
1.2MB
MD50607cd187509fdce22e54c74956ba431
SHA17956ad9007dbba05873848d9ef9f05e577fac4b1
SHA256cb1080b50baa8c439799306d9d90819ff45352ae91e0b8424b61a0b9c2935b4c
SHA512eb60024e98f1bc839dbdba1c46a9976edaa01755adf7d3dc3908257ce03689e815f710d73019bdbe76acc5b50f529481fdcb59aba9320bc52809166425d02c4a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logFilesize
2KB
MD51dfbfa155719f83b510b162d53402188
SHA15b77bb156fff78643da4c559ca920f760075906c
SHA256b6b12acf9eb1f290b6572cead9166cca3e2714e78058bef0b8b27c93e11f6831
SHA512be0c4d568988494bdc5b94b455215ec0b6f5c00327c481d25bc8aeef683ca150f011c76f8978b4869608387a0a8b3b803f471511897443e574a8e3bd5f9b38ad
-
C:\Users\Admin\AppData\Local\Temp\1000486001\322321.exeFilesize
2.2MB
MD5b1087aa5a1a538d7ee3bd9c3b774bb38
SHA10842a7d8905be9dbe06f9b2bd7376f33373af246
SHA256c85533dc3627cc14b81a22fb204c42c9e5527e15ad78c832da7a159825de6ec7
SHA51246aec87f752382ec9a5ce6f45af70ab54ae3fe158cd2084b27ca55d8224c83417c8a13091648b4b1ffdbf76f2b88ffa0424a76d3619c3516645e70b0c6969cb6
-
C:\Users\Admin\AppData\Local\Temp\1000487001\crypted.exeFilesize
341KB
MD5ece8e2177083eefb49d5e0185b899b93
SHA1ea29f48483d95897da5af016c47ca99f825871cd
SHA2565e88119a34553c24625c42dbbb35b9c969a051a54478ab9227dac4ce720a703e
SHA5124cd4a45cba10387b7e977ca05a3f44efb0ed3911cbd22d2ec00d9e24a9d0e0a424727ddfee9aec71454fb52f0d85f6a42b95656ef232e0538e18d97a5f32646c
-
C:\Users\Admin\AppData\Local\Temp\1000488001\legnew.exeFilesize
289KB
MD53b8212d9d6fdc390c9f5c9262563c34f
SHA11e609b7396ccff4efa6c4a58f00f1826afb10c70
SHA256b7bc7db05aeb57af30283f118d3fb8d3406862de660552dbe6c930516dc6a579
SHA512c0ebb917369977c5de47a4c4081817f9a9b09ddabf990170b60e836cc971aa937c3ad073bdb5e40f301890e5511d950e54b8952fc310fb42dada27f439fc713c
-
C:\Users\Admin\AppData\Local\Temp\1000489001\newbuild.exeFilesize
959KB
MD533c7865d2fbcbccb7f9b4efdad2759cf
SHA138871aecd108aa670010a0cdbdfb1c1d2046f796
SHA25672ec288691f888d841781fea3cc419432b323cde60b5745cf2ac940d319d6fb5
SHA512e794fb9c433ee27ac2936b549812f0264dad34c365e1e878c17a841905e4524a90e7a656d1ccb0ded144e2fea7b4193d90a244c7e4f875afa74b0fb9e7d6069a
-
C:\Users\Admin\AppData\Local\Temp\1000490001\data.exeFilesize
2.5MB
MD587f045db262ae45cf8c3b68e0a1aea20
SHA131fd6c2e9d502f9408fdc2304d9142130bb624d6
SHA256a8b1570d0422cdc242a6f485f453b0ab9fc03b3b0f440b160b4294498d3dfa62
SHA512c0ea2fcf5a94764d4c818f2f92c6f482743086574c1ce476427e08b488a6e3a3b11f9254625ec71f338f8636bdc0cba04bd78ebe0c84bb7f1172f5fbeb212a32
-
C:\Users\Admin\AppData\Local\Temp\1000490001\data.exeFilesize
1.8MB
MD52edcade9660712a2b2bf4b322ac3f95a
SHA1848464568216d4d8e2007d6fd46da2e6bc5d3406
SHA2567608aeeb6288ebb351925457c144ce52043176714b26a4f0c99ebe85c5400dc5
SHA5125df00863e82a88e0564c60fcf1b8b01d7ac48a64a3112b7f63c9fed4c5930cbe14f3874ec00d1821db6b8396af3015278a192dff0c75582e99aa0465bf126544
-
C:\Users\Admin\AppData\Local\Temp\1000490001\data.exeFilesize
1.4MB
MD57a52348b2a19bc839e9fb93af41164b8
SHA16e24f6e577552a8c2c11dd848793346fc2d80817
SHA2560b4f9a22ff89e1f5235b7e6216264cf0ca63924fae22f130c898bd2d64a6598e
SHA5122bc1133a8a1f8c47c0237b7d55beb8c8e0d45d616e9ae0ecf3f00dd12895b49d09a7a53c1bd26ee17fae23c34bab10544ca94c654b463e3aae07e8293e0b3982
-
C:\Users\Admin\AppData\Local\Temp\1000491001\2024.exeFilesize
300KB
MD52c470494b6dc68b2346e42542d80a0fd
SHA187ce1483571bf04d67be4c8cb12fb7dfef4ba299
SHA2561ca8f444f95c2cd9817ce6ab789513e55629c0e0ac0d2b7b552d402517e7cfe9
SHA512c07332228810928b01aba94119e0f93339c08e55ad656d2eaff5c7647e42bbf5ab529232163fb1bbd14af3331a49d0fb537cfb5eb83565f674155e53d4ae41b5
-
C:\Users\Admin\AppData\Local\Temp\1000491001\2024.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\1000492001\crypteddaisy.exeFilesize
387KB
MD5c0101a931d5c1b6e60167ab326c2b49d
SHA1cff1f5af8ab8095552a85d1d56c375efc90720d7
SHA256bf11a72df62ce83529a881e2b42a93618bd523a06fbd1e52a2bc12f160541e75
SHA51277d179d7a3a787c2422b755ddd45241ba90e28fe79ffe2bea93cc2c4bb6aa247d98822d8e526e55b437cbe353bbaf058b8fac26ee6974710452a0d8a4bf6e836
-
C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exeFilesize
1.2MB
MD5bd750f955347f279707ced3e8d2ccc02
SHA1aa1c86e61a82bf7e8bd389d281f8d6e9761cebcd
SHA256efc038496e9133f24cdec53d0a19f2de3d795c9a098512b864ca0a9a8edcdc57
SHA512819bb7d4cd81a62858bbecfd15fbd3d84d5b1d58fac3b3008c3ee369ffe3a64823fd6fe1f23489c7852577d2d39f2bb97a7ba27854d512c36cfb937f585de279
-
C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exeFilesize
1024KB
MD5d64ad3d516eccfb93e80d4036373fecd
SHA1b5a703c149daf6a64fe141812bfa820644959c42
SHA2564d5bd1f0febd46fbf4aa4525f962a34b55bb78c43e85f37b0dfffe7032bd605d
SHA51222582ea860ade1cc2c79456c90bb166dc03a022e9ef008dcd0642479a8c36a21a47f9fce40fae54aa5c0ff4828074ad5bbbd850de8ae7d3699bb6bba962d0011
-
C:\Users\Admin\AppData\Local\Temp\1000493001\latestrocki.exeFilesize
960KB
MD583f916f2e8ce4c7678436cb3a8e4706a
SHA199cde642dbc119cf820a7d2d031a1fa7865b4a61
SHA2565370bb53c3c8969d57d7ca602ca470930fd5d5f671ed9b53abe188489bd867e1
SHA5123a68a981f17a5661f8dcad4207636f7f63fcfdd11589c6afabe568b489ece3528b3a55762a182fc4eaeeed06b491dda8c9fd336ce12427d1af5eaed511938f9c
-
C:\Users\Admin\AppData\Local\Temp\1000494001\rdx1122.exeFilesize
329KB
MD5927fa2810d057f5b7740f9fd3d0af3c9
SHA1b75d4c86d3b4fd9d6ecf4be05d9ebcf4d7fd7ec8
SHA2569285f56d3f84131e78d09d2b85dad48a871eec4702cb6494e9c46a24f70e50f9
SHA51254af68949da4520c87e24d613817003705e8e50d3006e81dcf5d924003c1a1b8185ba89f6878c0abac61f34efbe7a9233f28ba3e678a35983c1e74216a5ac1a8
-
C:\Users\Admin\AppData\Local\Temp\1000494001\rdx1122.exeFilesize
128KB
MD5e359b20dbb49efd52e025be35c4d0887
SHA16c0361d641a2c429c065033f9a3702df9cca6462
SHA2568a51c90caa1ad9ec87005a0d5c0d0fd0e72d7e52ffb92c5838911a19a58cb60b
SHA51261a40e03ff12a2453bb2cbb293f10d98c077528d5a0817308d9e3c28d0ab9064e396c898b5307a4330d72c8d3dc2c6f8ec0bf68aa45503987e184cee6c4b22f0
-
C:\Users\Admin\AppData\Local\Temp\1000494001\rdx1122.exeFilesize
64KB
MD52bff5115aa3a009aa0d90677aa73a71f
SHA139685afb06a3a437c500c7ea296932c558303388
SHA25616a764e826d188da4bdbf6a1733e436e0c2849eadb04248cdb2e56ce1116b433
SHA512a1f90a4b19a83f48038f63a7bc82c4c350d52391142e5a85ffe91163df6d887eba44d966b4c43c8e8b3ec067e6cc85db50876f09d4cee5de0a3b4cff2b97b7a1
-
C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exeFilesize
12.6MB
MD5e4829ca9a56d47bcb94d3e416224616c
SHA105bd6144697075c3ffbee8bc4d47dd31dbcb15c5
SHA256f8b6434832e937865bf5a1d8db588bb40ecf08143cd150cb3cb3921477dcda58
SHA512457e21f78f1ae8fa41d762fe2b16606609b0461994f2f5409d58f9a2c6a682ac02e5ab7077f7ebf102da04eb3382c70d72bf5efeda09656a0ef278facb06ea3b
-
C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exeFilesize
3.4MB
MD5f02d55b3036c43faeda62f867aa1b3d7
SHA1ca55f71285f2973526a29ba9e6949d926b4ae8e1
SHA256a9475b757bd3f8908c2e4dc4d754f2cb3a9848d657db8ec04c0f9f59757759b7
SHA512e468ab2274a91e4e1252726e6870adcf91af3e3105d8e7eec9d52ec411f236833365e082611d635186273f7b4b73e7697eb56bd9323d2198108b9b5d174c9c12
-
C:\Users\Admin\AppData\Local\Temp\1000495001\SetupPowerGREPDemo.exeFilesize
4.6MB
MD545464c82cbc185f785fcd91b9b41a317
SHA13fb7708130df7ca9fa32eaad4da4d49832d29415
SHA25649f38319a7c377f16bdb4ac948b76de06d3723bca9ea06c75dec4181d6b5668c
SHA5129ebba760b6fe3e85bc3c29d64f080569fc75748480eee0935af8d049d1662bb42f456d583f0a266596e64744e0936ed06edcf344bb29e80901b034f7d42b7162
-
C:\Users\Admin\AppData\Local\Temp\1000496001\Miner-XMR1.exeFilesize
3.9MB
MD5bd72d1bd8b5cca1952eeec38ac8033c4
SHA178c58f11f3615c014a9c5e24bc2bef1da65dbdbe
SHA256eb0d2fe20b8b287bb2b41b2c3dbfaeb6f3d0788fa25ccae72a30bd02d8266be4
SHA51233a4ea56cb7a24a29edd9bd75f6e51811808993221927515c4d7643e663505338a70290a82d4b8c22ed528796a87a1e68b55203b5c1b2d3753ac31895fb6a882
-
C:\Users\Admin\AppData\Local\Temp\1000496001\Miner-XMR1.exeFilesize
5.1MB
MD581c3c0e0f2c0a9e22a466ec479a9f42d
SHA18b6cb63958b6255bdacd4d2b5af8b24e0dcbdc61
SHA256df561a1df060fb2bb52371edd6e40b9a01618c19884b78b46e7213e18804b754
SHA512aa3ecd6138bd3f4b26d7563c452ce990ff688910bbb5863d84c4a49150d2624e525d30d23aa75877121ff9f6f3e0c869387aab1fd9aec908d3381dfc16ae38dd
-
C:\Users\Admin\AppData\Local\Temp\1000496001\Miner-XMR1.exeFilesize
2.8MB
MD5e518b559d0fe6b58ed010b778c804dc9
SHA1aeceac1c9931a50c25e7c41d48e6c29a175b99ec
SHA256fbd872edc57501fcd74d10151bc15b17ca1176dbb27fda225f932e2498c673d7
SHA512405243285bb11202f21e097440e846de76c048537ac9978cb548589a3aa293999094f5e418bebe9eb9d12ca8a9074885e8248aab3551aa7dcf35649b19812588
-
C:\Users\Admin\AppData\Local\Temp\1000497001\flesh.exeFilesize
640KB
MD5158a83327c0ca9551819b312c2540d24
SHA19e5514874578a5131fede62f992f01b0dbdcfbb7
SHA25661d8ad5e12a82bac12bfb9a6047c23033570ce73bdb1e97c2d594f29395f2536
SHA512167bad4137fd868f6f999b91618bcbb065c9d52f16994422613f9005c67ed1fff211e2853ce1d9d880bcd19451e943b92ac5e5409d3a8ab95b66e7c0c8b3a9a4
-
C:\Users\Admin\AppData\Local\Temp\1000497001\flesh.exeFilesize
660KB
MD5d8337d7ca38eddace5472f7a274b3943
SHA1273fc254a6051aaf13d74b6f426fd9f1a58dee19
SHA2563ac6dde9c9dfcaed7066ea5af5121fd75a7c6c1ab9bb7bb4ca35784d50efa202
SHA512c65082f8478a7dfae7c244e093f34b8cd67599ab20e39a7db3fc50b346039588772764a4f737ad71fff74655534d6c307338c36de6ca209c5ff8b41d0171f589
-
C:\Users\Admin\AppData\Local\Temp\1000498001\zonak.exeFilesize
1.2MB
MD55c7f139932cb9b67e995813f968256e5
SHA1b7d2254d90d105efd9b7fe754d10b68191d7ff3f
SHA2560bee25160657deefaeb8fd5a32964aba373e25ed4423cbe30fb85be712b1cc61
SHA51250987c3024a4c351c05c0fb47826df552f34248b8680a1972d405c7006dd6806f3dc9e7662afbd33c67d4516e0481f1687bea884748b5b2ac17277861098b9eb
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
384KB
MD5f2137c15bdcb152400397b431940f514
SHA182231354ddbba1be9ea8464852cdaa9ffdaca09d
SHA256562ab4f5a3b7415203635bc0d56abd2d4be4b8b6464965497a7e2c5aa858f00c
SHA51206c0516ef0a53211d9cd35124d0afae98c8cddab3a2f837a17ecae565a5011a50c866112ef6a2aee5a9efceac3d27e4d9e39ff4eb272b26708bf6b6fe906e5fa
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
320KB
MD586200b358118743fc1726cfcbd4f0e47
SHA1403853e7519ec2dac63868d82537d28e0e0fc915
SHA2560b21f356c2f7882410c4f52ac783eecabcb060e60e3c528f45cbf7f6217c9acd
SHA5127b4cc50eaab2cb8100aa1829a751e64af2a78ef78f2911e812321da924ffba545830bfef43853da260d0f2eb8cc9b64a95fea06d4ff485753e7c08ea8e20c6b1
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exeFilesize
256KB
MD5ac4446c19c638bd9ef3a40f2ca440d94
SHA1374b453dead8ee00034fffe036a14f381a61589a
SHA25678c934155fb52dd5b6b1e87354f9e4ce3c9c4919b09517f0cb2adbd2da4ecaf4
SHA512f1e304e51eccb325b6309b9c4014ed5541f4e060894ad0c295228814aa016238bbcfa1d2309dbc8ac24ffdf5d61ca98912f71c42f6a30d6f33d9db48c67aba1a
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeFilesize
832KB
MD5493aaadcde8cc6b5c52ac667397b90f7
SHA12e00ab93263174991fdf98db28f513a50e43ea0c
SHA25667b68339c2c694cf43321c5f039a5a23fbfa015fe5ef221d5e4260f1bc0e4d7c
SHA512f9289fc0734b29060d8fe3b5c0060c79cf9831d56642f09810231d01363a9e4c82522385ec6078cd7b4fda30f436e7acb50636add20c4385b83142727c832716
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exeFilesize
1.1MB
MD5c4b041b5e352f9338916ee9f186279db
SHA1369a5f3a052cd9f97ef7531d9102f31c75831edc
SHA2567bc1de339476c1660277f8a3b9b0b7ad8fa54fad1ebf1f8006114aff5512d3c2
SHA512fe1496a37f3d46aebc7fc507a809d20ab3a89ee3c6487aef5c2af812f947e6826fc540dadc0b7c89ecf5c1bfd152ec3eda83a1fd8e2a051527b55f767f2be158
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exeFilesize
832KB
MD5fe3b75d83b5570be465c0c9d59041add
SHA18d40b313a3fb4cc5124987f2c3b7506635177884
SHA2560d2324adc144f70e571ad6c4de0e9295e497664ccea4053cdf64229a20e326a2
SHA51293a3b05af265687e1d456262df6700a540c84db66a925c74c2b82b984b915efc8f5e0ac22942e07c4e14365c9796a528e5a8e77c14fcacc3301b40663411c333
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exeFilesize
1.7MB
MD5a1617c549a3b92d7d32bd0c41cd41d19
SHA1af85c83f5a4b40beaff01f63a66a1d0870ed8b50
SHA256595e2af731c20a0f3b7c427103a382cb4edd79451713619917df82e1dcb519cb
SHA512f119f7d2bb090ec2ec0446ec41b5cbb285c49ca69fba9029407bf793f678f38805f3d6d0f758d0bc9ea07cddba0d99a530c8e9a5257263a975a6bca123466999
-
C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dllFilesize
64KB
MD55b6a5655c58306d685a1f7ad321e17e3
SHA18b17616540e4e130f4d873a8c0a5d1e960a6d08f
SHA256f9e63d9095a927c510420d9a9c97a8489e11570ae09e46efcf0738bd10630354
SHA512d0cc0cfceb35a35f47d67b3ac1cdc73992b9b45506e2166879ef2b8319917167d2582c78672dd89a276e1c7ea0075df7c32a7e24cea7266bf497ec5a076fcf54
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sk1xvn4p.gks.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeFilesize
790KB
MD5b7668e16e00cfa7aab4fd5833311a9d3
SHA181f2ecd89774c56e0cc9cdb9dfe273df76dfefa7
SHA2563954d6aa2f5fdf62fd9ee50c08eb85a4a3efc7393f7c9ef930bc38dac4ab7366
SHA5127e2146e5e8b28830208a92ddcb57075fd0e046856c0564e3faf5f0d71a6dbe5454c16b45664da4277de795eb53f1be447de4aae2a0a5a0d12eefe9d5be6d96e4
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exeFilesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
C:\Users\Admin\AppData\Local\Temp\nsdB2B3.tmp\INetC.dllFilesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
C:\Users\Admin\AppData\Local\Temp\nsxBE0E.tmpFilesize
239KB
MD570761745a5c862a04cb6703e5affa9a6
SHA15fc7c7ac40e87bcb1f3b3641a25b5c3c2ef091e6
SHA2562ae49b68d007af6bd22c42a173ce65c903f566915ed113f4b030ff12fe68fd47
SHA5123087e380adeea2ec2ef20cbd082dffe6f28949697813b7e3bfa4b6b9b56739034410e96bb370b118c8b517c6b1eef51c2d3bb03ae749a1c90a2a42207cca4b0b
-
C:\Users\Admin\AppData\Local\Temp\rty25.exeFilesize
313KB
MD5be5dd8b7ee665c298c372c4883c3c15e
SHA1f996f23d5a9d9702e564b94a658dddba4e185660
SHA256ecc729d531520e7efb7fc1f228032466412c913df6bba13bdab252813dd01098
SHA5126cf239a6c29ce95def999c786d5b3836e7355f56fe7fc3210f6e1123e83d97a3badc5a5e1afe7b1718195bfd4d0a7223f2fa9af6214e2af5a0922532d5078930
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exeFilesize
272KB
MD543c66bb7924057abaf91e8ac6cc54072
SHA1d05479ac2b8016f9435a75c5ec9506ff42b56563
SHA25635852b3d65c820d9d95c4b5105b5f8ace19a951932111c8b6929b0651591288c
SHA51269b9b5d98e2d098cd48c645bd0dab4dbeadac1614a9e3e373c03c4c171a676188a2874524b2231404b18c742d144d1f4f7722f44daeb4da733eafd42c17d1f62
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
102KB
MD585af6c99d918757171d2d280e5ac61ef
SHA1ba1426d0ecf89825f690adad0a9f3c8c528ed48e
SHA256150fb1285c252e2b79dea84efb28722cc22d370328ceb46fb9553de1479e001e
SHA51212c061d8ff87cdd3b1f26b84748396e4f56fc1429152e418988e042bc5362df96a2f2c17bcf826d17a8bae9045ee3ba0c063fb565d75c604e47009ff442e8c8e
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
C:\Users\Admin\AppData\Roaming\Temp\Task.batFilesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Users\Admin\AppData\Roaming\ms_tool.exeFilesize
418KB
MD5a547556f37c184178a118911f2d1ce97
SHA142d6ac32f7d42a706a83e9474d1ee8c584093dea
SHA256b7c3e1ce4aaf6fc1a1dd77fcdadb3f678d18255e2a4ca5faac2d2dcb4601ce79
SHA51240c7114c92253ca3d71d65dd9313a559c1534aee9c04846605edf770b3410e7a8d3f8da5b154b9d309a1b365bf801557f3a06fc8c06ded7ab1f2a158dd881de3
-
C:\Users\Admin\AppData\Roaming\ms_updater.exeFilesize
300KB
MD5699afe0b79c303adb18e76913d97c2fa
SHA13624f03a23af2b75bc1d86701024e50e5312b2ef
SHA2569c5a036b07dc364fdb2cab03b9a146d6f4ae252b0001b8293f1db84a5e82b153
SHA5123234e33db8d37a805ddef28f7af760c8a9aade8771ac762e3c93b781a82a757a1dc1604053aacc26003e336ca13e95b4004386f6298c4df3aabe8d1813cba516
-
C:\Windows\TEMP\zamrbllfjgdb.sysFilesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
\??\c:\users\admin\appdata\local\temp\F59E91F8Filesize
14B
MD554ef66a2354691f7925f15eb520a888e
SHA1a36036aef8f690db5612eb2326a9015e94e9c43f
SHA2560f6a105fc2a026f60919579108e06a9f7c38f22ca4e4284a6a23eeebb453ef83
SHA51233184e1aa8a6dedf2e6d69e315cfc59ab6ab32cc94861931a23104a02e8c02ac009d02196530caff0fba359ece52b725c511b36d36492e22238dbd447e9ffa85
-
memory/1076-547-0x0000000001380000-0x00000000013D2000-memory.dmpFilesize
328KB
-
memory/1116-272-0x0000000000620000-0x0000000000CA0000-memory.dmpFilesize
6.5MB
-
memory/1116-274-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/1340-360-0x00007FF7FEE20000-0x00007FF7FF0B5000-memory.dmpFilesize
2.6MB
-
memory/1340-190-0x00007FF7FEE20000-0x00007FF7FF0B5000-memory.dmpFilesize
2.6MB
-
memory/1340-443-0x00007FF7FEE20000-0x00007FF7FF0B5000-memory.dmpFilesize
2.6MB
-
memory/1340-549-0x00007FF7FEE20000-0x00007FF7FF0B5000-memory.dmpFilesize
2.6MB
-
memory/1340-258-0x00007FF7FEE20000-0x00007FF7FF0B5000-memory.dmpFilesize
2.6MB
-
memory/1760-257-0x0000000008620000-0x0000000008B4C000-memory.dmpFilesize
5.2MB
-
memory/1760-130-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/1760-111-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/1760-238-0x0000000005C00000-0x0000000005C66000-memory.dmpFilesize
408KB
-
memory/1760-131-0x00000000025E0000-0x0000000002620000-memory.dmpFilesize
256KB
-
memory/1760-138-0x0000000004B10000-0x0000000004B4E000-memory.dmpFilesize
248KB
-
memory/1760-143-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/1760-242-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/1760-243-0x00000000063F0000-0x0000000006466000-memory.dmpFilesize
472KB
-
memory/1760-244-0x00000000066F0000-0x000000000670E000-memory.dmpFilesize
120KB
-
memory/1760-245-0x0000000007020000-0x0000000007070000-memory.dmpFilesize
320KB
-
memory/1760-246-0x0000000008450000-0x0000000008612000-memory.dmpFilesize
1.8MB
-
memory/1760-144-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/1760-147-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/1760-174-0x0000000005260000-0x0000000005878000-memory.dmpFilesize
6.1MB
-
memory/1760-185-0x0000000004BF0000-0x0000000004C02000-memory.dmpFilesize
72KB
-
memory/1760-307-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/1760-231-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/1760-196-0x0000000005880000-0x000000000598A000-memory.dmpFilesize
1.0MB
-
memory/1760-271-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/1760-216-0x0000000004C10000-0x0000000004C4C000-memory.dmpFilesize
240KB
-
memory/1760-223-0x0000000005AB0000-0x0000000005AFC000-memory.dmpFilesize
304KB
-
memory/1936-126-0x0000000000550000-0x00000000005AA000-memory.dmpFilesize
360KB
-
memory/1936-142-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/1936-141-0x00000000029E0000-0x00000000049E0000-memory.dmpFilesize
32.0MB
-
memory/1936-108-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/1972-1-0x0000000000B60000-0x0000000000F68000-memory.dmpFilesize
4.0MB
-
memory/1972-2-0x0000000000B60000-0x0000000000F68000-memory.dmpFilesize
4.0MB
-
memory/1972-4-0x0000000000B60000-0x0000000000F68000-memory.dmpFilesize
4.0MB
-
memory/1972-0-0x0000000000B60000-0x0000000000F68000-memory.dmpFilesize
4.0MB
-
memory/1972-16-0x0000000000B60000-0x0000000000F68000-memory.dmpFilesize
4.0MB
-
memory/2004-388-0x0000000000400000-0x0000000000866000-memory.dmpFilesize
4.4MB
-
memory/2236-262-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-132-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-135-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-438-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-364-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-56-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-186-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-17-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2236-15-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/2320-140-0x0000000004920000-0x00000000049B2000-memory.dmpFilesize
584KB
-
memory/2320-127-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/2320-128-0x0000000000010000-0x0000000000062000-memory.dmpFilesize
328KB
-
memory/2320-129-0x0000000004E30000-0x00000000053D4000-memory.dmpFilesize
5.6MB
-
memory/2320-234-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/2320-146-0x00000000048E0000-0x00000000048F0000-memory.dmpFilesize
64KB
-
memory/2368-567-0x00007FF6820D0000-0x00007FF682B0D000-memory.dmpFilesize
10.2MB
-
memory/2596-323-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/2884-571-0x00000000007D0000-0x000000000082A000-memory.dmpFilesize
360KB
-
memory/3284-600-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/3284-599-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/3284-595-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/3284-601-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/3284-603-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/3284-598-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/3344-575-0x0000000000400000-0x00000000008E2000-memory.dmpFilesize
4.9MB
-
memory/3344-418-0x0000000000400000-0x00000000008E2000-memory.dmpFilesize
4.9MB
-
memory/3364-136-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/3364-159-0x0000000005600000-0x000000000560A000-memory.dmpFilesize
40KB
-
memory/3364-299-0x00000000054F0000-0x0000000005500000-memory.dmpFilesize
64KB
-
memory/3364-145-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/3364-273-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/3448-524-0x0000000000400000-0x000000000049E000-memory.dmpFilesize
632KB
-
memory/3448-529-0x0000000000400000-0x000000000049E000-memory.dmpFilesize
632KB
-
memory/3504-227-0x0000000000F10000-0x0000000000F78000-memory.dmpFilesize
416KB
-
memory/3504-239-0x0000000003240000-0x0000000005240000-memory.dmpFilesize
32.0MB
-
memory/3504-228-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/3504-232-0x0000000005870000-0x0000000005880000-memory.dmpFilesize
64KB
-
memory/3504-237-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/3588-379-0x00000000025D0000-0x00000000025E6000-memory.dmpFilesize
88KB
-
memory/4328-417-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/4328-538-0x0000000000400000-0x0000000000D1C000-memory.dmpFilesize
9.1MB
-
memory/4384-304-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4384-336-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4384-338-0x0000000002960000-0x0000000004960000-memory.dmpFilesize
32.0MB
-
memory/4384-300-0x0000000000670000-0x00000000006C6000-memory.dmpFilesize
344KB
-
memory/4496-325-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4496-194-0x0000000005440000-0x00000000054DC000-memory.dmpFilesize
624KB
-
memory/4496-192-0x0000000000550000-0x0000000000B58000-memory.dmpFilesize
6.0MB
-
memory/4496-193-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4504-422-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/4504-261-0x0000000000F60000-0x0000000001368000-memory.dmpFilesize
4.0MB
-
memory/4672-313-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4672-195-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4672-191-0x00000000002E0000-0x0000000000332000-memory.dmpFilesize
328KB
-
memory/4672-215-0x0000000004B80000-0x0000000004B90000-memory.dmpFilesize
64KB
-
memory/4736-241-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4736-233-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/4736-240-0x0000000005410000-0x0000000005420000-memory.dmpFilesize
64KB
-
memory/4948-437-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/4948-476-0x0000000000400000-0x000000000085E000-memory.dmpFilesize
4.4MB