Analysis
-
max time kernel
64s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 19:35
General
-
Target
ñape.exe
-
Size
25.7MB
-
MD5
7051a08c6f42b5832e9b7b366d22aed9
-
SHA1
c4856f9119b010bc52ea994e35b3cb3d49fae4dd
-
SHA256
b0f8a28363609b60ed20888564b25854ebd2af5fd46331fd92f7c56dd670930f
-
SHA512
71cc3bb45756ed7a0f79e4b56d32b3fae375b60f5edd3b5120dc456738700c640429d6a16213d4bc20c869dffdc705585484efd924e3aca0c9ac8ee720295fd7
-
SSDEEP
393216:cFo9DM45Ct55L1V8dkurEUWj+rMDEGPKkIbuK+:l9NMXRndbmMD4k1K+
Malware Config
Signatures
-
Processes:
powershell.exepowershell.exepowershell.exepid process 1188 powershell.exe 2588 powershell.exe 4996 powershell.exe -
Drops startup file 1 IoCs
Processes:
ñape.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ñape.exe ñape.exe -
Executes dropped EXE 2 IoCs
Processes:
ñape.exeñape.exepid process 2848 ñape.exe 3200 ñape.exe -
Loads dropped DLL 64 IoCs
Processes:
ñape.exeñape.exepid process 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe 3200 ñape.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI44242\python312.dll upx behavioral1/memory/1132-99-0x00007FFE811A0000-0x00007FFE81865000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_ctypes.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\libffi-8.dll upx behavioral1/memory/1132-109-0x00007FFE945B0000-0x00007FFE945BF000-memory.dmp upx behavioral1/memory/1132-108-0x00007FFE945C0000-0x00007FFE945E5000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_bz2.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_lzma.pyd upx behavioral1/memory/1132-134-0x00007FFE91060000-0x00007FFE9108D000-memory.dmp upx behavioral1/memory/1132-133-0x00007FFE94590000-0x00007FFE945AA000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\libcrypto-3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\libssl-3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_wmi.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_queue.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_hashlib.pyd upx behavioral1/memory/1132-146-0x00007FFE90840000-0x00007FFE90854000-memory.dmp upx behavioral1/memory/1132-147-0x00007FFE80C70000-0x00007FFE81199000-memory.dmp upx behavioral1/memory/1132-145-0x00007FFE90910000-0x00007FFE9091D000-memory.dmp upx behavioral1/memory/1132-143-0x00007FFE90940000-0x00007FFE90959000-memory.dmp upx behavioral1/memory/1132-144-0x00007FFE90920000-0x00007FFE9092D000-memory.dmp upx behavioral1/memory/1132-142-0x00007FFE91050000-0x00007FFE9105D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\select.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_socket.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_ssl.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_sqlite3.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_overlapped.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_multiprocessing.pyd upx behavioral1/memory/1132-149-0x00007FFE8FFD0000-0x00007FFE90003000-memory.dmp upx behavioral1/memory/1132-151-0x00007FFE80770000-0x00007FFE8083D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_decimal.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_cffi_backend.cp312-win_amd64.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\_asyncio.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\unicodedata.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\sqlite3.dll upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\pyexpat.pyd upx behavioral1/memory/1132-155-0x00007FFE8F820000-0x00007FFE8F832000-memory.dmp upx behavioral1/memory/1132-154-0x00007FFE8F840000-0x00007FFE8F856000-memory.dmp upx behavioral1/memory/1132-160-0x00007FFE811A0000-0x00007FFE81865000-memory.dmp upx behavioral1/memory/1132-159-0x00007FFE81CD0000-0x00007FFE81CF4000-memory.dmp upx behavioral1/memory/1132-158-0x00007FFE81D60000-0x00007FFE81D95000-memory.dmp upx behavioral1/memory/1132-162-0x00007FFE808B0000-0x00007FFE80A2E000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\psutil\_psutil_windows.pyd upx behavioral1/memory/1132-165-0x00007FFE8A6A0000-0x00007FFE8A6B8000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\charset_normalizer\md__mypyc.cp312-win_amd64.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\charset_normalizer\md.cp312-win_amd64.pyd upx behavioral1/memory/1132-174-0x00007FFE7FE90000-0x00007FFE7FFAB000-memory.dmp upx behavioral1/memory/1132-173-0x00007FFE81CA0000-0x00007FFE81CC7000-memory.dmp upx behavioral1/memory/1132-172-0x00007FFE90960000-0x00007FFE9096B000-memory.dmp upx behavioral1/memory/1132-171-0x00007FFE80C70000-0x00007FFE81199000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_ecb.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_cbc.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_cfb.pyd upx C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_ofb.pyd upx behavioral1/memory/1132-184-0x00007FFE90840000-0x00007FFE90854000-memory.dmp upx behavioral1/memory/1132-191-0x00007FFE8F170000-0x00007FFE8F17B000-memory.dmp upx behavioral1/memory/1132-190-0x00007FFE8FFD0000-0x00007FFE90003000-memory.dmp upx behavioral1/memory/1132-189-0x00007FFE8F7C0000-0x00007FFE8F7CC000-memory.dmp upx behavioral1/memory/1132-188-0x00007FFE8F810000-0x00007FFE8F81B000-memory.dmp upx behavioral1/memory/1132-187-0x00007FFE8FEC0000-0x00007FFE8FECC000-memory.dmp upx behavioral1/memory/1132-192-0x00007FFE80770000-0x00007FFE8083D000-memory.dmp upx behavioral1/memory/1132-203-0x00007FFE80BB0000-0x00007FFE80BBC000-memory.dmp upx behavioral1/memory/1132-202-0x00007FFE80BC0000-0x00007FFE80BD2000-memory.dmp upx behavioral1/memory/1132-201-0x00007FFE80BE0000-0x00007FFE80BED000-memory.dmp upx behavioral1/memory/1132-200-0x00007FFE80BF0000-0x00007FFE80BFC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org 15 api.ipify.org -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings taskmgr.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ñape.exepowershell.exepowershell.exepowershell.exepowershell.exetaskmgr.exepid process 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 1132 ñape.exe 3984 powershell.exe 3984 powershell.exe 2588 powershell.exe 2588 powershell.exe 4996 powershell.exe 4996 powershell.exe 1188 powershell.exe 1188 powershell.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 3696 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
Processes:
ñape.exeWMIC.exepowershell.exepowershell.exepowershell.exepowershell.exetaskmgr.exeñape.exedescription pid process Token: SeDebugPrivilege 1132 ñape.exe Token: SeIncreaseQuotaPrivilege 1476 WMIC.exe Token: SeSecurityPrivilege 1476 WMIC.exe Token: SeTakeOwnershipPrivilege 1476 WMIC.exe Token: SeLoadDriverPrivilege 1476 WMIC.exe Token: SeSystemProfilePrivilege 1476 WMIC.exe Token: SeSystemtimePrivilege 1476 WMIC.exe Token: SeProfSingleProcessPrivilege 1476 WMIC.exe Token: SeIncBasePriorityPrivilege 1476 WMIC.exe Token: SeCreatePagefilePrivilege 1476 WMIC.exe Token: SeBackupPrivilege 1476 WMIC.exe Token: SeRestorePrivilege 1476 WMIC.exe Token: SeShutdownPrivilege 1476 WMIC.exe Token: SeDebugPrivilege 1476 WMIC.exe Token: SeSystemEnvironmentPrivilege 1476 WMIC.exe Token: SeRemoteShutdownPrivilege 1476 WMIC.exe Token: SeUndockPrivilege 1476 WMIC.exe Token: SeManageVolumePrivilege 1476 WMIC.exe Token: 33 1476 WMIC.exe Token: 34 1476 WMIC.exe Token: 35 1476 WMIC.exe Token: 36 1476 WMIC.exe Token: SeIncreaseQuotaPrivilege 1476 WMIC.exe Token: SeSecurityPrivilege 1476 WMIC.exe Token: SeTakeOwnershipPrivilege 1476 WMIC.exe Token: SeLoadDriverPrivilege 1476 WMIC.exe Token: SeSystemProfilePrivilege 1476 WMIC.exe Token: SeSystemtimePrivilege 1476 WMIC.exe Token: SeProfSingleProcessPrivilege 1476 WMIC.exe Token: SeIncBasePriorityPrivilege 1476 WMIC.exe Token: SeCreatePagefilePrivilege 1476 WMIC.exe Token: SeBackupPrivilege 1476 WMIC.exe Token: SeRestorePrivilege 1476 WMIC.exe Token: SeShutdownPrivilege 1476 WMIC.exe Token: SeDebugPrivilege 1476 WMIC.exe Token: SeSystemEnvironmentPrivilege 1476 WMIC.exe Token: SeRemoteShutdownPrivilege 1476 WMIC.exe Token: SeUndockPrivilege 1476 WMIC.exe Token: SeManageVolumePrivilege 1476 WMIC.exe Token: 33 1476 WMIC.exe Token: 34 1476 WMIC.exe Token: 35 1476 WMIC.exe Token: 36 1476 WMIC.exe Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 4996 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeDebugPrivilege 3696 taskmgr.exe Token: SeSystemProfilePrivilege 3696 taskmgr.exe Token: SeCreateGlobalPrivilege 3696 taskmgr.exe Token: SeDebugPrivilege 3200 ñape.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
Processes:
taskmgr.exepid process 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe -
Suspicious use of SendNotifyMessage 50 IoCs
Processes:
taskmgr.exepid process 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
ñape.exeñape.execmd.execmd.execmd.execmd.exeñape.exedescription pid process target process PID 4424 wrote to memory of 1132 4424 ñape.exe ñape.exe PID 4424 wrote to memory of 1132 4424 ñape.exe ñape.exe PID 1132 wrote to memory of 2688 1132 ñape.exe cmd.exe PID 1132 wrote to memory of 2688 1132 ñape.exe cmd.exe PID 2688 wrote to memory of 1476 2688 cmd.exe WMIC.exe PID 2688 wrote to memory of 1476 2688 cmd.exe WMIC.exe PID 1132 wrote to memory of 3284 1132 ñape.exe cmd.exe PID 1132 wrote to memory of 3284 1132 ñape.exe cmd.exe PID 3284 wrote to memory of 3768 3284 cmd.exe netsh.exe PID 3284 wrote to memory of 3768 3284 cmd.exe netsh.exe PID 1132 wrote to memory of 3404 1132 ñape.exe cmd.exe PID 1132 wrote to memory of 3404 1132 ñape.exe cmd.exe PID 3404 wrote to memory of 3984 3404 cmd.exe powershell.exe PID 3404 wrote to memory of 3984 3404 cmd.exe powershell.exe PID 3404 wrote to memory of 2588 3404 cmd.exe powershell.exe PID 3404 wrote to memory of 2588 3404 cmd.exe powershell.exe PID 3404 wrote to memory of 4996 3404 cmd.exe powershell.exe PID 3404 wrote to memory of 4996 3404 cmd.exe powershell.exe PID 3404 wrote to memory of 1188 3404 cmd.exe powershell.exe PID 3404 wrote to memory of 1188 3404 cmd.exe powershell.exe PID 1132 wrote to memory of 3532 1132 ñape.exe cmd.exe PID 1132 wrote to memory of 3532 1132 ñape.exe cmd.exe PID 3532 wrote to memory of 4432 3532 cmd.exe PING.EXE PID 3532 wrote to memory of 4432 3532 cmd.exe PING.EXE PID 2848 wrote to memory of 3200 2848 ñape.exe ñape.exe PID 2848 wrote to memory of 3200 2848 ñape.exe ñape.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ñape.exe"C:\Users\Admin\AppData\Local\Temp\ñape.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ñape.exe"C:\Users\Admin\AppData\Local\Temp\ñape.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\AppData" & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\Local" & powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\AppData"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\Local"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /F "C:\Users\Admin\AppData\Local\Temp\ñape.exe""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping localhost -n 34⤵
- Runs ping.exe
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ñape.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ñape.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ñape.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ñape.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_cbc.pydFilesize
10KB
MD5f2bf3f3cdce0e6a8a29bd7fad094736b
SHA17eb4af31b93ee38219eb31c2a867959bb7a3ec53
SHA256d8a9edff4c8cbbd02cc89541cd1a9f8b1ba8381f000a86f910b4d6831bb9a034
SHA512ea3dcdd0218f51bedafe9fb995d84a820d244673086f42276d7cb6c398c67f0e4f79ec343dd0a6fc0af03ae605aabbbd93c8c612cbfd7ddf641b9f8a8db13c83
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_cfb.pydFilesize
10KB
MD54d651469eff9f0a3f904fcac9b1a41d2
SHA1f9eb0d3ae58b8195e2485c6c378ce84f95c9ee54
SHA2561b835a8c05dcc24c77fcf21ae0091ce34aca3b6b3d153415e3f0cf0142c53f9b
SHA5120c10c6a52e2fa9bdf89229ad9964cfff6f3621eaad6f3aacebbbc8da6ff742e087c79af2d2d152c433160f25a9e45a2c41e13349cba758640163832569d37cfd
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_ecb.pydFilesize
9KB
MD5b47c542168546fb875e74e49c84325b6
SHA12aecab080cc0507f9380756478eadad2d3697503
SHA25655657830c9ab79875af923b5a92e7ee30e0560affc3baa236c38039b4ef987f2
SHA512fc25087c859c76dff1126bbfe956ea6811dc3ca79e9bbfd237893144db8b7ce3cae3aeb0923f69e0bfffa5575b5442ad1891d7088dd3857b62be12b5326be50d
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\Cryptodome\Cipher\_raw_ofb.pydFilesize
10KB
MD56315a891ea3f996fc4b5ec384841f10c
SHA1ed76ef57517e35b7b721a8b1a3e1ffa7873aec57
SHA256087c238e1aa9038f53f8c92e7255f7adc9cd9a60a895256962dc39a73d596382
SHA512083859a84ff84e865cfc255ff1674134940c5a64cc703c4ae7815501d586005b6b6cabc28e52239ae24cd38a1253d634d8de87d98a4a65f45df2b34bc24c2483
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\VCRUNTIME140.dllFilesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\VCRUNTIME140_1.dllFilesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_asyncio.pydFilesize
37KB
MD547d2494ad68c102fd17022963dd85a03
SHA1cebf8dbbd9df32c8f7807cef3bebf2d8d336ac78
SHA25691564632078b61f99ba037122e5def178a0b8807f2ef29e039290e60935ee7dc
SHA5121461d1c7b58239c23d294359c5200a0dda0ad3965e41c2e9bd6dc8e879469e7cadb752e4d0c6cce58d8a0dd4f105a33bc0baf4f03738aacf442dac2a02f2ce57
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_bz2.pydFilesize
48KB
MD5980eff7e635ad373ecc39885a03fbdc3
SHA19a3e9b13b6f32b207b065f5fcf140aecfd11b691
SHA256b4411706afc8b40a25e638a59fe1789fa87e1ce54109ba7b5bd84c09c86804e1
SHA512241f9d3e25e219c7b9d12784ab525ab5ded58ca623bc950027b271c8dfb7c19e13536f0caf937702f767413a6d775bed41b06902b778e4bad2946917e16ad4ef
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_cffi_backend.cp312-win_amd64.pydFilesize
71KB
MD526624b2ea2b9ec0e6ddec72f064c181a
SHA12658bae86a266def37cce09582874c2da5c8f6fa
SHA2569fcab2f71b7b58636a613043387128394e29fe6e0c7ed698abdc754ba35e6279
SHA512a5315700af222cdb343086fd4a4e8a4768050fdf36e1f8041770a131fc6f45fefe806291efc1cfb383f975e123d378a029d9884244a420523fc58b8178e8571f
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_ctypes.pydFilesize
59KB
MD5a8cb7698a8282defd6143536ed821ec9
SHA13d1b476b9c042d066de16308d99f1633393a497a
SHA25640d53a382a78b305064a4f4df50543d2227679313030c9edf5ee82af23bf8f4a
SHA5121445ae7dc7146afbe391e131baff456445d7e96a3618bfef36dc39af978dd305e3a294acd62ee91a050812c321a9ec298085c7ad4eb9b81e2e40e23c5a85f2cc
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_decimal.pydFilesize
105KB
MD5ccfad3c08b9887e6cea26ddca2b90b73
SHA10e0fb641b386d57f87e69457faf22da259556a0d
SHA256bad3948151d79b16776db9a4a054033a6f2865cb065f53a623434c6b5c9f4aad
SHA5123af88779db58dcae4474c313b7d55f181f0678c24c16240e3b03721b18b66bdfb4e18d73a3cef0c954d0b8e671cf667fc5e91b5f1027de489a7039b39542b8ca
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_hashlib.pydFilesize
35KB
MD589f3c173f4ca120d643aab73980ade66
SHA1e4038384b64985a978a6e53142324a7498285ec4
SHA25695b1f5eff9d29eb6e7c6ed817a12ca33b67c76acea3cb4f677ec1e6812b28b67
SHA51276e737552be1ce21b92fa291777eac2667f2cfc61ae5eb62d133c89b769a8d4ef8082384b5c819404b89a698fcc1491c62493cf8ff0dcc65e01f96b6f7b5e14f
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_lzma.pydFilesize
86KB
MD505adb189d4cfdcacb799178081d8ebcb
SHA1657382ad2c02b42499e399bfb7be4706343cecab
SHA25687b7bae6b4f22d7d161aefae54bc523d9c976ea2aef17ee9c3cf8fe958487618
SHA51213fc9204d6f16a6b815addf95c31ea5c543bf8608bfcc5d222c7075dd789551a202ae442fddc92ea5919ecf58ba91383a0f499182b330b98b240152e3aa868c5
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_multiprocessing.pydFilesize
27KB
MD51359d06d86e1694c74076b81d265782b
SHA19cb55b82f4c2a407357ea0e5e48020a22ad4bf03
SHA25681acc28672d3d46bdd7113efb2a13ceedbe0009fab5600117db4cad1648f69a9
SHA512173bb999e680062692c99eaa1743361d65c5cdf7f88380d512717bab9d716b0c8b339bc59fce220336242b75aa70b5521560cb4d1fa857176624d6a73d07e17d
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_overlapped.pydFilesize
33KB
MD56b2f62d1ab91d4d0abf0f10218cf1ca7
SHA1d9797eaff4bea253d66339614a9fbaea8400bc74
SHA256afbe7f4c19a7db42dc45f9f5591602c119fe5064de6607f33ba678f07626426d
SHA512653a976c885b08a598dee727a2672aabc514d4095879c1b564354acf938197d8d49645f7b9e241b21610a5abf3bbd9d3805c64a158bf7c26f4a13e6be806fd5a
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_queue.pydFilesize
26KB
MD5fc796fcde996f78225a4ec1bed603606
SHA15389f530aaf4bd0d4fce981f57f68a67fe921ee1
SHA256c7c598121b1d82eb710425c0dc1fc0598545a61ffb1dd41931bb9368fb350b93
SHA5124d40e5a4ab266646bedacf4fde9674a14795dcfb72aae70a1c4c749f7a9a4f6e302a00753fe0446c1d7cc90caee2d37611d398fdc4c68e48c8bc3637dfd57c15
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_socket.pydFilesize
44KB
MD5f8d03997e7efcdd28a351b6f35b429a2
SHA11a7ae96f258547a14f6e8c0defe127a4e445206d
SHA256aef190652d8466c0455311f320248764acbff6109d1238a26f8983ce86483bf1
SHA51240c9bce421c7733df37558f48b8a95831cc3cf3e2c2cdf40477b733b14bd0a8a0202bc8bc95f39fcd2f76d21deac21ad1a4d0f6218b8f8d57290968163effef8
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_sqlite3.pydFilesize
57KB
MD53d85e2aa598468d9449689a89816395e
SHA1e6d01b535c8fc43337f3c56bfc0678a64cf89151
SHA2566f0c212cb7863099a7ce566a5cf83880d91e38a164dd7f9d05d83cce80fa1083
SHA512a9a527fc1fcce3ffe95e9e6f4991b1a7156a5ca35181100ea2a25b42838b91e39dd9f06f0efedb2453aa87f90e134467a7662dbbe22c6771f1204d82cc6cea82
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_ssl.pydFilesize
65KB
MD5615bfc3800cf4080bc6d52ac091ec925
SHA15b661997ed1f0a6ea22640b11af71e0655522a10
SHA2561819dd90e26aa49eb40119b6442e0e60ec95d3025e9c863778dcc6295a2b561f
SHA5121198426b560044c7f58b1a366a9f8afcde1b6e45647f9ae9c451fb121708aa4371673815be1d35ad1015029c7c1c6ea4755eb3701dbf6f3f65078a18a1daeacb
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_uuid.pydFilesize
24KB
MD5353e11301ea38261e6b1cb261a81e0fe
SHA1607c5ebe67e29eabc61978fb52e4ec23b9a3348e
SHA256d132f754471bd8a6f6d7816453c2e542f250a4d8089b657392fe61a500ae7899
SHA512fa990b3e9619d59ae3ad0aeffca7a3513ab143bfd0ac9277e711519010f7c453258a4b041be86a275f3c365e980fc857c23563f3b393d1e3a223973a673e88c5
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\_wmi.pydFilesize
28KB
MD5db08907bdaee97a5e6e7c710fa7c8c89
SHA1770dac1472d1680b7cddc65c3e1c95e7231135a6
SHA25687c83cf09611d382d3886e396819258be29ee5bbcb15924ee9d7611b9aebb24e
SHA512502a283beef61985b9365731e60a9170672abfb96c925e5d79067233a70498d15af8af2125e8ebfbea3043fed3732ddff46d79ff22182333d5d2c7017653e1a4
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\base_library.zipFilesize
1.3MB
MD58dad91add129dca41dd17a332a64d593
SHA170a4ec5a17ed63caf2407bd76dc116aca7765c0d
SHA2568de4f013bfecb9431aabaa97bb084fb7de127b365b9478d6f7610959bf0d2783
SHA5122163414bc01fc30d47d1de763a8332afe96ea7b296665b1a0840d5197b7e56f4963938e69de35cd2bf89158e5e2240a1650d00d86634ac2a5e2ad825455a2d50
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\certifi\cacert.pemFilesize
285KB
MD5d3e74c9d33719c8ab162baa4ae743b27
SHA1ee32f2ccd4bc56ca68441a02bf33e32dc6205c2b
SHA2567a347ca8fef6e29f82b6e4785355a6635c17fa755e0940f65f15aa8fc7bd7f92
SHA512e0fb35d6901a6debbf48a0655e2aa1040700eb5166e732ae2617e89ef5e6869e8ddd5c7875fa83f31d447d4abc3db14bffd29600c9af725d9b03f03363469b4c
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\charset_normalizer\md.cp312-win_amd64.pydFilesize
9KB
MD5ea68b13d83a5c7521453120dd7bd4dfc
SHA1182d77f89ceb44b524b9d53d6480343f9670fc9c
SHA256c3d31f8842c002085e2d7aa43856c2297d6740f70450c2c4bf80dc1d8360cbc7
SHA51241d3eddc57ee9c643ab28a6e0286cd39c2724a9d1bdf24d75d1dd3ec7900396768e6afa4702272b051627855bdcb12fac8d8834d1d1ddf1638c769c89c2b488d
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\charset_normalizer\md__mypyc.cp312-win_amd64.pydFilesize
39KB
MD54b81e1518d8fc26804b26fa0099ee5b6
SHA1b152ee2d7b843b883f830e69af629a49e2909dcf
SHA256f00565d8909029ce00bc04048a551975db20eb8aa39d1e4a65b7e659c0945100
SHA51209ad69911959418e458cf25c972b4d14983d58c4a48ae739c31d981125442673e66d935bf9c2ea0aa8fbfa20ba4434cf9aac6e6a3b0bd776cf4e46cb80b93949
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\libcrypto-3.dllFilesize
1.6MB
MD57f1b899d2015164ab951d04ebb91e9ac
SHA11223986c8a1cbb57ef1725175986e15018cc9eab
SHA25641201d2f29cf3bc16bf32c8cecf3b89e82fec3e5572eb38a578ae0fb0c5a2986
SHA512ca227b6f998cacca3eb6a8f18d63f8f18633ab4b8464fb8b47caa010687a64516181ad0701c794d6bfe3f153662ea94779b4f70a5a5a94bb3066d8a011b4310d
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\libffi-8.dllFilesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\libssl-3.dllFilesize
222KB
MD5264be59ff04e5dcd1d020f16aab3c8cb
SHA12d7e186c688b34fdb4c85a3fce0beff39b15d50e
SHA256358b59da9580e7102adfc1be9400acea18bc49474db26f2f8bacb4b8839ce49d
SHA5129abb96549724affb2e69e5cb2c834ecea3f882f2f7392f2f8811b8b0db57c5340ab21be60f1798c7ab05f93692eb0aeab077caf7e9b7bb278ad374ff3c52d248
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\psutil\_psutil_windows.pydFilesize
31KB
MD5937fa2077ad3fb82f9edc419627969a3
SHA1381011c5b575c03ab77ab943920b39ef8ec8e57b
SHA256633fb691bc13e4d42b9caa0af3a0897e081c8cccdab37530745598fba597a4c2
SHA512deb6f7f0dd850528aa78c32fdcb42e836507ed7dc1f198c4903810dbba47ef37b87cabae7f148f9017d6f628d93904250a11cdce05d5e29758a422285b01025a
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\pyexpat.pydFilesize
88KB
MD5a8fa7e9e05798ee799f6cc56a3fcf4ad
SHA17e1a36eba8eded63f2e409c00b0dcdf47dc9346c
SHA2560221731a4b1bea7946061321d27d4a2b0b96d7acf0a54ecbacdf11aabecb4268
SHA5126ea88387d89969f1746c0fe317d8ac3f55c28378fdcc08fcff05e9ddf57e1b034a6a371c0febb7858a0aed74a334b7b8de7d7f08882c650990b2779f946fa799
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\python3.DLLFilesize
66KB
MD579b02450d6ca4852165036c8d4eaed1f
SHA1ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4
SHA256d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123
SHA51247044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\python312.dllFilesize
1.7MB
MD5fb8bedf8440eb432c9f3587b8114abc0
SHA1136bb4dd38a7f6cb3e2613910607131c97674f7c
SHA256cb627a3c89de8e114c95bda70e9e75c73310eb8af6cf3a937b1e3678c8f525b6
SHA512b632235d5f60370efa23f8c50170a8ac569ba3705ec3d515efcad14009e0641649ab0f2139f06868024d929defffffefb352bd2516e8cd084e11557b31e95a63
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\select.pydFilesize
25KB
MD508b4caeaccb6f6d27250e6a268c723be
SHA1575c11f72c8d0a025c307cb12efa5cb06705561d
SHA256bd853435608486555091146ab34b71a9247f4aaa9f7ecfbc3b728a3e3efde436
SHA5129b525395dec028ef3286c75b88f768e5d40195d4d5adab0775c64b623345d81da1566596cc61a460681bc0adba9727afc96c98ad2e54ff371919f3db6d369b0c
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\sqlite3.dllFilesize
644KB
MD5482b3f8adf64f96ad4c81ae3e7c0fb35
SHA191891d0eabb33211970608f07850720bd8c44734
SHA2561fbdb4020352e18748434ef6f86b7346f48d6fb9a72c853be7b05e0e53ebbb03
SHA5125de56e00ab6f48ffc836471421d4e360d913a78ee8e071896a2cd951ff20f7a4123abd98adf003ce166dcc82aad248ebf8b63e55e14eceec8aa9a030067c0d1d
-
C:\Users\Admin\AppData\Local\Temp\_MEI44242\unicodedata.pydFilesize
295KB
MD527b3af74ddaf9bca239bf2503bf7e45b
SHA180a09257f9a4212e2765d492366ed1e60d409e04
SHA256584c2ecea23dfc72ab793b3fd1059b3ea6fdf885291a3c7a166157cf0e6491c4
SHA512329c3a9159ea2fdce5e7a28070bcf9d6d67eca0b27c4564e5250e7a407c8b551b68a034bfde9d8d688fa5a1ae6e29e132497b3a630796a97b464762ca0d81bb7
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ow52ddwd.wb0.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\z8i3LLs2aq\Browser\cc's.txtFilesize
91B
MD55aa796b6950a92a226cc5c98ed1c47e8
SHA16706a4082fc2c141272122f1ca424a446506c44d
SHA256c4c83da3a904a4e7114f9bd46790db502cdd04800e684accb991cd1a08ee151c
SHA512976f403257671e8f652bf988f4047202e1a0fd368fdb2bab2e79ece1c20c7eb775c4b3a8853c223d4f750f4192cd09455ff024918276dc1dd1442fa3b36623ad
-
C:\Users\Admin\AppData\Local\Temp\z8i3LLs2aq\Browser\history.txtFilesize
23B
MD55638715e9aaa8d3f45999ec395e18e77
SHA14e3dc4a1123edddf06d92575a033b42a662fe4ad
SHA2564db7f6559c454d34d9c2d557524603c3f52649c2d69b26b6e8384a3d179aeae6
SHA51278c96efab1d941e34d3137eae32cef041e2db5b0ebbf883e6a2effa79a323f66e00cfb7c45eb3398b3cbd0469a2be513c3ff63e5622261857eefc1685f77f76b
-
memory/1132-308-0x00007FFE8FFD0000-0x00007FFE90003000-memory.dmpFilesize
204KB
-
memory/1132-281-0x00007FFE90910000-0x00007FFE9091D000-memory.dmpFilesize
52KB
-
memory/1132-155-0x00007FFE8F820000-0x00007FFE8F832000-memory.dmpFilesize
72KB
-
memory/1132-154-0x00007FFE8F840000-0x00007FFE8F856000-memory.dmpFilesize
88KB
-
memory/1132-160-0x00007FFE811A0000-0x00007FFE81865000-memory.dmpFilesize
6.8MB
-
memory/1132-159-0x00007FFE81CD0000-0x00007FFE81CF4000-memory.dmpFilesize
144KB
-
memory/1132-158-0x00007FFE81D60000-0x00007FFE81D95000-memory.dmpFilesize
212KB
-
memory/1132-162-0x00007FFE808B0000-0x00007FFE80A2E000-memory.dmpFilesize
1.5MB
-
memory/1132-149-0x00007FFE8FFD0000-0x00007FFE90003000-memory.dmpFilesize
204KB
-
memory/1132-165-0x00007FFE8A6A0000-0x00007FFE8A6B8000-memory.dmpFilesize
96KB
-
memory/1132-142-0x00007FFE91050000-0x00007FFE9105D000-memory.dmpFilesize
52KB
-
memory/1132-144-0x00007FFE90920000-0x00007FFE9092D000-memory.dmpFilesize
52KB
-
memory/1132-174-0x00007FFE7FE90000-0x00007FFE7FFAB000-memory.dmpFilesize
1.1MB
-
memory/1132-173-0x00007FFE81CA0000-0x00007FFE81CC7000-memory.dmpFilesize
156KB
-
memory/1132-172-0x00007FFE90960000-0x00007FFE9096B000-memory.dmpFilesize
44KB
-
memory/1132-171-0x00007FFE80C70000-0x00007FFE81199000-memory.dmpFilesize
5.2MB
-
memory/1132-143-0x00007FFE90940000-0x00007FFE90959000-memory.dmpFilesize
100KB
-
memory/1132-145-0x00007FFE90910000-0x00007FFE9091D000-memory.dmpFilesize
52KB
-
memory/1132-147-0x00007FFE80C70000-0x00007FFE81199000-memory.dmpFilesize
5.2MB
-
memory/1132-146-0x00007FFE90840000-0x00007FFE90854000-memory.dmpFilesize
80KB
-
memory/1132-133-0x00007FFE94590000-0x00007FFE945AA000-memory.dmpFilesize
104KB
-
memory/1132-184-0x00007FFE90840000-0x00007FFE90854000-memory.dmpFilesize
80KB
-
memory/1132-191-0x00007FFE8F170000-0x00007FFE8F17B000-memory.dmpFilesize
44KB
-
memory/1132-190-0x00007FFE8FFD0000-0x00007FFE90003000-memory.dmpFilesize
204KB
-
memory/1132-189-0x00007FFE8F7C0000-0x00007FFE8F7CC000-memory.dmpFilesize
48KB
-
memory/1132-188-0x00007FFE8F810000-0x00007FFE8F81B000-memory.dmpFilesize
44KB
-
memory/1132-187-0x00007FFE8FEC0000-0x00007FFE8FECC000-memory.dmpFilesize
48KB
-
memory/1132-192-0x00007FFE80770000-0x00007FFE8083D000-memory.dmpFilesize
820KB
-
memory/1132-203-0x00007FFE80BB0000-0x00007FFE80BBC000-memory.dmpFilesize
48KB
-
memory/1132-202-0x00007FFE80BC0000-0x00007FFE80BD2000-memory.dmpFilesize
72KB
-
memory/1132-201-0x00007FFE80BE0000-0x00007FFE80BED000-memory.dmpFilesize
52KB
-
memory/1132-200-0x00007FFE80BF0000-0x00007FFE80BFC000-memory.dmpFilesize
48KB
-
memory/1132-199-0x00007FFE80C00000-0x00007FFE80C0C000-memory.dmpFilesize
48KB
-
memory/1132-198-0x00007FFE81AE0000-0x00007FFE81AEB000-memory.dmpFilesize
44KB
-
memory/1132-197-0x00007FFE81AF0000-0x00007FFE81AFB000-memory.dmpFilesize
44KB
-
memory/1132-196-0x00007FFE81B00000-0x00007FFE81B0C000-memory.dmpFilesize
48KB
-
memory/1132-195-0x00007FFE81C90000-0x00007FFE81C9E000-memory.dmpFilesize
56KB
-
memory/1132-194-0x00007FFE87090000-0x00007FFE8709C000-memory.dmpFilesize
48KB
-
memory/1132-193-0x00007FFE89A50000-0x00007FFE89A5C000-memory.dmpFilesize
48KB
-
memory/1132-186-0x00007FFE8FF80000-0x00007FFE8FF8B000-memory.dmpFilesize
44KB
-
memory/1132-185-0x00007FFE8FFA0000-0x00007FFE8FFAB000-memory.dmpFilesize
44KB
-
memory/1132-183-0x00007FFE91050000-0x00007FFE9105D000-memory.dmpFilesize
52KB
-
memory/1132-204-0x00007FFE7F9E0000-0x00007FFE7FC25000-memory.dmpFilesize
2.3MB
-
memory/1132-207-0x00007FFE80840000-0x00007FFE8086E000-memory.dmpFilesize
184KB
-
memory/1132-206-0x00007FFE80870000-0x00007FFE80899000-memory.dmpFilesize
164KB
-
memory/1132-312-0x00007FFE81AE0000-0x00007FFE81AEB000-memory.dmpFilesize
44KB
-
memory/1132-134-0x00007FFE91060000-0x00007FFE9108D000-memory.dmpFilesize
180KB
-
memory/1132-108-0x00007FFE945C0000-0x00007FFE945E5000-memory.dmpFilesize
148KB
-
memory/1132-109-0x00007FFE945B0000-0x00007FFE945BF000-memory.dmpFilesize
60KB
-
memory/1132-279-0x00007FFE90940000-0x00007FFE90959000-memory.dmpFilesize
100KB
-
memory/1132-278-0x00007FFE91050000-0x00007FFE9105D000-memory.dmpFilesize
52KB
-
memory/1132-276-0x00007FFE94590000-0x00007FFE945AA000-memory.dmpFilesize
104KB
-
memory/1132-275-0x00007FFE945B0000-0x00007FFE945BF000-memory.dmpFilesize
60KB
-
memory/1132-274-0x00007FFE945C0000-0x00007FFE945E5000-memory.dmpFilesize
148KB
-
memory/1132-282-0x00007FFE90840000-0x00007FFE90854000-memory.dmpFilesize
80KB
-
memory/1132-283-0x00007FFE80C70000-0x00007FFE81199000-memory.dmpFilesize
5.2MB
-
memory/1132-310-0x00007FFE8F840000-0x00007FFE8F856000-memory.dmpFilesize
88KB
-
memory/1132-309-0x00007FFE80770000-0x00007FFE8083D000-memory.dmpFilesize
820KB
-
memory/1132-99-0x00007FFE811A0000-0x00007FFE81865000-memory.dmpFilesize
6.8MB
-
memory/1132-307-0x00007FFE81CD0000-0x00007FFE81CF4000-memory.dmpFilesize
144KB
-
memory/1132-306-0x00007FFE8F7C0000-0x00007FFE8F7CC000-memory.dmpFilesize
48KB
-
memory/1132-305-0x00007FFE8F820000-0x00007FFE8F832000-memory.dmpFilesize
72KB
-
memory/1132-304-0x00007FFE81B00000-0x00007FFE81B0C000-memory.dmpFilesize
48KB
-
memory/1132-303-0x00007FFE81C90000-0x00007FFE81C9E000-memory.dmpFilesize
56KB
-
memory/1132-301-0x00007FFE89A50000-0x00007FFE89A5C000-memory.dmpFilesize
48KB
-
memory/1132-300-0x00007FFE8F170000-0x00007FFE8F17B000-memory.dmpFilesize
44KB
-
memory/1132-298-0x00007FFE8F810000-0x00007FFE8F81B000-memory.dmpFilesize
44KB
-
memory/1132-297-0x00007FFE8FEC0000-0x00007FFE8FECC000-memory.dmpFilesize
48KB
-
memory/1132-296-0x00007FFE8FF80000-0x00007FFE8FF8B000-memory.dmpFilesize
44KB
-
memory/1132-295-0x00007FFE8FFA0000-0x00007FFE8FFAB000-memory.dmpFilesize
44KB
-
memory/1132-294-0x00007FFE7FE90000-0x00007FFE7FFAB000-memory.dmpFilesize
1.1MB
-
memory/1132-292-0x00007FFE90960000-0x00007FFE9096B000-memory.dmpFilesize
44KB
-
memory/1132-291-0x00007FFE8A6A0000-0x00007FFE8A6B8000-memory.dmpFilesize
96KB
-
memory/1132-290-0x00007FFE808B0000-0x00007FFE80A2E000-memory.dmpFilesize
1.5MB
-
memory/1132-302-0x00007FFE87090000-0x00007FFE8709C000-memory.dmpFilesize
48KB
-
memory/1132-293-0x00007FFE81CA0000-0x00007FFE81CC7000-memory.dmpFilesize
156KB
-
memory/1132-288-0x00007FFE81D60000-0x00007FFE81D95000-memory.dmpFilesize
212KB
-
memory/1132-151-0x00007FFE80770000-0x00007FFE8083D000-memory.dmpFilesize
820KB
-
memory/1132-280-0x00007FFE90920000-0x00007FFE9092D000-memory.dmpFilesize
52KB
-
memory/1132-273-0x00007FFE811A0000-0x00007FFE81865000-memory.dmpFilesize
6.8MB
-
memory/1132-277-0x00007FFE91060000-0x00007FFE9108D000-memory.dmpFilesize
180KB
-
memory/1132-311-0x00007FFE81AF0000-0x00007FFE81AFB000-memory.dmpFilesize
44KB
-
memory/1132-317-0x00007FFE80BB0000-0x00007FFE80BBC000-memory.dmpFilesize
48KB
-
memory/1132-320-0x00007FFE80840000-0x00007FFE8086E000-memory.dmpFilesize
184KB
-
memory/1132-319-0x00007FFE80870000-0x00007FFE80899000-memory.dmpFilesize
164KB
-
memory/1132-318-0x00007FFE7F9E0000-0x00007FFE7FC25000-memory.dmpFilesize
2.3MB
-
memory/1132-316-0x00007FFE80BC0000-0x00007FFE80BD2000-memory.dmpFilesize
72KB
-
memory/1132-315-0x00007FFE80BE0000-0x00007FFE80BED000-memory.dmpFilesize
52KB
-
memory/1132-314-0x00007FFE80BF0000-0x00007FFE80BFC000-memory.dmpFilesize
48KB
-
memory/1132-313-0x00007FFE80C00000-0x00007FFE80C0C000-memory.dmpFilesize
48KB
-
memory/3200-493-0x00007FFE7F500000-0x00007FFE7F524000-memory.dmpFilesize
144KB
-
memory/3200-531-0x00007FFE7FA10000-0x00007FFE7FA3D000-memory.dmpFilesize
180KB
-
memory/3200-527-0x00007FFE7E7E0000-0x00007FFE7EEA5000-memory.dmpFilesize
6.8MB
-
memory/3200-528-0x00007FFE80770000-0x00007FFE80795000-memory.dmpFilesize
148KB
-
memory/3200-492-0x00007FFE91050000-0x00007FFE9105D000-memory.dmpFilesize
52KB
-
memory/3200-530-0x00007FFE7FBC0000-0x00007FFE7FBDA000-memory.dmpFilesize
104KB
-
memory/3200-494-0x00007FFE7E130000-0x00007FFE7E2AE000-memory.dmpFilesize
1.5MB
-
memory/3200-532-0x00007FFE91050000-0x00007FFE9105D000-memory.dmpFilesize
52KB
-
memory/3200-533-0x00007FFE7F9F0000-0x00007FFE7FA09000-memory.dmpFilesize
100KB
-
memory/3200-534-0x00007FFE90480000-0x00007FFE9048D000-memory.dmpFilesize
52KB
-
memory/3200-535-0x00007FFE8FFD0000-0x00007FFE8FFDD000-memory.dmpFilesize
52KB
-
memory/3200-473-0x00007FFE7E7E0000-0x00007FFE7EEA5000-memory.dmpFilesize
6.8MB
-
memory/3200-475-0x00007FFE94580000-0x00007FFE9458F000-memory.dmpFilesize
60KB
-
memory/3200-474-0x00007FFE80770000-0x00007FFE80795000-memory.dmpFilesize
148KB
-
memory/3200-476-0x00007FFE7FBC0000-0x00007FFE7FBDA000-memory.dmpFilesize
104KB
-
memory/3200-477-0x00007FFE7FA10000-0x00007FFE7FA3D000-memory.dmpFilesize
180KB
-
memory/3200-478-0x00007FFE91050000-0x00007FFE9105D000-memory.dmpFilesize
52KB
-
memory/3200-479-0x00007FFE7F9F0000-0x00007FFE7FA09000-memory.dmpFilesize
100KB
-
memory/3200-480-0x00007FFE90480000-0x00007FFE9048D000-memory.dmpFilesize
52KB
-
memory/3200-481-0x00007FFE8FFD0000-0x00007FFE8FFDD000-memory.dmpFilesize
52KB
-
memory/3200-482-0x00007FFE7F680000-0x00007FFE7F694000-memory.dmpFilesize
80KB
-
memory/3200-483-0x00007FFE7E2B0000-0x00007FFE7E7D9000-memory.dmpFilesize
5.2MB
-
memory/3200-484-0x00007FFE7F640000-0x00007FFE7F673000-memory.dmpFilesize
204KB
-
memory/3200-486-0x00007FFE7F570000-0x00007FFE7F63D000-memory.dmpFilesize
820KB
-
memory/3200-485-0x00007FFE7E7E0000-0x00007FFE7EEA5000-memory.dmpFilesize
6.8MB
-
memory/3200-487-0x00007FFE7F550000-0x00007FFE7F566000-memory.dmpFilesize
88KB
-
memory/3200-489-0x00007FFE7F530000-0x00007FFE7F542000-memory.dmpFilesize
72KB
-
memory/3200-488-0x00007FFE7FBC0000-0x00007FFE7FBDA000-memory.dmpFilesize
104KB
-
memory/3200-491-0x00007FFE7F430000-0x00007FFE7F465000-memory.dmpFilesize
212KB
-
memory/3200-490-0x00007FFE7FA10000-0x00007FFE7FA3D000-memory.dmpFilesize
180KB
-
memory/3200-529-0x00007FFE94580000-0x00007FFE9458F000-memory.dmpFilesize
60KB
-
memory/3200-536-0x00007FFE7F680000-0x00007FFE7F694000-memory.dmpFilesize
80KB
-
memory/3200-538-0x00007FFE7F640000-0x00007FFE7F673000-memory.dmpFilesize
204KB
-
memory/3200-495-0x00007FFE7F410000-0x00007FFE7F428000-memory.dmpFilesize
96KB
-
memory/3200-496-0x00007FFE8FFA0000-0x00007FFE8FFAB000-memory.dmpFilesize
44KB
-
memory/3200-497-0x00007FFE7F3E0000-0x00007FFE7F407000-memory.dmpFilesize
156KB
-
memory/3200-498-0x00007FFE7F680000-0x00007FFE7F694000-memory.dmpFilesize
80KB
-
memory/3200-500-0x00007FFE7E010000-0x00007FFE7E12B000-memory.dmpFilesize
1.1MB
-
memory/3200-499-0x00007FFE7E2B0000-0x00007FFE7E7D9000-memory.dmpFilesize
5.2MB
-
memory/3200-502-0x00007FFE8FF80000-0x00007FFE8FF8B000-memory.dmpFilesize
44KB
-
memory/3200-501-0x00007FFE7F640000-0x00007FFE7F673000-memory.dmpFilesize
204KB
-
memory/3200-503-0x00007FFE8FEC0000-0x00007FFE8FECB000-memory.dmpFilesize
44KB
-
memory/3200-537-0x00007FFE7E2B0000-0x00007FFE7E7D9000-memory.dmpFilesize
5.2MB
-
memory/3200-548-0x00007FFE7E010000-0x00007FFE7E12B000-memory.dmpFilesize
1.1MB
-
memory/3200-547-0x00007FFE7F3E0000-0x00007FFE7F407000-memory.dmpFilesize
156KB
-
memory/3200-546-0x00007FFE8FFA0000-0x00007FFE8FFAB000-memory.dmpFilesize
44KB
-
memory/3200-545-0x00007FFE7F410000-0x00007FFE7F428000-memory.dmpFilesize
96KB
-
memory/3200-544-0x00007FFE7E130000-0x00007FFE7E2AE000-memory.dmpFilesize
1.5MB
-
memory/3200-543-0x00007FFE7F500000-0x00007FFE7F524000-memory.dmpFilesize
144KB
-
memory/3200-542-0x00007FFE7F430000-0x00007FFE7F465000-memory.dmpFilesize
212KB
-
memory/3200-541-0x00007FFE7F530000-0x00007FFE7F542000-memory.dmpFilesize
72KB
-
memory/3200-540-0x00007FFE7F550000-0x00007FFE7F566000-memory.dmpFilesize
88KB
-
memory/3200-539-0x00007FFE7F570000-0x00007FFE7F63D000-memory.dmpFilesize
820KB
-
memory/3696-371-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-365-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-372-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-373-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-374-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-375-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-376-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-377-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-367-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3696-366-0x000001CEFA3C0000-0x000001CEFA3C1000-memory.dmpFilesize
4KB
-
memory/3984-227-0x000002539C0B0000-0x000002539C0D2000-memory.dmpFilesize
136KB