Analysis
-
max time kernel
65s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
b38fe213704c50c252032bdee6ee365d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b38fe213704c50c252032bdee6ee365d.exe
Resource
win10v2004-20231215-en
General
-
Target
b38fe213704c50c252032bdee6ee365d.exe
-
Size
792KB
-
MD5
b38fe213704c50c252032bdee6ee365d
-
SHA1
57066b081670b153ff20ed89d6c8c7394a8fa2cf
-
SHA256
a3791f9a33de62edfcfbb4bad919ed4dfdf81b914ce7af5120233bd20228765b
-
SHA512
0a5693ffce16e2b0d89da12a78c87206bdeb8ce8f93ea60bd24c9b2f73acf9284ce1e4c002564305e0d79b50613539e3b2d711c8bba21653186010a094d97f05
-
SSDEEP
24576:KjL7Ymvzb2nlwQDsiK32YsP/rYmnt5pt:6b2nllE32Ysnrz
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Extracted
redline
2024
195.20.16.103:20440
Extracted
risepro
193.233.132.62:50500
Extracted
redline
@PixelsCloud
94.156.67.230:13781
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
redline
LiveTrafic
20.79.30.95:33223
Extracted
redline
@oni912
45.15.156.209:40481
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 9 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000860001\2024.exe family_redline behavioral2/memory/780-97-0x00000000001E0000-0x0000000000232000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000876001\sadsadsadsa.exe family_redline behavioral2/memory/2896-193-0x0000000000040000-0x0000000000094000-memory.dmp family_redline behavioral2/memory/1944-432-0x0000000000400000-0x0000000000454000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
ladas.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ladas.exe -
XMRig Miner payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/2480-406-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-408-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-425-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-426-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-427-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-428-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-429-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-457-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2480-458-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2424-555-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral2/memory/2424-557-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 48 2236 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Stops running service(s) 3 TTPs
-
.NET Reactor proctector 4 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/3852-247-0x00000000023D0000-0x000000000244E000-memory.dmp net_reactor behavioral2/memory/3852-249-0x0000000005210000-0x000000000528E000-memory.dmp net_reactor behavioral2/memory/320-496-0x0000000004B90000-0x0000000004C28000-memory.dmp net_reactor behavioral2/memory/320-499-0x0000000005240000-0x00000000052D8000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
RuntimeBroker.exeladas.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ladas.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b38fe213704c50c252032bdee6ee365d.exeexplorhe.exechrosha.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation b38fe213704c50c252032bdee6ee365d.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation explorhe.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation chrosha.exe -
Executes dropped EXE 18 IoCs
Processes:
explorhe.exeplana.exe1234pixxxx.exeAmadey.exe2024.exeladas.exemilan1234.exesadsadsadsa.exe1233213123213.execrptchk.exechrosha.exe55555.exeexplorhe.exeredline1234.exeuwgxswmtctao.exeRuntimeBroker.exegoldklassd.exemrk1234.exepid process 528 explorhe.exe 2972 plana.exe 4740 1234pixxxx.exe 4868 Amadey.exe 780 2024.exe 932 ladas.exe 4744 milan1234.exe 2896 sadsadsadsa.exe 1104 1233213123213.exe 3852 crptchk.exe 644 chrosha.exe 4456 55555.exe 320 explorhe.exe 736 redline1234.exe 1844 uwgxswmtctao.exe 920 RuntimeBroker.exe 4100 goldklassd.exe 320 mrk1234.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ladas.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Wine ladas.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 2236 rundll32.exe 4296 rundll32.exe 3652 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2480-397-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-403-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-404-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-401-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-406-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-408-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-425-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-426-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-427-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-428-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-429-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-394-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-457-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2480-458-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
Processes:
description ioc process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorhe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\plana.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000674001\\plana.exe" explorhe.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ladas.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000872001\\ladas.exe" explorhe.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 api.ipify.org 36 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
explorhe.exeplana.exeladas.exepid process 528 explorhe.exe 2972 plana.exe 932 ladas.exe 528 explorhe.exe 2972 plana.exe 528 explorhe.exe 2972 plana.exe 528 explorhe.exe 2972 plana.exe 2972 plana.exe 528 explorhe.exe 2972 plana.exe 528 explorhe.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
crptchk.exeuwgxswmtctao.exegoldklassd.exedescription pid process target process PID 3852 set thread context of 872 3852 crptchk.exe RegAsm.exe PID 1844 set thread context of 2480 1844 uwgxswmtctao.exe explorer.exe PID 4100 set thread context of 1944 4100 goldklassd.exe RegAsm.exe -
Drops file in Windows directory 1 IoCs
Processes:
Amadey.exedescription ioc process File created C:\Windows\Tasks\chrosha.job Amadey.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 872 sc.exe 4868 sc.exe 4312 sc.exe 3856 sc.exe 3744 sc.exe 3576 sc.exe 3712 sc.exe 2248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1948 872 WerFault.exe RegAsm.exe 4224 4456 WerFault.exe 55555.exe 4476 4456 WerFault.exe 55555.exe 752 2928 WerFault.exe RegAsm.exe 5116 2928 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 36 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 11 IoCs
Processes:
explorer.exeStartMenuExperienceHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-635608581-3370340891-292606865-1000\{F8CE252B-6288-4A52-890D-A88A1D9E6FCF} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHost = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
ladas.exemilan1234.exe1233213123213.exeredline1234.exeuwgxswmtctao.exerundll32.exeRuntimeBroker.exepid process 932 ladas.exe 932 ladas.exe 4744 milan1234.exe 1104 1233213123213.exe 3352 3352 736 redline1234.exe 736 redline1234.exe 736 redline1234.exe 736 redline1234.exe 1844 uwgxswmtctao.exe 3652 rundll32.exe 3652 rundll32.exe 3652 rundll32.exe 3652 rundll32.exe 3652 rundll32.exe 3652 rundll32.exe 920 RuntimeBroker.exe 920 RuntimeBroker.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
milan1234.exe1233213123213.exepid process 4744 milan1234.exe 1104 1233213123213.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
Processes:
explorer.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 3352 Token: SeCreatePagefilePrivilege 3352 Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe Token: SeLockMemoryPrivilege 2480 explorer.exe Token: SeShutdownPrivilege 4804 explorer.exe Token: SeCreatePagefilePrivilege 4804 explorer.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
b38fe213704c50c252032bdee6ee365d.exeexplorer.exepid process 1288 b38fe213704c50c252032bdee6ee365d.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe -
Suspicious use of SendNotifyMessage 11 IoCs
Processes:
explorer.exepid process 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
b38fe213704c50c252032bdee6ee365d.exeexplorhe.exeplana.exeexplorhe.exeStartMenuExperienceHost.exepid process 1288 b38fe213704c50c252032bdee6ee365d.exe 528 explorhe.exe 2972 plana.exe 320 explorhe.exe 220 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b38fe213704c50c252032bdee6ee365d.exeexplorhe.execrptchk.exechrosha.exerundll32.exeuwgxswmtctao.exerundll32.exedescription pid process target process PID 1288 wrote to memory of 528 1288 b38fe213704c50c252032bdee6ee365d.exe explorhe.exe PID 1288 wrote to memory of 528 1288 b38fe213704c50c252032bdee6ee365d.exe explorhe.exe PID 1288 wrote to memory of 528 1288 b38fe213704c50c252032bdee6ee365d.exe explorhe.exe PID 528 wrote to memory of 4152 528 explorhe.exe schtasks.exe PID 528 wrote to memory of 4152 528 explorhe.exe schtasks.exe PID 528 wrote to memory of 4152 528 explorhe.exe schtasks.exe PID 528 wrote to memory of 2972 528 explorhe.exe plana.exe PID 528 wrote to memory of 2972 528 explorhe.exe plana.exe PID 528 wrote to memory of 2972 528 explorhe.exe plana.exe PID 528 wrote to memory of 4740 528 explorhe.exe 1234pixxxx.exe PID 528 wrote to memory of 4740 528 explorhe.exe 1234pixxxx.exe PID 528 wrote to memory of 4740 528 explorhe.exe 1234pixxxx.exe PID 528 wrote to memory of 4868 528 explorhe.exe Amadey.exe PID 528 wrote to memory of 4868 528 explorhe.exe Amadey.exe PID 528 wrote to memory of 4868 528 explorhe.exe Amadey.exe PID 528 wrote to memory of 780 528 explorhe.exe 2024.exe PID 528 wrote to memory of 780 528 explorhe.exe 2024.exe PID 528 wrote to memory of 780 528 explorhe.exe 2024.exe PID 528 wrote to memory of 932 528 explorhe.exe ladas.exe PID 528 wrote to memory of 932 528 explorhe.exe ladas.exe PID 528 wrote to memory of 932 528 explorhe.exe ladas.exe PID 528 wrote to memory of 4744 528 explorhe.exe milan1234.exe PID 528 wrote to memory of 4744 528 explorhe.exe milan1234.exe PID 528 wrote to memory of 2896 528 explorhe.exe sadsadsadsa.exe PID 528 wrote to memory of 2896 528 explorhe.exe sadsadsadsa.exe PID 528 wrote to memory of 2896 528 explorhe.exe sadsadsadsa.exe PID 528 wrote to memory of 1104 528 explorhe.exe 1233213123213.exe PID 528 wrote to memory of 1104 528 explorhe.exe 1233213123213.exe PID 528 wrote to memory of 3852 528 explorhe.exe crptchk.exe PID 528 wrote to memory of 3852 528 explorhe.exe crptchk.exe PID 528 wrote to memory of 3852 528 explorhe.exe crptchk.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 3852 wrote to memory of 872 3852 crptchk.exe RegAsm.exe PID 528 wrote to memory of 2236 528 explorhe.exe rundll32.exe PID 528 wrote to memory of 2236 528 explorhe.exe rundll32.exe PID 528 wrote to memory of 2236 528 explorhe.exe rundll32.exe PID 528 wrote to memory of 4456 528 explorhe.exe 55555.exe PID 528 wrote to memory of 4456 528 explorhe.exe 55555.exe PID 528 wrote to memory of 4456 528 explorhe.exe 55555.exe PID 528 wrote to memory of 736 528 explorhe.exe redline1234.exe PID 528 wrote to memory of 736 528 explorhe.exe redline1234.exe PID 644 wrote to memory of 4296 644 chrosha.exe rundll32.exe PID 644 wrote to memory of 4296 644 chrosha.exe rundll32.exe PID 644 wrote to memory of 4296 644 chrosha.exe rundll32.exe PID 4296 wrote to memory of 3652 4296 rundll32.exe rundll32.exe PID 4296 wrote to memory of 3652 4296 rundll32.exe rundll32.exe PID 1844 wrote to memory of 2480 1844 uwgxswmtctao.exe explorer.exe PID 1844 wrote to memory of 2480 1844 uwgxswmtctao.exe explorer.exe PID 528 wrote to memory of 920 528 explorhe.exe RuntimeBroker.exe PID 528 wrote to memory of 920 528 explorhe.exe RuntimeBroker.exe PID 528 wrote to memory of 4100 528 explorhe.exe goldklassd.exe PID 528 wrote to memory of 4100 528 explorhe.exe goldklassd.exe PID 528 wrote to memory of 4100 528 explorhe.exe goldklassd.exe PID 1844 wrote to memory of 2480 1844 uwgxswmtctao.exe explorer.exe PID 3652 wrote to memory of 4208 3652 rundll32.exe netsh.exe PID 3652 wrote to memory of 4208 3652 rundll32.exe netsh.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
description ioc process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 -
outlook_win_path 1 IoCs
Processes:
description ioc process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Processes
-
C:\Users\Admin\AppData\Local\Temp\b38fe213704c50c252032bdee6ee365d.exe"C:\Users\Admin\AppData\Local\Temp\b38fe213704c50c252032bdee6ee365d.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explorhe.exe /TR "C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000674001\plana.exe"C:\Users\Admin\AppData\Local\Temp\1000674001\plana.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\1000755001\1234pixxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000755001\1234pixxxx.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000853001\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\1000853001\Amadey.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\1000860001\2024.exe"C:\Users\Admin\AppData\Local\Temp\1000860001\2024.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000872001\ladas.exe"C:\Users\Admin\AppData\Local\Temp\1000872001\ladas.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1000874001\milan1234.exe"C:\Users\Admin\AppData\Local\Temp\1000874001\milan1234.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1000876001\sadsadsadsa.exe"C:\Users\Admin\AppData\Local\Temp\1000876001\sadsadsadsa.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000878001\1233213123213.exe"C:\Users\Admin\AppData\Local\Temp\1000878001\1233213123213.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1000883001\crptchk.exe"C:\Users\Admin\AppData\Local\Temp\1000883001\crptchk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 6005⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000884001\55555.exe"C:\Users\Admin\AppData\Local\Temp\1000884001\55555.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 11124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 11364⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000888001\redline1234.exe"C:\Users\Admin\AppData\Local\Temp\1000888001\redline1234.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "ACULXOBT"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "ACULXOBT" binpath= "C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe" start= "auto"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "ACULXOBT"4⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exe"C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exe"3⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"4⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exe"4⤵
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 35⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\1000890001\goldklassd.exe"C:\Users\Admin\AppData\Local\Temp\1000890001\goldklassd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000891001\mrk1234.exe"C:\Users\Admin\AppData\Local\Temp\1000891001\mrk1234.exe"3⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 12245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 12165⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000896001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000896001\crypted.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000892001\dayroc.exe"C:\Users\Admin\AppData\Local\Temp\1000892001\dayroc.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵
-
C:\Users\Admin\AppData\Local\Temp\nss4907.tmpC:\Users\Admin\AppData\Local\Temp\nss4907.tmp5⤵
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000895001\alex.exe"C:\Users\Admin\AppData\Local\Temp\1000895001\alex.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe"C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exe"C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\1000894001\leg221.exe"C:\Users\Admin\AppData\Local\Temp\1000894001\leg221.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 872 -ip 8721⤵
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\356085813370_Desktop.zip' -CompressionLevel Optimal4⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exeC:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4456 -ip 44561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4456 -ip 44561⤵
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\conhost.execonhost.exe2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2928 -ip 29281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2928 -ip 29281⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeC:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeFilesize
2.2MB
MD5bf366d72a88db418bf7d3bfebc74a70c
SHA133b51862db0ef21435ce7aa192119d6aa0ce0807
SHA256530e4e1ba7b0be580beb78ac550e4bb87b6e37c84d4becc3fcc3ad6570f2f118
SHA5120ee742e0a3ad3ce6002c69135731ad31ec510bb08a76c2bf665e99e21f83a743bf86696ffbdd8b899e7f7cc44ea420cea9e9ba260ca584b5023192f28350700e
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeFilesize
2.4MB
MD50f6b510284c72a95538597e04c158a70
SHA106efb99318b29d3e6ba344c2d0adb7d1f31cbfd0
SHA2567985397e575f58289e2de2ca2cc0202794fa69c1d57b9b7ab60da1ba99b4cd2f
SHA51258d22b02306e3bf715060bb7d4d1201730cda3aca926df48a304fdc822f3e39b4d296c7a2f7671cd6c9c8e5b9d1f0069e244f298dc73d6afc9822363bd1c9d5b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133514488696446612.txtFilesize
74KB
MD5c09e63e4b960a163934b3c29f3bd2cc9
SHA1d3a43b35c14ae2e353a1a15c518ab2595f6a0399
SHA256308deca5e1ef4d875fbe0aff3ce4b0b575b28e643dffda819d4390ec77faf157
SHA5125ca3321034dff47e3afe0b0bdfaffc08782991660910a29375a8e0363794b78247282aba65dbd882ae225aa140ae63927dfd0946a441ee6fa64a1d8c146777b9
-
C:\Users\Admin\AppData\Local\Temp\1000674001\plana.exeFilesize
1.1MB
MD58585ea81910652bb9686c7e12db34b10
SHA165921f4e02e2bc76a017671a9f3f2c1d06349478
SHA256261c5bbafe8e6b0dc83f6770c23985b49333e97b95aca4b2a28238f6cbed1a83
SHA512edc907c04f886ac92feacae74e326a6c07141233c0a08f7209242ccdd185c34b80833ed4d6a7190da055919503a34ce8f57ef61ff45bde0acb64c905494cdcfa
-
C:\Users\Admin\AppData\Local\Temp\1000755001\1234pixxxx.exeFilesize
1.2MB
MD5e2695d45520fe4058a6df4dff94b51e9
SHA1d78899abd8d0cca04c062a9bc5a5a3758c77683d
SHA2569f51a2ea69977f334c9bc84a4b16a144b8480f978eb975a0e8027a4614c36e8f
SHA512a7f30148367905b1ed413fda9f7c008e651f723a39b582ea095c14728cdc971c43918136c760cbac8d5731db471067a7acb3f311111022f529b9b62c978cdfb7
-
C:\Users\Admin\AppData\Local\Temp\1000853001\Amadey.exeFilesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
C:\Users\Admin\AppData\Local\Temp\1000860001\2024.exeFilesize
300KB
MD52c470494b6dc68b2346e42542d80a0fd
SHA187ce1483571bf04d67be4c8cb12fb7dfef4ba299
SHA2561ca8f444f95c2cd9817ce6ab789513e55629c0e0ac0d2b7b552d402517e7cfe9
SHA512c07332228810928b01aba94119e0f93339c08e55ad656d2eaff5c7647e42bbf5ab529232163fb1bbd14af3331a49d0fb537cfb5eb83565f674155e53d4ae41b5
-
C:\Users\Admin\AppData\Local\Temp\1000872001\ladas.exeFilesize
2.2MB
MD541385f53f9ad44b13bae7023784b5496
SHA1bad9cbad4ad46df444f6beb18611176e639533c2
SHA2567990412d5f5a7f9848d8afe3b3296e455fd50ae5ba214a98bb7d50742966c03f
SHA5127acbe322a9fa1c0a8b2f4f19bc11ed7c967d8d929888f1891082631c431e79a03db160d79f7b73c2d512d349f60f75e761f8d1f5927c18c59ab0d993c654f4d5
-
C:\Users\Admin\AppData\Local\Temp\1000872001\ladas.exeFilesize
2.1MB
MD51123e837c0f82f74ef42a6fc30da2960
SHA1bddbd543f082f483325d5888d3c3aec5839a121f
SHA2566f6468f8dde95377b2800575f6cc851372d58b0d8d6b76b9a6a33db9862edf87
SHA512e24a1e1bb4e108f530e63dbba2fe814c814d1e27aedf49b1ec275e3a1296d22b61b4856df0b36714b750139bb2f9c1b17f2150e1f615b010c8eb13e2194359ce
-
C:\Users\Admin\AppData\Local\Temp\1000874001\milan1234.exeFilesize
2.6MB
MD5b69036a695b48549380a64c8df3a00f1
SHA11f70d2f6e9b3172291fba309d60adea856af6be0
SHA256e5c80844063be3cea01fa549f22c23723909ce5e596e2f9001b8c37099657210
SHA5124d5c763842c556eca464cb6aceb3cb6b68ed16794f159c06f28873f32580ee977cef9e9697b92b2f3b1c1d72592f03460b53964ff5d2593a05b7f6a7aafd9cf3
-
C:\Users\Admin\AppData\Local\Temp\1000874001\milan1234.exeFilesize
2.1MB
MD5f1f32730bfd06711419fad20ebf45fa2
SHA141a4b678fbba74e758ad1cd0bd14ce3a4d88752e
SHA25602ba62c6262e868bfe8e83652326c9b53d541834f8998a84a21a4a31f559fdb3
SHA5126a6f51eba8a68fd3fd497b7566abaae2533642783e2bc602711ed2d05354a8cbd720e97ac6d7a79522e3f11240e317916e8be459c537a003c7c9c00451e68c39
-
C:\Users\Admin\AppData\Local\Temp\1000874001\milan1234.exeFilesize
1.9MB
MD52a48ced2d5d6e6271259561a63fe283f
SHA1ae0d15b796e974c793b81f941fb3cd2f0d698891
SHA2568de45f9901b106a9f9b157c4332d15a968d326dcb56817279e7ffd63c21db7f9
SHA512428390ebdb643d9f0cfd68f942531a3dc50d17b2a5ea7de09ae984e1abf7ee8369f48b63ab5cba58adc40f5304649d428826d0e3b869f0e0a494cf40291e9ffa
-
C:\Users\Admin\AppData\Local\Temp\1000876001\sadsadsadsa.exeFilesize
313KB
MD55a6358bb95f251ab50b99305958a4c98
SHA1c7efa3847114e6fa410c5b2d3056c052a69cda01
SHA25654b5e43af21ab13e87ff59f80a62d1703f02f53db2b43ddca2bbd6b79eb953c5
SHA5124ba31d952bffbe877a9d0d5df647e695e16166d0efe7e05e00ddb48487ab703413351a49043965d5d67ed9faca52832ed01bf9fa24d5943fd591b2d263cf05c0
-
C:\Users\Admin\AppData\Local\Temp\1000878001\1233213123213.exeFilesize
446KB
MD55eedebbe9acd779319a6dbdc209f9200
SHA16b035a673006992b1f15dd946b91fe2ca30d4498
SHA256eedfaf99d30107ae526d368810f67a8e2878d142210338b21b92a1eb5d89e9df
SHA5128ca6110b2b68204e159562d60930e3f4ea1e38934ddaabb7f80a47814c6fbf42f1e435f6738d8820787e40f995b88c1e8f28c197b7a9ec34fa303b42589b8484
-
C:\Users\Admin\AppData\Local\Temp\1000878001\1233213123213.exeFilesize
128KB
MD5d63cfdc6e14305fa2c6e6d5ef197bf4b
SHA164aa8ddc6c598d9441784d5c8f77a1082abfdeae
SHA256506d478d6e6c22f04413784551b4405bd15c48c448c82584f47ad2e86a65c6c4
SHA512119640e354253634b1c5b1ce70e33c7104739cab7ad00747dbfc80772db40d8c6180a1980bb54ba488824a2086d1c40de266b0e05425ea103bafad172d48b48f
-
C:\Users\Admin\AppData\Local\Temp\1000883001\crptchk.exeFilesize
595KB
MD563d9528b6667199d22c482f15643ab31
SHA16b6ee0d6d1d661dc3806b653757c5fa8fbc7fd36
SHA2567c94846904eeffd843980d64ba0eee3b8a81a52aeb60b5a5195bf7b426e4a443
SHA5121bcf34c21d452db4212358d5ba10339b1d8c42ceda80741affdd54f2bc6dac876e10d72b583e7e7df65d47d9d4f95184b38f7b51963e82afba34d8540dc44e58
-
C:\Users\Admin\AppData\Local\Temp\1000884001\55555.exeFilesize
655KB
MD5167c40ace009f5d5cda541008804c3b3
SHA1541bc50815f39227b9e01e5e4db6a08c02cedf4d
SHA256620bace13215ee69bcbdf8ac237798e8ab2ff052492303e2bac32d0a5a03f44a
SHA51260aa62eb8803bc2a8e95ea3ecadeb93e3859288d1b06a1d63451f48b10b8bbeef862c978143b419cf82d9f0fb6e1792cf82dd466f184173ca9bc8a7ffae09c15
-
C:\Users\Admin\AppData\Local\Temp\1000884001\55555.exeFilesize
275KB
MD578f8178c5ebdbaa17536b33cf4c75b23
SHA1c2a29079d3ab7858617c81bbba4402d6e4872eeb
SHA256036c8d33433fd36ce09a751f4f9e351fc4fe19d251541ea7a782bda0756fbfd2
SHA5123a758f488cc4b808ee00a2b00c221296b3ffa98c6df7e0a6925e387abdf1d20d39abc223bfe36b7c8c6b75fb4cdc6ed34b37bcfbe54b5a4be34e1fa813dc5abc
-
C:\Users\Admin\AppData\Local\Temp\1000884001\55555.exeFilesize
96KB
MD5f8980ce07f7e982e27e0997d04e7462c
SHA176a2f32a80e0dcbb2b391632ce384d684612712e
SHA2564ba48c9e0a853ddce6fc68cfcffd1ca8c3c2a34abb56d5fd5af48de3b527c820
SHA512bccad73048eb24fa683a46f1e69c1e6b8867523944fc0fc65966ba9f8cd2120b02dafdb7618d23a5fa8c2b436ea12b47cf8ff6ca2e01a04010b87fbe3cd6cfa2
-
C:\Users\Admin\AppData\Local\Temp\1000888001\redline1234.exeFilesize
2.5MB
MD55dec9f02f7067194f9928e37ed05c8f6
SHA106f13ca068514d08f0595ded4ef140078888235a
SHA256dfecb99cc255e99b5df34a042f0585c0e8458a4e0075e7d513d2c0b492c41806
SHA51298f980ab103c54c4b1b344b738bcaccd10a35923749a730dd3386355897156d382f01715d07a056ff7451e876898a76268328f92d1e8203b254bb7a082f18e7c
-
C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exeFilesize
1024KB
MD52149cad9389c08a45b531eb27cae403a
SHA10046f2f476ca9b662862369930324c15ac407bc0
SHA2566b598f21152dada10b081937a88b3c66b58fe7f0176dce0452a7b886cf01761e
SHA5128f1aabe670465257c91682495717b357229843ea9bec6cde3ece161d1b543f4a102bcc50bdcc364e37c94ab41bcbafb52622e4091f6e7d9c782358f1a23df751
-
C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exeFilesize
2.4MB
MD5a28313b78915e3e4052ff2ee533cbf50
SHA12a4bdef87542364dc6a8a967e1cc149175de9da6
SHA2560c1c928ef03e1e95d7c3d93a88d203a426ec4fd8e99f02d6a896a823b1691dc8
SHA512aedfa999f762d925da4ca428712a2882a09306851cd525f9d4b950c5f2e9dd083eb1b4fb20d950bef81de9c1fc85945de87332b51b092a7802575df15a0e796e
-
C:\Users\Admin\AppData\Local\Temp\1000889001\moto.exeFilesize
1.3MB
MD5eb58f6f35f864309bf5309012f46c6d5
SHA1e13561f9430c4f04a8d720d0f2c1c41c26cf5a32
SHA2569651d737b04e660ff4f2f9cce1e4af0cca7cee158f297f1175be22135da93673
SHA5120305d8b0bfc8b9b80aa8ec72c6bf6251d09f510dfed2b9e347b69b4541009c2da26daf8ae60883dae87557d980760dda59ffc738618809408b789da5f7d6af93
-
C:\Users\Admin\AppData\Local\Temp\1000890001\goldklassd.exeFilesize
399KB
MD5a647afc0219638fb62a777cd2f32a4bd
SHA1ef5ad8aaac4adcf8856a939e8d17259cccb22035
SHA256b5e5a6adbbb37ddc7b3aa54df9bfb61c2038d887db8f44d1deb63e64fddf4436
SHA512411a4a24aa37242276798cda5cce488165b828d9929c71891d5af926229068161796684e9f6476f8ca460d79facbc45fa8125c030c3645a3dcab7dca2ebfa044
-
C:\Users\Admin\AppData\Local\Temp\1000890001\goldklassd.exeFilesize
128KB
MD549462507d600f86fd419814e63c1151f
SHA1dab4b331c1972bfd91e5a979294cf5a1f5e82cbf
SHA2569565cc7e8fecb62ddb2fa42c872a465e173f8517e2b7051e31e4ecbbf0b24f97
SHA512a1930562631f2fb757346ae444c05bc427d4ef3e87099df48c0aed7f7372cf895136fc734ff853753f701b36d5fef3962613bded49e4f29a14ff0ffd824397f9
-
C:\Users\Admin\AppData\Local\Temp\1000891001\mrk1234.exeFilesize
64KB
MD54b54f08bf45cb47b357adb58dff0b5f3
SHA14da7b901e1b55810cd82f392458ade1e7fefb1da
SHA256ef550d03d8e495c366e2d66a0ded4c7ad9873853d61c6e4d3d2ee660550beec0
SHA512e8dce824b52e9ac50645e2487e2ca1b26fecb992dc58ef23892a77b653f40e3074e71ad3d9e7589bae6afb1e7832bd17eb83cabc864009faff716faae6fe53de
-
C:\Users\Admin\AppData\Local\Temp\1000891001\mrk1234.exeFilesize
195KB
MD5bc3a7130633830fba9f287f5b67fffdc
SHA1a24321aaebd01716600c69bd2f56be0a0665b022
SHA25685d5aa9649883df874f9dfee327d95aa544244719e13f6db0f54f0cd81f0b27a
SHA512b876e6c571a5b7bc600936128f6b423da4d620e6b22dd450f0ef1a8ca0528dc306cd2fbec86a36ab8d9957f1ff5a56d65c2144dcbf9fb97bf282e8a54cf75d22
-
C:\Users\Admin\AppData\Local\Temp\1000891001\mrk1234.exeFilesize
119KB
MD50a7c58d2573af441d02a4da6a66c2f7e
SHA10d804d72adbec3825b33566f2a5ccea767d49624
SHA25669cb4cc5e60d169ebf3503146027557eba78c2b3937870c4f76d58fb034fb451
SHA5125dde19e5384a8c38e8e5f32ddd437f48943238039eb32b12e9a05f1a6a85e9bd6505f3f3a3aa72192872485efdb56d8a2ae373ad59491e2cf0ed085810d97004
-
C:\Users\Admin\AppData\Local\Temp\1000892001\dayroc.exeFilesize
64KB
MD5cc8ffc598f8b37f74518ea000e15058e
SHA1559b05d2c0a0655b04e1eca522037081dbdde36c
SHA2561e116e53eff1d938d6f178c8f02f40510a8f9532c9c55f8b33fc5bcd61e29992
SHA5129035bd007b026811cdece6def8fc657d2a2c709e0bace6223a24167ed49e1edc7ef29ae03fb73756c9e032ef1d58fdf7ae0315eb8e82b4eda1ff4950383850e1
-
C:\Users\Admin\AppData\Local\Temp\1000892001\dayroc.exeFilesize
6.3MB
MD5c67cb967230036816fd0cbbfd96959c6
SHA1d2fe988a302dce4bc0f34a1003a623f96a06b250
SHA256d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76
SHA5122f51046e44bdfa470f676071c69da8c05d50d8f79e748748f25ac13ec53d346f1c3988148000fea3ece38623fd629d1b3dcc943006e80b7bee95da7f1f42920c
-
C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exeFilesize
64KB
MD5cbd14aaffefd1004c67e83267003b26f
SHA1812bfc7008561c92c129b54537a47698ce5e7f4e
SHA2566441b9d5b14ec35167376f142c5c50df331a548569ab7ac9b46622788ae5a53a
SHA51256449bcb494c9c2564fe79671bdaf6ab9dcafea2a6d95ca65897358610978feb2e3cf41b6314883ed5dc6c3a8dea772fe82a366ac45bc4999dde90f91acdffc5
-
C:\Users\Admin\AppData\Local\Temp\1000893001\RDX.exeFilesize
313KB
MD5f733785f9d088490b784d4dc5584ebfb
SHA16c073d4208fee7cc88a235a3759b586889b91adf
SHA256e7216d8b7084c0c36d90aefaf30bb7b6d10ae2ecae700889d459ed5ab1b26a59
SHA51243589b18333b0edcd6e300577f86de685058df5533bcbfdd3e30497aa76176008125fbd28deecaca5e6132c42cc5c0a583c34497f40dbe4ea577333eaebab899
-
C:\Users\Admin\AppData\Local\Temp\1000894001\leg221.exeFilesize
292KB
MD5d177caf6762f5eb7e63e33d19c854089
SHA1f25cf817e3272302c2b319cedf075cb69e8c1670
SHA2564296e28124f0def71c811d4b21284c5d4e1a068484db03aeae56f536c89976c0
SHA5129d0e67e35dac6ad8222e7c391f75dee4e28f69c29714905b36a63cf5c067d31840aaf30e79cfc7b56187dc9817a870652113655bec465c1995d2a49aa276de25
-
C:\Users\Admin\AppData\Local\Temp\1000895001\alex.exeFilesize
128KB
MD55d33b3a3188e3037481a5d991de15b62
SHA1095e8c1e8169328ba3106becdee8403bbf55a6b7
SHA256bfbb91c5998dd8c6429e9c364c713562c75f17988d37ad154443675e06311d74
SHA51286e1a5e63ad00631fd99729d8c32568d9f806a22e7bfe039ef184ac60135c703b6682d6dd0c61a36e32d3c8b8ca1bb8a8ff294bc5d923a63bf3a2639a31c7bf6
-
C:\Users\Admin\AppData\Local\Temp\1000895001\alex.exeFilesize
1.7MB
MD5a615f2eee64c5d7449a8792cc782b6d6
SHA1cf1dff4fbbf172c6870c30fc3784bdbd53d49a69
SHA2564e6015f1e7c8790a2907de407d2ea9e14ccc04e925c81607fb815bd73c372389
SHA5129b0a2e7c7c4310300cb7f1f14d8b9ec11c7e5d6013b0bdf5c33af9e8f3de92be74ac95d83c0b637e6919f61cdffd8f7a9bf7c5411c23fcdf56b2a753a2830f0c
-
C:\Users\Admin\AppData\Local\Temp\1000896001\crypted.exeFilesize
412KB
MD53c9da20ad78d24df53b661b7129959e0
SHA1e7956e819cc1d2abafb2228a10cf22b9391fb611
SHA2562fd37ed834b6cd3747f1017ee09b3f97170245f59f9f2ed37c15b62580623319
SHA5121a02da1652a2c00df33eceda0706adebb5a5f1c3c05e30a09857c94d2fbb93e570f768af5d6648d3a5d11eea3b5c4b1ceb9393fc05248f1eefd96e17f3bbe1b4
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exeFilesize
1024KB
MD57dc24db4754a827e1b64e900ea405fcb
SHA15786e256cf0337c61c0668fe433481f6deb083e3
SHA256e3b9a2dabf3300d41a18ce170cda2e802c7a118b77890affb26f76df6f29d04e
SHA512b269c183438ef4feac74ad702399593f6b6c714760ecc66329488057750f95640828b250ecce51d75288b213ef59c180758c3f2e1fe2ac5c2a5308159ee0b17f
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exeFilesize
960KB
MD5d92e95307cdaa3268d3b0d79d1d2f034
SHA1f1306d020c7e59de50048463008b349d9cd57af8
SHA2565bc95e3dcfa32a8bc85ee6e4d581835becb20b7634ad153239083ce41536d3c5
SHA5127060897d9bfbcd33e1caa7124aab3b160b40f0ed6c2c7fadb52fe8f73695b68ee396e51e90548e0e7efbcc2be373aee9bb2cabe05aba00bf287a5a15bc41d798
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exeFilesize
896KB
MD5f0c61ff8705d9be1f6e07c53008a446b
SHA1803dbbb5bda7a0467c15d3d3b498ed8869f5e747
SHA256d93b3206fa77c330a6d1a6ffc2094ec61ce48f80fd1f615dfd28e1de692b1098
SHA512a926ee7742a53cc1122bbdfd0a8b9fb83d96de33869b47e09a0e2fc6936f13ccfbff865a1dc52357fe34a1d6a8d898fd48f986abb5d4b6512a7703aeb08fafbf
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jhcityjk.jn2.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exeFilesize
896KB
MD54dd8ec561897837f109230a0b83d6926
SHA19319f8415672587d8a168e1761dfc88eac743ec4
SHA25623d6317f6d7a1db807ca6dc18b826f423e85abe545ad1b96c9cddf8af46016fd
SHA5128caa5db7927082951d319f3ac5b630e860ca7f6cdfdc255ec8ae04063569a4c37962a50de4e70165d07cad69bf554c3af05bbb18786ec0f08f2840aabc8577c1
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exeFilesize
1.6MB
MD5d87010ca00a881523ff77680a16684a0
SHA1c594fb655844565ed6d3b49d2aad3a7afc2ebf87
SHA25605b119725f3121200f57cd3073d4c2cdbbcd6c4f08a2e404629cd726d328a3bf
SHA512864e3372859f1fc5fcc2fd07f0506fce5e9d2207dd02caedf9b20eda4032a5fa23a170bf153f2593f866b2756f13888721fadba778d40e4fa5a795f5668e80e7
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exeFilesize
512KB
MD57061ade7e1bc06de7646c66955b01497
SHA19312f39b3d2f6458059c244f09d3bd593a80c009
SHA256157acc240b64cea926c778d2e69a2a365eec2a5393286e546059e77be849bb2f
SHA5125f2a598f3ddab9d2b5bfe75b690123e78d2f786490916c6d047355e92e85381ee727afee7ff19552d3ab055a93c38b8819b732e341b52f1b78519326fe3e4034
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\explorhe.exeFilesize
792KB
MD5b38fe213704c50c252032bdee6ee365d
SHA157066b081670b153ff20ed89d6c8c7394a8fa2cf
SHA256a3791f9a33de62edfcfbb4bad919ed4dfdf81b914ce7af5120233bd20228765b
SHA5120a5693ffce16e2b0d89da12a78c87206bdeb8ce8f93ea60bd24c9b2f73acf9284ce1e4c002564305e0d79b50613539e3b2d711c8bba21653186010a094d97f05
-
C:\Users\Admin\AppData\Local\Temp\d887ceb89d\qemu-ga.exeFilesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
C:\Users\Admin\AppData\Local\Temp\nsf359E.tmp\INetC.dllFilesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exeFilesize
171KB
MD54d1a4b3096f4a39f3a91df2f6efd43c6
SHA1af7b52300363fa6f5ce8b5f99f753a9b1e0af94f
SHA256ca5b5e71addd8a56460eefad5cd368a5f6aca71b7a2d6dcfb312f45d1ae6e20b
SHA512d7cc6cf36fa0da5c22b531f7b3f58cbbcc206aaa47d40ebc0256fa5ede758fa7f636f9b70fa8077664067c8cbd3b38633ef2ca1e2e8e349b3b05c3cec1f8afd7
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
102KB
MD585af6c99d918757171d2d280e5ac61ef
SHA1ba1426d0ecf89825f690adad0a9f3c8c528ed48e
SHA256150fb1285c252e2b79dea84efb28722cc22d370328ceb46fb9553de1479e001e
SHA51212c061d8ff87cdd3b1f26b84748396e4f56fc1429152e418988e042bc5362df96a2f2c17bcf826d17a8bae9045ee3ba0c063fb565d75c604e47009ff442e8c8e
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dllMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dllFilesize
64KB
MD5eb5620021a95f1fee65a066660e2fbc8
SHA1f7f1641c136ef04e875e78c78af2d7cf9ee51480
SHA256896ee91ebffadde7f8304088c0590af19946f51fb927a0414ad3c2b645364298
SHA5124975c79b7ca3b2b1791929152996b8d9a54a265b9f9828ab2d3a80b5ac30d0647fa571c87833be92e32be5dc10212b08384c70667024834b6c4e810d6013c1cd
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dllFilesize
960KB
MD5a6baa1c9883e905ef4199ffcbf123cd5
SHA1468f6d2991d7f61212b927c502432cfa546c4efe
SHA256a9b8b2919bceb31cfc1a0f6d190b7e07dcc10e14e42d19ff370e74387966c825
SHA51222a8eb2419f243af7fb373d81b6eaaebc93a69411c8a261295b1462af725166ce8b63fa2d02b7fd71f29f78dc0b154a6334ed6ad92f4f503fb2823c2215a520f
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dllFilesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exeFilesize
325KB
MD53058f10b2fe431d9f8a487a35cd89ba3
SHA1adf31cfada940e96a02305177bea754d4ee41861
SHA25673e5d1b5c0d2134f08a76a09b913efa9076bd492e509cd0346794db436c54d30
SHA5124f59602a4f557a9947d15a1ed13d8e1b09d0ba3660130fa7e029219b21062a3dba55f7da6db0efa9f2f5ac5053dda51ed4e183ae171789374e239c4d7609eae5
-
C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exeFilesize
313KB
MD55ea776e43112b097b024104d6319b6dc
SHA1abd48a2ec2163a85fc71be96914b73f3abef994c
SHA256cf650d13eea100a691f7f8f64674189a9c13d7948e31468963e10a23726dc341
SHA51283667045b7da8596fad90320880d8d7c83f71a1f043d73f7b68a0ad948ae2e530a753d5c7943a096a307e696f8d9fa433025b30078af6d4530d1a2f2a4b12ed2
-
\??\c:\users\admin\appdata\local\temp\F59E91F8Filesize
14B
MD506af69ecf2379f83273f0cec20829609
SHA12853d9e9466d70275b53cc8262f6cd86860092b0
SHA2562eda32744e2bc6e201953fb324265185dc3e9376330fd82d164931e5c1511537
SHA5126c82f31bdb02049a04102c170f4ecd3e54472dcdaecbee7901e0dc4da8a47c08dae1d9d55e8dc3d38d2212b0c23c00cfdc130072963f3ac4f58308d6a0d501d6
-
memory/320-496-0x0000000004B90000-0x0000000004C28000-memory.dmpFilesize
608KB
-
memory/320-314-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/320-499-0x0000000005240000-0x00000000052D8000-memory.dmpFilesize
608KB
-
memory/320-554-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/320-302-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/320-584-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/320-311-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-339-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-195-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-18-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-376-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-315-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-556-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-246-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-20-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/528-172-0x0000000000BF0000-0x0000000000FF8000-memory.dmpFilesize
4.0MB
-
memory/780-105-0x0000000004CF0000-0x0000000004CFA000-memory.dmpFilesize
40KB
-
memory/780-104-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/780-130-0x0000000004FA0000-0x0000000004FEC000-memory.dmpFilesize
304KB
-
memory/780-97-0x00000000001E0000-0x0000000000232000-memory.dmpFilesize
328KB
-
memory/780-129-0x0000000004F60000-0x0000000004F9C000-memory.dmpFilesize
240KB
-
memory/780-101-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/780-252-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/780-102-0x0000000005160000-0x0000000005704000-memory.dmpFilesize
5.6MB
-
memory/780-103-0x0000000004C50000-0x0000000004CE2000-memory.dmpFilesize
584KB
-
memory/780-128-0x0000000004DD0000-0x0000000004DE2000-memory.dmpFilesize
72KB
-
memory/780-248-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/780-123-0x0000000005D30000-0x0000000006348000-memory.dmpFilesize
6.1MB
-
memory/780-127-0x0000000005030000-0x000000000513A000-memory.dmpFilesize
1.0MB
-
memory/872-270-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/872-260-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/872-273-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/872-258-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/920-470-0x00007FF6FB400000-0x00007FF6FBE3D000-memory.dmpFilesize
10.2MB
-
memory/920-402-0x00007FF6FB400000-0x00007FF6FBE3D000-memory.dmpFilesize
10.2MB
-
memory/932-139-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/932-126-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-135-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/932-133-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/932-132-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/932-375-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-131-0x0000000077094000-0x0000000077096000-memory.dmpFilesize
8KB
-
memory/932-257-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-329-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-456-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-136-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-226-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-294-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-138-0x0000000004BB0000-0x0000000004BB1000-memory.dmpFilesize
4KB
-
memory/932-143-0x0000000004C20000-0x0000000004C22000-memory.dmpFilesize
8KB
-
memory/932-134-0x0000000004BE0000-0x0000000004BE1000-memory.dmpFilesize
4KB
-
memory/932-142-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/932-137-0x0000000004B50000-0x0000000004B51000-memory.dmpFilesize
4KB
-
memory/932-303-0x0000000000610000-0x0000000000BAD000-memory.dmpFilesize
5.6MB
-
memory/932-141-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/932-140-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/1288-0-0x0000000000FB0000-0x00000000013B8000-memory.dmpFilesize
4.0MB
-
memory/1288-19-0x0000000000FB0000-0x00000000013B8000-memory.dmpFilesize
4.0MB
-
memory/1288-2-0x0000000000FB0000-0x00000000013B8000-memory.dmpFilesize
4.0MB
-
memory/1288-1-0x0000000000FB0000-0x00000000013B8000-memory.dmpFilesize
4.0MB
-
memory/1780-567-0x00007FF694DE0000-0x00007FF69581D000-memory.dmpFilesize
10.2MB
-
memory/1944-583-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/1944-432-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/2424-557-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2424-545-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2424-555-0x0000000140000000-0x0000000140840000-memory.dmpFilesize
8.2MB
-
memory/2480-457-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-406-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-394-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-429-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-397-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-403-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-428-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-427-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-458-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-426-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-425-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-404-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-401-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2480-420-0x0000000000DF0000-0x0000000000E10000-memory.dmpFilesize
128KB
-
memory/2480-408-0x0000000140000000-0x0000000140848000-memory.dmpFilesize
8.3MB
-
memory/2896-194-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/2896-310-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/2896-317-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2896-196-0x0000000004C00000-0x0000000004C10000-memory.dmpFilesize
64KB
-
memory/2896-193-0x0000000000040000-0x0000000000094000-memory.dmpFilesize
336KB
-
memory/2940-548-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/2940-529-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/2940-531-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/2940-532-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/2940-533-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/2940-530-0x0000000140000000-0x000000014000D000-memory.dmpFilesize
52KB
-
memory/2972-39-0x0000000000050000-0x0000000000530000-memory.dmpFilesize
4.9MB
-
memory/2972-407-0x0000000000050000-0x0000000000530000-memory.dmpFilesize
4.9MB
-
memory/2972-351-0x0000000000050000-0x0000000000530000-memory.dmpFilesize
4.9MB
-
memory/2972-558-0x0000000000050000-0x0000000000530000-memory.dmpFilesize
4.9MB
-
memory/2972-192-0x0000000000050000-0x0000000000530000-memory.dmpFilesize
4.9MB
-
memory/2972-316-0x0000000000050000-0x0000000000530000-memory.dmpFilesize
4.9MB
-
memory/2972-293-0x0000000000050000-0x0000000000530000-memory.dmpFilesize
4.9MB
-
memory/3352-171-0x0000000003370000-0x00000000033CE000-memory.dmpFilesize
376KB
-
memory/3352-295-0x0000000002B40000-0x0000000002B41000-memory.dmpFilesize
4KB
-
memory/3852-277-0x0000000002780000-0x0000000004780000-memory.dmpFilesize
32.0MB
-
memory/3852-250-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/3852-352-0x0000000002780000-0x0000000004780000-memory.dmpFilesize
32.0MB
-
memory/3852-276-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/3852-256-0x00000000023C0000-0x00000000023D0000-memory.dmpFilesize
64KB
-
memory/3852-254-0x00000000023C0000-0x00000000023D0000-memory.dmpFilesize
64KB
-
memory/3852-251-0x00000000023C0000-0x00000000023D0000-memory.dmpFilesize
64KB
-
memory/3852-247-0x00000000023D0000-0x000000000244E000-memory.dmpFilesize
504KB
-
memory/3852-249-0x0000000005210000-0x000000000528E000-memory.dmpFilesize
504KB
-
memory/4100-434-0x0000000002D40000-0x0000000004D40000-memory.dmpFilesize
32.0MB
-
memory/4100-421-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/4100-497-0x00000000728B0000-0x0000000073060000-memory.dmpFilesize
7.7MB
-
memory/4100-424-0x0000000005370000-0x0000000005380000-memory.dmpFilesize
64KB
-
memory/4100-418-0x00000000009E0000-0x0000000000A48000-memory.dmpFilesize
416KB
-
memory/4456-304-0x0000000002120000-0x00000000021A9000-memory.dmpFilesize
548KB
-
memory/4456-419-0x0000000000630000-0x0000000000631000-memory.dmpFilesize
4KB