Analysis
-
max time kernel
131s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe
Resource
win10-20240221-en
General
-
Target
32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe
-
Size
233KB
-
MD5
7e0d3e9df670735fddff76b348522603
-
SHA1
7df4c1d1d194c786ab1b43e27dcbbbfdb28ff98b
-
SHA256
32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d
-
SHA512
f9a3b7728428cf433d7c4fe046645a08485e22e1be396f1a8e2e552f777cbaa86a746fa5786bbc39509b5f49169bbdb39388b19599cea07ae2a11bc8a246c588
-
SSDEEP
3072:kY6AS4mA03XTyhHl6DcmJqcfFhW4i6NipK6s3lSyz5hhCZSk:k513DyFl6DcqWH6NipIhJ
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://kamsmad.com/tmp/index.php
http://souzhensil.ru/tmp/index.php
http://teplokub.com.ua/tmp/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
smokeloader
pub1
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
DcRat 6 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exe288c47bbc1871b439df19ff4df68f076.exe32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exeB8C4.exeschtasks.exepid process 1760 schtasks.exe 2724 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" B8C4.exe 1220 schtasks.exe -
Pitou 5 IoCs
Pitou.
Processes:
resource yara_rule behavioral1/memory/2984-41-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral1/memory/2984-55-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral1/memory/2984-121-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral1/memory/844-140-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral1/memory/844-146-0x0000000000400000-0x0000000001A77000-memory.dmp pitou -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
BF2B.exe979.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BF2B.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 979.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Modifies boot configuration data using bcdedit 14 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 772 bcdedit.exe 2560 bcdedit.exe 1344 bcdedit.exe 2840 bcdedit.exe 2640 bcdedit.exe 2808 bcdedit.exe 1712 bcdedit.exe 2672 bcdedit.exe 2548 bcdedit.exe 576 bcdedit.exe 1920 bcdedit.exe 1796 bcdedit.exe 1592 bcdedit.exe 2956 bcdedit.exe -
Blocklisted process makes network request 4 IoCs
Processes:
InstallSetup_four.exerundll32.exeflow pid process 21 2260 InstallSetup_four.exe 22 2260 InstallSetup_four.exe 23 2260 InstallSetup_four.exe 41 1744 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
csrss.exedescription ioc process File created C:\Windows\system32\drivers\Winmon.sys csrss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2012 netsh.exe -
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
979.exeexplorgu.exeBF2B.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 979.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 979.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BF2B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BF2B.exe -
Deletes itself 1 IoCs
Processes:
pid process 1212 -
Executes dropped EXE 23 IoCs
Processes:
B8C4.exeBF2B.exeC2F3.exeB8C4.exeE360.exeF4CF.exe979.exe16D2.exeexplorgu.exe35B8.exeInstallSetup_four.exe3F3B.exe288c47bbc1871b439df19ff4df68f076.exe3F3B.tmpu1qs.0.exe288c47bbc1871b439df19ff4df68f076.exeu1qs.1.execsrss.exepatch.exeinjector.exedsefix.exewindefender.exewindefender.exepid process 2548 B8C4.exe 2800 BF2B.exe 2984 C2F3.exe 2504 B8C4.exe 1396 E360.exe 844 F4CF.exe 2500 979.exe 1416 16D2.exe 1988 explorgu.exe 2544 35B8.exe 2260 InstallSetup_four.exe 2596 3F3B.exe 2664 288c47bbc1871b439df19ff4df68f076.exe 2828 3F3B.tmp 1268 u1qs.0.exe 2880 288c47bbc1871b439df19ff4df68f076.exe 952 u1qs.1.exe 2736 csrss.exe 2988 patch.exe 1644 injector.exe 2428 dsefix.exe 1600 windefender.exe 2940 windefender.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
BF2B.exe979.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Wine BF2B.exe Key opened \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Wine 979.exe Key opened \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Wine explorgu.exe -
Loads dropped DLL 50 IoCs
Processes:
B8C4.exeWerFault.exeregsvr32.exe979.exe35B8.exe3F3B.exe3F3B.tmpInstallSetup_four.exerundll32.exerundll32.exe288c47bbc1871b439df19ff4df68f076.exepatch.execsrss.exeu1qs.0.exerundll32.exepid process 2548 B8C4.exe 2052 WerFault.exe 2052 WerFault.exe 2132 regsvr32.exe 2052 WerFault.exe 2500 979.exe 2500 979.exe 2544 35B8.exe 2544 35B8.exe 2544 35B8.exe 2596 3F3B.exe 2828 3F3B.tmp 2828 3F3B.tmp 2828 3F3B.tmp 2828 3F3B.tmp 2260 InstallSetup_four.exe 2260 InstallSetup_four.exe 2260 InstallSetup_four.exe 2260 InstallSetup_four.exe 2260 InstallSetup_four.exe 2260 InstallSetup_four.exe 2260 InstallSetup_four.exe 2260 InstallSetup_four.exe 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 2880 288c47bbc1871b439df19ff4df68f076.exe 2880 288c47bbc1871b439df19ff4df68f076.exe 852 2988 patch.exe 2988 patch.exe 2736 csrss.exe 2988 patch.exe 2988 patch.exe 2988 patch.exe 1268 u1qs.0.exe 1268 u1qs.0.exe 1744 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe 2988 patch.exe 2988 patch.exe 2988 patch.exe 2736 csrss.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2504-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-62-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-65-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-66-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-126-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-161-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2504-170-0x0000000000400000-0x0000000000848000-memory.dmp upx \Users\Admin\AppData\Local\Temp\u1qs.1.exe upx \Users\Admin\AppData\Local\Temp\u1qs.1.exe upx C:\Users\Admin\AppData\Local\Temp\u1qs.1.exe upx \Users\Admin\AppData\Local\Temp\u1qs.1.exe upx -
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
B8C4.exe288c47bbc1871b439df19ff4df68f076.execsrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" B8C4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
C2F3.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 C2F3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
BF2B.exe979.exeexplorgu.exepid process 2800 BF2B.exe 2500 979.exe 1988 explorgu.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
B8C4.exedescription pid process target process PID 2548 set thread context of 2504 2548 B8C4.exe B8C4.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
288c47bbc1871b439df19ff4df68f076.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 6 IoCs
Processes:
BF2B.exe288c47bbc1871b439df19ff4df68f076.exemakecab.execsrss.exedescription ioc process File created C:\Windows\Tasks\explorgu.job BF2B.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\Logs\CBS\CbsPersist_20240304045315.cab makecab.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1372 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2052 1396 WerFault.exe E360.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe16D2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16D2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16D2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 16D2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u1qs.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1qs.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1qs.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2724 schtasks.exe 1220 schtasks.exe 1760 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1408 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exenetsh.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-522 = "N. Central Asia Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-22 = "Cape Verde Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe -
Processes:
patch.execsrss.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec5290f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae474040000000100000010000000acb694a59c17e0d791529bb19706a6e420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exepid process 2100 32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe 2100 32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 1212 -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe16D2.exepid process 2100 32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe 1416 16D2.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
288c47bbc1871b439df19ff4df68f076.exepowershell.execsrss.exesc.exedescription pid process Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 Token: SeShutdownPrivilege 1212 Token: SeDebugPrivilege 2664 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 2664 288c47bbc1871b439df19ff4df68f076.exe Token: SeDebugPrivilege 1220 powershell.exe Token: SeSystemEnvironmentPrivilege 2736 csrss.exe Token: SeShutdownPrivilege 1212 Token: SeSecurityPrivilege 1372 sc.exe Token: SeSecurityPrivilege 1372 sc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
BF2B.exe3F3B.tmppid process 1212 1212 2800 BF2B.exe 2828 3F3B.tmp -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1212 1212 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
u1qs.1.exepid process 952 u1qs.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
B8C4.exeregsvr32.exeE360.exe979.exe35B8.exedescription pid process target process PID 1212 wrote to memory of 2548 1212 B8C4.exe PID 1212 wrote to memory of 2548 1212 B8C4.exe PID 1212 wrote to memory of 2548 1212 B8C4.exe PID 1212 wrote to memory of 2548 1212 B8C4.exe PID 1212 wrote to memory of 2800 1212 BF2B.exe PID 1212 wrote to memory of 2800 1212 BF2B.exe PID 1212 wrote to memory of 2800 1212 BF2B.exe PID 1212 wrote to memory of 2800 1212 BF2B.exe PID 1212 wrote to memory of 2984 1212 C2F3.exe PID 1212 wrote to memory of 2984 1212 C2F3.exe PID 1212 wrote to memory of 2984 1212 C2F3.exe PID 1212 wrote to memory of 2984 1212 C2F3.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 2548 wrote to memory of 2504 2548 B8C4.exe B8C4.exe PID 1212 wrote to memory of 1396 1212 E360.exe PID 1212 wrote to memory of 1396 1212 E360.exe PID 1212 wrote to memory of 1396 1212 E360.exe PID 1212 wrote to memory of 1396 1212 E360.exe PID 1212 wrote to memory of 1772 1212 regsvr32.exe PID 1212 wrote to memory of 1772 1212 regsvr32.exe PID 1212 wrote to memory of 1772 1212 regsvr32.exe PID 1212 wrote to memory of 1772 1212 regsvr32.exe PID 1212 wrote to memory of 1772 1212 regsvr32.exe PID 1772 wrote to memory of 2132 1772 regsvr32.exe regsvr32.exe PID 1772 wrote to memory of 2132 1772 regsvr32.exe regsvr32.exe PID 1772 wrote to memory of 2132 1772 regsvr32.exe regsvr32.exe PID 1772 wrote to memory of 2132 1772 regsvr32.exe regsvr32.exe PID 1772 wrote to memory of 2132 1772 regsvr32.exe regsvr32.exe PID 1772 wrote to memory of 2132 1772 regsvr32.exe regsvr32.exe PID 1772 wrote to memory of 2132 1772 regsvr32.exe regsvr32.exe PID 1396 wrote to memory of 2052 1396 E360.exe WerFault.exe PID 1396 wrote to memory of 2052 1396 E360.exe WerFault.exe PID 1396 wrote to memory of 2052 1396 E360.exe WerFault.exe PID 1396 wrote to memory of 2052 1396 E360.exe WerFault.exe PID 1212 wrote to memory of 844 1212 F4CF.exe PID 1212 wrote to memory of 844 1212 F4CF.exe PID 1212 wrote to memory of 844 1212 F4CF.exe PID 1212 wrote to memory of 844 1212 F4CF.exe PID 1212 wrote to memory of 2500 1212 979.exe PID 1212 wrote to memory of 2500 1212 979.exe PID 1212 wrote to memory of 2500 1212 979.exe PID 1212 wrote to memory of 2500 1212 979.exe PID 1212 wrote to memory of 1416 1212 16D2.exe PID 1212 wrote to memory of 1416 1212 16D2.exe PID 1212 wrote to memory of 1416 1212 16D2.exe PID 1212 wrote to memory of 1416 1212 16D2.exe PID 2500 wrote to memory of 1988 2500 979.exe explorgu.exe PID 2500 wrote to memory of 1988 2500 979.exe explorgu.exe PID 2500 wrote to memory of 1988 2500 979.exe explorgu.exe PID 2500 wrote to memory of 1988 2500 979.exe explorgu.exe PID 1212 wrote to memory of 2544 1212 35B8.exe PID 1212 wrote to memory of 2544 1212 35B8.exe PID 1212 wrote to memory of 2544 1212 35B8.exe PID 1212 wrote to memory of 2544 1212 35B8.exe PID 2544 wrote to memory of 2260 2544 35B8.exe InstallSetup_four.exe PID 2544 wrote to memory of 2260 2544 35B8.exe InstallSetup_four.exe PID 2544 wrote to memory of 2260 2544 35B8.exe InstallSetup_four.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe"C:\Users\Admin\AppData\Local\Temp\32d3638794ae9330bc15c097eca82eed247c406c0167f07d3a2eda25781c467d.exe"1⤵
- DcRat
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\B8C4.exeC:\Users\Admin\AppData\Local\Temp\B8C4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\B8C4.exeC:\Users\Admin\AppData\Local\Temp\B8C4.exe2⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\BF2B.exeC:\Users\Admin\AppData\Local\Temp\BF2B.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\C2F3.exeC:\Users\Admin\AppData\Local\Temp\C2F3.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\E360.exeC:\Users\Admin\AppData\Local\Temp\E360.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 1242⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\EE2A.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\EE2A.dll2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\F4CF.exeC:\Users\Admin\AppData\Local\Temp\F4CF.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\979.exeC:\Users\Admin\AppData\Local\Temp\979.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\787592910372_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\16D2.exeC:\Users\Admin\AppData\Local\Temp\16D2.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\35B8.exeC:\Users\Admin\AppData\Local\Temp\35B8.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\u1qs.0.exe"C:\Users\Admin\AppData\Local\Temp\u1qs.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\u1qs.0.exe" & del "C:\ProgramData\*.dll"" & exit4⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\u1qs.1.exe"C:\Users\Admin\AppData\Local\Temp\u1qs.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- DcRat
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Manipulates WinMon driver.
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 06⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 16⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast6⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 06⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}6⤵
- Modifies boot configuration data using bcdedit
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v5⤵
- Modifies boot configuration data using bcdedit
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe5⤵
- Executes dropped EXE
-
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3F3B.exeC:\Users\Admin\AppData\Local\Temp\3F3B.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-FRKFL.tmp\3F3B.tmp"C:\Users\Admin\AppData\Local\Temp\is-FRKFL.tmp\3F3B.tmp" /SL5="$A0152,1746226,56832,C:\Users\Admin\AppData\Local\Temp\3F3B.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240304045315.log C:\Windows\Logs\CBS\CbsPersist_20240304045315.cab1⤵
- Drops file in Windows directory
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
2Disable or Modify System Firewall
1Modify Registry
4Virtualization/Sandbox Evasion
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\Local\Temp\16D2.exeFilesize
232KB
MD5224f63c213ef6ae7688e56bde6083df6
SHA166bf0a02196acc02251fc78402c9ad7c93d2f2d2
SHA2566e17bff8b977c77f948c069260b7163713257d0dc77ed11ad4a9228297dcb73e
SHA5127d93acbca3d778c3bdbf0976e44224e930d2166a52ab703235b382f4781d9d9fbe924b5a82e028b497fb41de049daa9a9d53d92f52c7c28ba33782d606892afd
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exeFilesize
2.1MB
MD54cc5b5b832d01a1eda63eb278acdc55d
SHA1188c3bc194eec65a7a1f733a32bd2272c1102381
SHA2564e5c1a10ec25596a6f5fce5db2bab9c2a9064be14b4eef280428acfc9fd81234
SHA512ad19dfa3c37f8a36eea7538e441eaeadb117289433ced20f68dd40261a45958536c82392dc985ad09271525501fa85fa6e0032d3b4e9f40a6a228a6d51d07f6c
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exeFilesize
469KB
MD51fa871de3a6e1a1249221794932c65de
SHA1df91bf853ab48a25e7360dde441bcaddf6247875
SHA256d2164b2a9f7c261fc529e0e217dc93bf5171cfabba2871bae5ce212e7829dd4c
SHA512b1ce33e0cba412a1384b6aa322a3090eee1fc927c32fc259cc2b5221870c6906e0bbff845bae3b5ca5f3c1d7b36a5a7986d0b08adfa57078bf7c2d2d3aa6e155
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exeFilesize
4.1MB
MD50c7b8daa9b09bcdf947a020bf28c2f19
SHA1738f89f4da5256d14fe11394cf79e42060a7e98b
SHA256ff0c709f06a8850794f2501c7dc9ce4ffc75f1ab3039218952cd87a067d3d3ff
SHA512b069ef6d30a5afafc4b4e2632cb4f9da65e58dcedb66706921d85a6be97a024c1e786ec51299ba52668a65fe948d499609aa2b4978fb20738dd0b643d84cbcf6
-
C:\Users\Admin\AppData\Local\Temp\35B8.exeFilesize
4.5MB
MD52c7078b90caee9d791dd338c2441ca32
SHA156901d99127fd701353ab7c68e66c94c49eb507c
SHA2568ad20c4b4c312feb468a58d1748c0d7abba3dd2d0fb8e6bfbee837c47a0e8c5a
SHA512000d81908bc2df1f09fcbf0ac50c72079064923f23fbea2ee0868590eaf693dff4246bb0090083aaec6f031b11353147393b710f72cd1e3630c2ecd071401ef6
-
C:\Users\Admin\AppData\Local\Temp\35B8.exeFilesize
2.6MB
MD52f112ef14befd3e9cddd8bfa3b0cfea7
SHA1a36865a04ddc8a948e109b5a976bf0636baad175
SHA2563723faeaa83f10d93b8595d3b1d4367fa598838308cf7433836f4f52d7c2a88a
SHA512cb36997d2f08fafb5a64c401e7892d76e690a79b3e62f46917be296756793f9a01ca3a32154b1faba43c63b24b8c320330118147492e2ee42b6e5d96bec0ec4f
-
C:\Users\Admin\AppData\Local\Temp\3F3B.exeFilesize
576KB
MD5951fa855869f67eccb16390e804228f5
SHA13c37a7518d934f21ee4ce399433fd94b61783421
SHA25651b6bcd20661dcb8438eb64f948771d013354716cadf5b0dbe88300d8edf33d4
SHA5120cea11f07b9b3d273d6ed739125b4cfd006ac197fd258b23557c5e72776109187aa27ab1d6f91a5b51bc666e53ea4712384b4e70e8908e61347a2a184f8fb303
-
C:\Users\Admin\AppData\Local\Temp\3F3B.exeFilesize
448KB
MD56aa6330d8c772b85882a72a0057879fd
SHA1d297fe019b118c032f82f4ad88ce1b39b0e69296
SHA256718687a060ad621e6c3bcd8f758524bdb33a1825b2d5507bd07668bcb11e622a
SHA5125ccc50b91e2ba14acf256383fd7cc0e6f38964f8adf884f7769a5735712872401469444a347c1c1c69c24509e2f3bc948e11c909f4ce10c9f51bb323445bc9d1
-
C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmpFilesize
2.6MB
MD5e6da188602c964ce4d406a3a93a4c2d9
SHA1bbd7fcdc38f3a29c372bbcf41e2a590ff9eac3d1
SHA256330a7b523ad57ad797fc522f02cd1de4df499830c8eb1ec792fe5d72c3fbb6ec
SHA5124c5436ce1bedc1037dfb87b26c93771e883db2280f5437c37d683dc0a3e1373191a1043695df73bcd1c149c91d2842e0936a5715549cce0b4aed887dbf687376
-
C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdescs.newFilesize
6.5MB
MD581c0d12c7fe2a74a957b790f3423994f
SHA1d4e9978af39349234bac349ff886676cf778307d
SHA2568abd194501f46f06d9f80e4a410898fc2acc2d475c43756769e5ebc03f615fb9
SHA5127ad8bf3a659aa02a277d7f48628e5008ec56e7a8da02299f65d7816de2440f05d216d619cc870733a591657db2844ef43d1f62f61f8ed4a62dafbea027252a60
-
C:\Users\Admin\AppData\Local\Temp\B8C4.exeFilesize
1.8MB
MD524001c12fe58e9b0d169eb051103a0cb
SHA164b2d574a0986f9d3f1333cd830f22f1ffcfa3fc
SHA256f658abefc53e5fa3209378bcdaad75933c355a2f063cd0ed15c8bcdaea5da542
SHA51226b210d0da5808dd61af4a48e0ea79e96c5c08fba4205a510b9489a698c3d0d59610deacba23b8c89a9927093e510c89fe3fc5c9254451bba7c15a24871f3b6b
-
C:\Users\Admin\AppData\Local\Temp\B8C4.exeFilesize
448KB
MD5cc263c0ccee25515370523c385e3fd4d
SHA1133c7d904dbd9e2bb5236b3ebb6b00c8c5bc13c4
SHA2562ee50d453963760f2816edfe70b1ee1d1f59e1f4cad129224fb41564baa73c4e
SHA5129065d25cc605fe333596eb479cf86ea430dc8c1a160b4418a879fd7dbe7eb1078d5701df8d4c1f84632b6a514e2c6eb3d9a8dc1059a4bd98ee3cf7e850ea9f8b
-
C:\Users\Admin\AppData\Local\Temp\B8C4.exeFilesize
1.5MB
MD5a4954c77e78f3da8fc9639113e86f731
SHA1e0987555438f7d6f636f4b4b8e23618191ba207d
SHA25600d0fac981147eb331d360b2516504f9b31943509f1e10aa9e46059465c7bf31
SHA512fbaa806f83554274d9566498365a04f909b25cfb8d4afcd14e3d9c49844e2ecdd1f5bfe466ecdd09cb953ca1f206d954209098856a10be4d2ebc25e5e525737d
-
C:\Users\Admin\AppData\Local\Temp\BF2B.exeFilesize
1.8MB
MD5a14f89b98eaa6d94dd52a019eb0ba9c2
SHA17091e5fce581ef94ec690a575f4290c0c6b9dc10
SHA2563550241ffdaf4bf08b58ae6f930ddd9ff8dd6d945c682d7f2fdf4a6b80e2810e
SHA5123f29e0d81ae430f616b1715a4a31b800837989cbee251e7e69ed6e91d0f015e5273c4cb6c94950019d41c3826203272c5cb7a6c34e7653d1f267d02e43baac1c
-
C:\Users\Admin\AppData\Local\Temp\C2F3.exeFilesize
554KB
MD5a1b5ee1b9649ab629a7ac257e2392f8d
SHA1dc1b14b6d57589440fb3021c9e06a3e3191968dc
SHA2562bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65
SHA51250ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b
-
C:\Users\Admin\AppData\Local\Temp\Cab8097.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\E360.exeFilesize
6.4MB
MD595f692e61e2200a54bb125789929572d
SHA12fbd24be5f6985d225a8cb041005e52817874b4d
SHA2567f0e51fb2beb8442b673b5b73f154f66c3d36ac57d0ce22de482f8c1e7f18bad
SHA5121b1e762fa8c280bdf7ebadb49ee88eab659748ec9e5eb4818bccdd31e126ca1005aeaded39e3d8f04e692f01643c6c97be3921aed7b7eebdf51a23d10da89646
-
C:\Users\Admin\AppData\Local\Temp\EE2A.dllFilesize
2.8MB
MD5a28481707d777ce0dd61a5614f714556
SHA11d92a808a940a7e20ff6a980c1bd9a47d3876ae0
SHA256d72a2a2a13c3fa924d8a41d874392c954043eba3902a4cbba89d00e64bbb301f
SHA512569797914378bb007903976231b8afa2c6f5dd21d9a7d9125bdafb34f2b66e2b800cb11faddbeee32c7432eedcae1966f6f0354c292a490ad7b0746baa668935
-
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.errorFilesize
8.3MB
MD5fd2727132edd0b59fa33733daa11d9ef
SHA163e36198d90c4c2b9b09dd6786b82aba5f03d29a
SHA2563a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e
SHA5123e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e
-
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.errorFilesize
492KB
MD5fafbf2197151d5ce947872a4b0bcbe16
SHA1a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020
SHA256feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71
SHA512acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6
-
C:\Users\Admin\AppData\Local\Temp\Tar81A7.tmpFilesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exeFilesize
5.3MB
MD51afff8d5352aecef2ecd47ffa02d7f7d
SHA18b115b84efdb3a1b87f750d35822b2609e665bef
SHA256c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1
SHA512e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb
-
C:\Users\Admin\AppData\Local\Temp\osloader.exeFilesize
591KB
MD5e2f68dc7fbd6e0bf031ca3809a739346
SHA19c35494898e65c8a62887f28e04c0359ab6f63f5
SHA256b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4
SHA51226256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579
-
C:\Users\Admin\AppData\Local\Temp\u1qs.1.exeFilesize
126KB
MD595d766043b543a216e636d63d7c5a5d4
SHA14a0596a2ab9193cd51eee4e2597a796e7c6c83f9
SHA256211b83feda820e621b2e2cdd27c034c4b91b0c71956bbfdfe830f4dd414de1cf
SHA512fdf39c7d0f05c2ff30b73c920c8809ea1419cd308216a59b0ad322f32eb9b86e7dd27a8ba54ef3de37e3b4a7bf03e98ff9ff678f1e6245f2efc526c1a7d4ab06
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
192KB
MD5e6a56bd8c3f1766dec78975d9ce5c9b4
SHA1663b37167c3d3837fd64aaf8201280b33eecfff9
SHA256d438ae07cb1fbcd93755485438c58724175561eacc1d8d098647a5d2aa7500c5
SHA5122a986b83b87f56e13f71d16ce201b6a7ffd6cef732edca364c5f8509ea15ee0fa99084cccdafac5ccab795773a614c078b74c258acec5395216896982e322dc4
-
C:\Users\Admin\AppData\Roaming\Temp\Task.batFilesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\Tasks\explorgu.jobFilesize
270B
MD5ed106e86489abcf75384bf50abdefd05
SHA184764918d3b97d6f211643e0f4c20b9a8fd3adf5
SHA2560e40563d945b7f4e603111951d8bd90244b4a6014616f981944452f689a72795
SHA51214bb93ef24c4e1766b5ab3a5af0a9acb62bfca065082d72e96bd842ea20d2570f55767b8e08fbd9fffe325dee7fdb05dbb1544cc6011716ec2fdd74cefe09d6c
-
C:\Windows\rss\csrss.exeFilesize
768KB
MD544ff2ed7f28622afe0e5ba7c1cd702a7
SHA15aec4a3f1f3a57a7cd8a366c736e2e932f529ed8
SHA2567d16cc26a07cc79b96c5ee6512102dae8ae526c4ae529380c412b0d45bc8351a
SHA512c0b766f1f8a4977fdc47adbcd10dbfabc0996a9421cab4d98ded773ddcefbb101d3137beb9e2ff4ea2b5d66849875e754bcbe0486396ce6a43b15262ccf82266
-
\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeFilesize
1.1MB
MD530f0641a21c57fe5106955b41f70a442
SHA1d162177b2ef63af98b040139f54ac7a355b14ec5
SHA25652c5ca6b4ef974586e801ecc4649a503e424c31156af25cc162e1757816741d7
SHA5123558102a6e41d865eeaa840493845e73b40d00b85da950fe659b29cd37b341e926b3c87b28380f166e1ce3f20cab11878a43b795b3eae182f101acefd8075794
-
\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exeFilesize
1.7MB
MD5098543e3cb828890b7689069c7cee831
SHA1b77032489d793795806f0f04d1518575744e75f9
SHA256b482b06172ee090a9ebf2073864864cc635a8b1ce66685a6aefea810ba5926f4
SHA512d6c9f28f6f141245827c74769185c693670803ee011b3132a79f1e5a28c5d14c4a467593bc9ecdd43cd18fe7049f980fb8ba0495d01080d63f8a04ad54d95e1c
-
\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exeFilesize
1.9MB
MD5d935a508089b9cfa5dff650e0617106d
SHA19d921ddc1602abef9683651af16fd7ea8b41dcf2
SHA256faf86926b1a67f57829139fd3262a0c008ce51e770955e737fde5d930cd42f6c
SHA512f26dd07cd6c8b7566375f9c9dde3f70ff3a50e0fd8e35f07b60106a8a89c75cbd89dfcae66b0c96b76e4ed6ca1a0d947d9ac482194dabd05d248c73ce8f2356a
-
\Users\Admin\AppData\Local\Temp\B8C4.exeFilesize
512KB
MD54ca7d01b0f0c185d0889154297f16ecc
SHA18c178ec95dc151ff448db50c7fa2e6e2fc837409
SHA256e495dc02ea561a1de00a2b8fae5dada11b9e50bb609599b050e700c90613c115
SHA5122bea2e16d6cadab32addef2a240c3f50536f3039c3107372fe99b95550696fdab3a793762f61de5d5cfc608ff48ab98dcc38a85fb0756f7c70b198deba69d3f1
-
\Users\Admin\AppData\Local\Temp\E360.exeFilesize
5.2MB
MD51cee8da1a0c543e5ff2ee61049b52e97
SHA167acc169de518e2925655104db4971ba50b32d05
SHA256c556dfea3e67d41d51caf754a455c6c389cdfd60b053c4bf6257f9f6f09fb936
SHA512174ac00220b29437e11575516cca9439d36b0bf5a66fc21e631902cdfc538b4bbe5b8f249d26c67eed942ba7dda15dff9f31206c1028d3b39b141ba2751dc6b7
-
\Users\Admin\AppData\Local\Temp\E360.exeFilesize
4.0MB
MD53f7ed30440b117b56acacac128c53462
SHA14b6e9868798fb564790fbe8c4d3b10c8a41159e0
SHA25612672df0aac4b7343990cbf6bc7dec852749bff1bb09d97315ee0da0f2100904
SHA5120f8bdcd2d503936ce4170b6dedb5ec1cb0536e120467cd84e2f30f34621fc867d9448c7e63543ea21fa6041eb90b84b1fbbe273b9a6424794348c4e6bfe4ecbe
-
\Users\Admin\AppData\Local\Temp\E360.exeFilesize
2.0MB
MD57f37aa7fcad1dfa103a233ce7a1cf90e
SHA1837db6d2f451bf0d586de413950b86092ae64752
SHA256dd2e5802578f929cf5c6e2d7b539056dc6185502f2d0937a7b51696affa4264a
SHA512d867da7198e5b0b595eebe29aadfad09d8148cf20388f629723cdcf6f4a6bc725c23df40c09be9dad1ef11f0f07ce23ae6e654b6c0fb03def8fef6d6a39775cf
-
\Users\Admin\AppData\Local\Temp\InstallSetup_four.exeFilesize
380KB
MD50564a9bf638169a89ccb3820a6b9a58e
SHA157373f3b58f7cc2b9ea1808bdabb600d580a9ceb
SHA2569e4b0556f698c9bc9a07c07bf13d60908d31995e0bd73510d9dd690b20b11058
SHA51236b81c374529a9ba5fcbc6fcfebf145c27a7c30916814d63612c04372556d47994a8091cdc5f78dab460bb5296466ce0b284659c8b01883f7960ab08a1631ea6
-
\Users\Admin\AppData\Local\Temp\csrss\patch.exeFilesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
\Users\Admin\AppData\Local\Temp\is-FRKFL.tmp\3F3B.tmpFilesize
690KB
MD59201595be62396907b01df253d202d3a
SHA1b80fd00d87df9ddbda42b563e2eff93147b2c665
SHA256465be6f86ef67034a31090fafa5a4c19134e8246794b46a0cbb6e49fdf4a50ef
SHA51256c482da990d4e70a22cea125763994160ec85e8dc49c35256260eca493fbf6ac4d1e2f84abeca69a4ff70dcaec70fddd2fe3ea2d6bd5090d4bf83b90d221967
-
\Users\Admin\AppData\Local\Temp\is-LNP16.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Local\Temp\is-LNP16.tmp\_isetup\_isdecmp.dllFilesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
\Users\Admin\AppData\Local\Temp\is-LNP16.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\u1qs.0.exeFilesize
232KB
MD5c327f3f72a1b6a1b2dcad4cd9b3665d6
SHA15c7f9b924fe5696b3f924b8e866a0de4e4490bc4
SHA256ac1571fa4e863b4b1a78b44b1ff7e83c7ccd85844183fb18fe5d633d7ca05c4b
SHA512ac3b6a017699c204b0d010b1984d1f3887dc4472aa983dd48d782e3ded65841ea81fa2ea179b81e72173be9599170af32a4ff821cea6b66402708145220a1a49
-
\Users\Admin\AppData\Local\Temp\u1qs.1.exeFilesize
1.2MB
MD5331adfc2c205111b43ed22e16993063b
SHA136a00450cb58f309b3a0bf0bd7fde0a255297fc1
SHA256569f2f6aaea6fe3aad8f76f91ecd76bf39efa4b2fe1ca2c50cc03c508a2202ef
SHA5123c1b7309c479a136341485d9cd30821e3822ce85d1819447991bf931185ca7fba74f7d92c826f01b21f8e34517e1895bbdac19d172810f61614a199b77bdf147
-
\Users\Admin\AppData\Local\Temp\u1qs.1.exeFilesize
1.7MB
MD5342be75f39e41c52b985b38bc74840c9
SHA13d5ecb6f26de83421ee1aaef3f337edf8df91064
SHA256e1a91b504c9543243a1b754b9dd517a1d5b4764c080253218a9b54b847c548c7
SHA512e05ca180a871afadfc7139e879885ae28a6e5c09dd3a88e96ef0d0d159f06087cb94af1979c35160895082277a4d3dfae45d7be3f743f9a96559ddc24bd522b9
-
\Users\Admin\AppData\Local\Temp\u1qs.1.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
64KB
MD5a21ba51320e246460cd10fd9d940ca1f
SHA1253437834f3537debd72664218c2bb077f07b3a8
SHA25685f872e7dc95829e4fb98c1932b1f704124ab476278e2c665978859236209a98
SHA51202cc643f962517da3694e2e523eb7a552b18fcad9865cafa64ac6de6af55cf14cacc75d35caca5539a0405a4ca23cde662c56fa990e5b7adf096355a788025bb
-
\Windows\rss\csrss.exeFilesize
1.2MB
MD53c20f2e7db8b75326455d3522cfc906b
SHA1b5c5fb3952d1c7232ae8f7893cae99c83c81780a
SHA25600965991e367cf0a7d39b102ebdb18a7b7bc59adf9480a1fa3ea9b678c450db9
SHA512d8055775463096afaf4f7569e6a631c0de7c9c44ee0fcd8e4d84d62fc429655abd29eb1617da205359363cafcd1e609da6894ba34a653b413220b693fd1a4d1d
-
\Windows\rss\csrss.exeFilesize
1.4MB
MD56e0435f8b1644f72fda8e2853ed30a34
SHA1d22851e8fca1888ac5f7deefbea73f0cce270627
SHA2566efb9502a23f730ef4c9125a1833b941b02bce1942e3f1f563b03554520c0c14
SHA512d9a254d1ba65ee02cae0a5df6f2466b381b40821b1e78aad1b502c149da9628cded2774c3b745448c8ad08131f8868f09302889af97744ed8b540372d678cae0
-
memory/844-146-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/844-143-0x0000000001AF0000-0x0000000001BF0000-memory.dmpFilesize
1024KB
-
memory/844-141-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/844-140-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/1212-192-0x0000000003A50000-0x0000000003A66000-memory.dmpFilesize
88KB
-
memory/1212-4-0x00000000039F0000-0x0000000003A06000-memory.dmpFilesize
88KB
-
memory/1396-106-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/1396-124-0x0000000077C10000-0x0000000077C11000-memory.dmpFilesize
4KB
-
memory/1396-111-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/1396-113-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/1396-114-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/1396-117-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/1396-119-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/1396-120-0x00000000011E0000-0x0000000001CFF000-memory.dmpFilesize
11.1MB
-
memory/1396-88-0x00000000011E0000-0x0000000001CFF000-memory.dmpFilesize
11.1MB
-
memory/1396-87-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1396-125-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1396-108-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/1396-89-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/1396-83-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1396-85-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1396-91-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/1396-103-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/1396-101-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/1396-98-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/1396-96-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/1396-93-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/1416-181-0x0000000000400000-0x0000000001A26000-memory.dmpFilesize
22.1MB
-
memory/1416-184-0x00000000002D0000-0x00000000003D0000-memory.dmpFilesize
1024KB
-
memory/1416-174-0x00000000001B0000-0x00000000001BB000-memory.dmpFilesize
44KB
-
memory/1988-196-0x0000000002860000-0x0000000002861000-memory.dmpFilesize
4KB
-
memory/1988-198-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/1988-199-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB
-
memory/1988-193-0x0000000002640000-0x0000000002641000-memory.dmpFilesize
4KB
-
memory/1988-191-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/1988-190-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/1988-189-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/1988-188-0x00000000026D0000-0x00000000026D1000-memory.dmpFilesize
4KB
-
memory/1988-187-0x0000000002850000-0x0000000002851000-memory.dmpFilesize
4KB
-
memory/1988-186-0x00000000027F0000-0x00000000027F2000-memory.dmpFilesize
8KB
-
memory/1988-185-0x0000000000C60000-0x000000000111B000-memory.dmpFilesize
4.7MB
-
memory/1988-183-0x0000000000C60000-0x000000000111B000-memory.dmpFilesize
4.7MB
-
memory/2100-5-0x0000000000400000-0x0000000001A26000-memory.dmpFilesize
22.1MB
-
memory/2100-1-0x0000000001AA0000-0x0000000001BA0000-memory.dmpFilesize
1024KB
-
memory/2100-2-0x00000000002A0000-0x00000000002AB000-memory.dmpFilesize
44KB
-
memory/2100-3-0x0000000000400000-0x0000000001A26000-memory.dmpFilesize
22.1MB
-
memory/2132-139-0x0000000000130000-0x0000000000136000-memory.dmpFilesize
24KB
-
memory/2132-131-0x0000000010000000-0x00000000102C9000-memory.dmpFilesize
2.8MB
-
memory/2500-171-0x00000000004D0000-0x00000000004D1000-memory.dmpFilesize
4KB
-
memory/2500-173-0x0000000000470000-0x0000000000471000-memory.dmpFilesize
4KB
-
memory/2500-163-0x0000000000A90000-0x0000000000F4B000-memory.dmpFilesize
4.7MB
-
memory/2500-172-0x0000000000450000-0x0000000000451000-memory.dmpFilesize
4KB
-
memory/2500-169-0x0000000000460000-0x0000000000461000-memory.dmpFilesize
4KB
-
memory/2500-182-0x0000000002360000-0x0000000002361000-memory.dmpFilesize
4KB
-
memory/2500-168-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/2500-167-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/2500-166-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB
-
memory/2500-179-0x0000000000A90000-0x0000000000F4B000-memory.dmpFilesize
4.7MB
-
memory/2500-165-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/2500-164-0x0000000000600000-0x0000000000602000-memory.dmpFilesize
8KB
-
memory/2500-152-0x0000000000A90000-0x0000000000F4B000-memory.dmpFilesize
4.7MB
-
memory/2504-126-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-58-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-170-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-161-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-66-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-65-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-64-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-62-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-63-0x0000000000400000-0x0000000000848000-memory.dmpFilesize
4.3MB
-
memory/2504-52-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2548-46-0x0000000003980000-0x0000000003B38000-memory.dmpFilesize
1.7MB
-
memory/2548-49-0x0000000003B40000-0x0000000003CF7000-memory.dmpFilesize
1.7MB
-
memory/2548-59-0x0000000003980000-0x0000000003B38000-memory.dmpFilesize
1.7MB
-
memory/2800-70-0x00000000010C0000-0x00000000010C1000-memory.dmpFilesize
4KB
-
memory/2800-39-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/2800-56-0x0000000000AB0000-0x0000000000AB1000-memory.dmpFilesize
4KB
-
memory/2800-54-0x00000000006E0000-0x00000000006E1000-memory.dmpFilesize
4KB
-
memory/2800-53-0x0000000000620000-0x0000000000621000-memory.dmpFilesize
4KB
-
memory/2800-48-0x0000000000F70000-0x0000000000F71000-memory.dmpFilesize
4KB
-
memory/2800-77-0x0000000001160000-0x000000000161B000-memory.dmpFilesize
4.7MB
-
memory/2800-69-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB
-
memory/2800-23-0x0000000001160000-0x000000000161B000-memory.dmpFilesize
4.7MB
-
memory/2800-24-0x0000000077C00000-0x0000000077C02000-memory.dmpFilesize
8KB
-
memory/2800-43-0x0000000000AA0000-0x0000000000AA1000-memory.dmpFilesize
4KB
-
memory/2800-42-0x00000000006D0000-0x00000000006D1000-memory.dmpFilesize
4KB
-
memory/2800-40-0x0000000000E10000-0x0000000000E11000-memory.dmpFilesize
4KB
-
memory/2800-30-0x0000000001160000-0x000000000161B000-memory.dmpFilesize
4.7MB
-
memory/2800-38-0x0000000000BF0000-0x0000000000BF1000-memory.dmpFilesize
4KB
-
memory/2800-37-0x0000000000AC0000-0x0000000000AC1000-memory.dmpFilesize
4KB
-
memory/2800-36-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/2800-35-0x0000000000AD0000-0x0000000000AD1000-memory.dmpFilesize
4KB
-
memory/2800-34-0x0000000000D20000-0x0000000000D21000-memory.dmpFilesize
4KB
-
memory/2800-33-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/2984-55-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/2984-44-0x0000000001BD0000-0x0000000001CD0000-memory.dmpFilesize
1024KB
-
memory/2984-41-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/2984-45-0x0000000000220000-0x000000000028B000-memory.dmpFilesize
428KB
-
memory/2984-121-0x0000000000400000-0x0000000001A77000-memory.dmpFilesize
22.5MB
-
memory/2984-142-0x0000000001BD0000-0x0000000001CD0000-memory.dmpFilesize
1024KB