Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 05:47
Static task
static1
Behavioral task
behavioral1
Sample
3.ps1
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3.ps1
Resource
win10v2004-20220901-en
General
-
Target
3.ps1
-
Size
1.1MB
-
MD5
2c1d7f30313a38d84667c62442884b8b
-
SHA1
87a8523c468b51418acdd93ac866c4ffeb038f09
-
SHA256
5a986b4ea7640b887fbef842e3cf0adcd6aa16482c98ccd6db5a99e726205b3a
-
SHA512
c12f02092a9f45d3fa51d3a681d10fe6f331439783a18b05db6fc8130f62ef7a8644c84af4c0532693cd43dca9c81b96c12735c2ea7d9e28203f5e2e1c8d0755
-
SSDEEP
12288:1ViPI6z8ay43NxSz0kmLoL2xfZe0I8nU8ECxKFajz:PINi0kmLF5I8z
Malware Config
Extracted
Protocol: ftp- Host:
107.182.129.168 - Port:
21 - Username:
ashgdhfg3 - Password:
jfghfjgh545
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
jsc.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts jsc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\helloitsindian.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\helloitsindian.vbs WScript.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powershell.exedescription pid process target process PID 5104 set thread context of 3112 5104 powershell.exe jsc.exe PID 5104 set thread context of 3976 5104 powershell.exe caspol.exe PID 5104 set thread context of 4700 5104 powershell.exe Msbuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3100 schtasks.exe 1440 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
dw20.exedw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies registry class 1 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exejsc.exepid process 556 powershell.exe 556 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 3112 jsc.exe 3112 jsc.exe 3112 jsc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exepowershell.exedw20.exedw20.exejsc.exedescription pid process Token: SeDebugPrivilege 556 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeRestorePrivilege 3100 dw20.exe Token: SeBackupPrivilege 3100 dw20.exe Token: SeBackupPrivilege 3100 dw20.exe Token: SeBackupPrivilege 5064 dw20.exe Token: SeBackupPrivilege 5064 dw20.exe Token: SeBackupPrivilege 3100 dw20.exe Token: SeBackupPrivilege 3100 dw20.exe Token: SeDebugPrivilege 3112 jsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
jsc.exepid process 3112 jsc.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
powershell.exeWScript.exeWScript.execmd.exepowershell.exeMsbuild.execaspol.execsc.execsc.exedescription pid process target process PID 556 wrote to memory of 2288 556 powershell.exe WScript.exe PID 556 wrote to memory of 2288 556 powershell.exe WScript.exe PID 2288 wrote to memory of 4824 2288 WScript.exe WScript.exe PID 2288 wrote to memory of 4824 2288 WScript.exe WScript.exe PID 2288 wrote to memory of 5012 2288 WScript.exe cmd.exe PID 2288 wrote to memory of 5012 2288 WScript.exe cmd.exe PID 4824 wrote to memory of 3100 4824 WScript.exe schtasks.exe PID 4824 wrote to memory of 3100 4824 WScript.exe schtasks.exe PID 4824 wrote to memory of 1440 4824 WScript.exe schtasks.exe PID 4824 wrote to memory of 1440 4824 WScript.exe schtasks.exe PID 5012 wrote to memory of 5104 5012 cmd.exe powershell.exe PID 5012 wrote to memory of 5104 5012 cmd.exe powershell.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3112 5104 powershell.exe jsc.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 3976 5104 powershell.exe caspol.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 5104 wrote to memory of 4700 5104 powershell.exe Msbuild.exe PID 4700 wrote to memory of 5064 4700 Msbuild.exe dw20.exe PID 4700 wrote to memory of 5064 4700 Msbuild.exe dw20.exe PID 4700 wrote to memory of 5064 4700 Msbuild.exe dw20.exe PID 3976 wrote to memory of 3100 3976 caspol.exe dw20.exe PID 3976 wrote to memory of 3100 3976 caspol.exe dw20.exe PID 3976 wrote to memory of 3100 3976 caspol.exe dw20.exe PID 5104 wrote to memory of 2304 5104 powershell.exe csc.exe PID 5104 wrote to memory of 2304 5104 powershell.exe csc.exe PID 2304 wrote to memory of 4844 2304 csc.exe cvtres.exe PID 2304 wrote to memory of 4844 2304 csc.exe cvtres.exe PID 5104 wrote to memory of 4492 5104 powershell.exe csc.exe PID 5104 wrote to memory of 4492 5104 powershell.exe csc.exe PID 4492 wrote to memory of 208 4492 csc.exe cvtres.exe PID 4492 wrote to memory of 208 4492 csc.exe cvtres.exe -
outlook_office_path 1 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
outlook_win_path 1 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\3.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\holatyrimakachola\helloitsindian.vbs"2⤵
- Checks computer location settings
- Drops startup file
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\holatyrimakachola\JIGIJIGI.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 120 /tn Appligation /F /tr "C:\ProgramData\holatyrimakachola\helloitsindian.vbs"4⤵
- Creates scheduled task(s)
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 45 /tn ChromiumPluginupdate /F /tr "C:\ProgramData\holatyrimakachola\ChromeExtentionUpdate.vbs"4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\holatyrimakachola\JIGIJIGI.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\holatyrimakachola\GOLGAPORA.PS14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"5⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7726⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7766⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.cmdline"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF52D.tmp" "c:\Users\Admin\AppData\Local\Temp\dtynjcae\CSC766261FD1A9A472ABCBEBFED159DCB3E.TMP"6⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.cmdline"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES119F.tmp" "c:\Users\Admin\AppData\Local\Temp\jfvskaoo\CSCA1DC367875504E6797D67F5D2881861E.TMP"6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B33.tmp.xmlFilesize
4KB
MD56c62665e909e435fe56e13d09de86cc5
SHA17f7b6d899c3c9bd7da0bf3cbcc610d244b493135
SHA25620f91991ac9bb1a0df9980f4afa727e6a4b762d590981496cd0d0f5d83caa5a2
SHA512b5ede5143849e19b2d4fa9844c07a6ede986749ed7b51bf8d94b02a8292d9486b2c5188533d168a59fd4051e1735b442c81ef37c7b23aa7908be7a4e7fd162c1
-
C:\ProgramData\holatyrimakachola\GOLGAPORA.PS1Filesize
1.1MB
MD5603bffe09d8f6c58499a83212f5febac
SHA1f6616cdfbe8b06b5ee4f95cfee0ed15b74b59466
SHA256d7fe1e3c8d18c2f992dfad7fabfb8f9907786eaca269dbc73593801c7474bd13
SHA512788b7cd546c4557fdbbab8a5048f62838106e592836a9616f19cf82759b6486207912f8787ddf5465a4d5ec4d567776cab701b2c1e5b63980c9245ee51884346
-
C:\ProgramData\holatyrimakachola\JIGIJIGI.batFilesize
105B
MD57f53280ea46314479ed1d63b7d9625eb
SHA19a045c31da18e934b1ca4ce27b72daf0cbbd87fe
SHA25688bc996293478f62bb28814b1787c278a6dc0ed20fe8b11e3f644985b6514459
SHA512275868f4214bc8b874ec857f8938fc35fb77ef025596e1e0cdbea2d231864bec8c4ae09fb557c8dcbe95131c10962cc11744b210f1ec0c111db663fa27a7dbf3
-
C:\ProgramData\holatyrimakachola\JIGIJIGI.vbsFilesize
562B
MD58ea0ee4f4d6ccbabe4117cdd6f974011
SHA13271a608993c307046b3185c9a21d434d39fb19c
SHA256cfed6df2d13d6a842032d23d0b12429ca0ddb4ef2bba89f096a05ba44516c620
SHA5125b10ff90b6560956670c85f33266384f4ed401845e137e356ff15e4d613a6a6cc6ff42e68ccde85e0c49d58b7c20f25132ece60a2b60977dd1b3066e59cca61e
-
C:\ProgramData\holatyrimakachola\helloitsindian.vbsFilesize
387B
MD5f0ca1358f7cbc07ffadcdcbb09a8096e
SHA1a1839290fb16f5ccfbcbeec71bcfa4afaa842eaa
SHA256b964c3f6be44ac474f116783e4ca950b909109ff7ea1cf9db9a879a29beeae43
SHA51260fe0ab41793a5fd89a5ffad088a46b0cc8c4db06b8180446e1a4d036c7f81faf35fa726bc9f7b4231b99946ac3c99ae659b4e5a7611e10da2d86344fa620d2c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD53003448ee73abf14d5c8011a37c40600
SHA1b88e9cdbae2e27a25f0858fc0b6d79533fb160d8
SHA256ae448d99735879ecee1dc3088c8f7553ebff461b96172d8f3cb5ff2fa2a12d4a
SHA5120fe52614eec6d75a265ae380aaa1eb153bc35a1baae4d118637798575169d9dba5ad751efab5d7f5dbe9764bfb96e9ae76577a3487429a3383b5b08d5402fe3a
-
C:\Users\Admin\AppData\Local\Temp\RES119F.tmpFilesize
1KB
MD534a28d5d3486fec6634fccff0a52c74c
SHA1e15f4dd1be1e0265eface7d1d06a03f0a7f36878
SHA256d3bfab38479f27c4e6b728224c29eaad09e2a4807fe89f3acfc3146ac6961460
SHA512820ad44dd0cca68b12b230e4de19cafce7a5b885355bd9b2c66f25ccf337ba1f971ae5a110c22c354ee72ddc230cb01b4b7e91ec600ae4e187824ac6bc146742
-
C:\Users\Admin\AppData\Local\Temp\RESF52D.tmpFilesize
1KB
MD5c379f68844931986040e99412b5db463
SHA1715a1c9a3019b377171588728a5877f36f15a561
SHA256688d3434b52a4d062c34020f9fa9ba55d15e1f1b0bb30a38c835682f94c82cc6
SHA5127388b72d8237c05fd576e069cb29ebe48ea797da34d3190094d68c2079f466caf81d27ff3351e91cb3e74a50e82668f85807fecc5d59d50136de6df576cbd8ec
-
C:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.dllFilesize
3KB
MD5ed1a6e6a02a12ac7f0cdc4d1549a80ee
SHA103a7035ca85c3c4520453ac1587f8a2039a57ed1
SHA256dc252df455438dbc54b6f995958c49783986ced36c9a664d9cd1f70a08030324
SHA5123e08f0e14e81dd9dd50228c65167880d843ca6709a4e7c6f0bf0098ed0e89229bdd394179cbb136ed48dfd55c9ea5de39f0587e75189700a3fc17784dd0854f8
-
C:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.dllFilesize
3KB
MD5eab68ae97dcbf4bfc56d9312aee6fcd0
SHA146580f84218408e44864dd8e74afe09641bbc85d
SHA2567eb98a97fdaed52b52a19175e8a3e2a542fab676ac2265562f9847fd0cdb2153
SHA512ae87763794ce98529d1262529c628e8ab4767da69a5ba909fd9228b5d2584ed8e2a1620907175000c9aab9cc66b2fac0af6ed98844d6473f831efb34ea5702dc
-
\??\c:\Users\Admin\AppData\Local\Temp\dtynjcae\CSC766261FD1A9A472ABCBEBFED159DCB3E.TMPFilesize
652B
MD51317a917af9688432028228ce663f34e
SHA132dd454cdc76768da95d261a63b34350fbde4ae7
SHA2568eca461b7f214141c2567ad28d5a49be07f661df0f66b6451c33e7bb8fd9ae76
SHA512d937015c6d721b79a71b9b71a0d1cca1494d418e53c57dc590fb05921a952986e03933910cc2ed1eed2c46a2cb9d164a14c76c05e6a0a6c7220d8835b5e29766
-
\??\c:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.0.csFilesize
424B
MD5d05db7ca65c16470a87f4c4007e9e026
SHA1ab4a5e6b4fbc331c345d88c39239f003f8dd3da7
SHA256c1412a0d2269b59df9d6b003b2f82f9479040dae4c4e12629db5845a6ac4c960
SHA512825d664f3df2ad4ef8b1e501e6a99aaae7d54db59b9308c34ad3d64b07a6792412beded53919ea8bf9e137f4a7e8aa7ac388a036ab256a1cce201a208ef311cb
-
\??\c:\Users\Admin\AppData\Local\Temp\dtynjcae\dtynjcae.cmdlineFilesize
369B
MD5a570acba3db4d8bd464d557404ddbf7a
SHA19f583c7e6cff656729c680911bfd9b96c4795011
SHA256e25ee4125ec4b7da7244175838d52dff42433b20d355ec1753617c7d6c1df49b
SHA512b2ded5975b6c6d8fb3969aa5fd1c11b34e7a9fd1f06e1b64552bf774743b769647ce46f4ae352129a4a27e3a29874b201cec9cc6030072ea7c0c4684e2821a6c
-
\??\c:\Users\Admin\AppData\Local\Temp\jfvskaoo\CSCA1DC367875504E6797D67F5D2881861E.TMPFilesize
652B
MD5292b23b4d6cc2e1a16ff379419976ae4
SHA1e150f0f274e37bacba8841f1c10412593d575c66
SHA256c52b4a157984c3b76b6711bcd0acdd275e9288be99476bef8a2e9cfda527c408
SHA51213265a963c2c099de65e9ded46e4d10db6a97a9ff55055f6217abcd0148e3f54e5fc616450c6bc05cbe43bf4d383af31e03015dc358cc3e05997d70bd79f5bd8
-
\??\c:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.0.csFilesize
424B
MD55b0a710c68952a280e3737f249a789bb
SHA1cfd4349b3ebe8232b342fa6667e63d8027fcd26b
SHA25632781e50bffd54bf50e075fc3c5fea9bf02030c8aeb34344cf15592d702973ad
SHA51237efadb9ecade74d0f57bf0c5f5ff254203f952a7b54443433dadbc1e720d294ac6e3694a016520b99747a9856dc523d8a901f209285dba53863dd2e3e64e8ad
-
\??\c:\Users\Admin\AppData\Local\Temp\jfvskaoo\jfvskaoo.cmdlineFilesize
369B
MD5253e01d7127cebdb70546cf93c3eccc8
SHA15da29fc0ded140dbde3949461f9b67db98b41edd
SHA256bd7c909eaef450dec6b06a98af68953f85936de65bf71fee97c1a235e66ccd35
SHA512c1871f9c5531f1764420281cad38dfbf5b8e77890fe4c4f3deb3ada30b23355a4e3a90f0daa7320a9cadbe90092aea7ef9e93663dfda29c7c5f01728b62b526c
-
memory/208-178-0x0000000000000000-mapping.dmp
-
memory/556-133-0x00007FF83C100000-0x00007FF83CBC1000-memory.dmpFilesize
10.8MB
-
memory/556-132-0x0000028E31710000-0x0000028E31732000-memory.dmpFilesize
136KB
-
memory/556-136-0x00007FF83C100000-0x00007FF83CBC1000-memory.dmpFilesize
10.8MB
-
memory/1440-142-0x0000000000000000-mapping.dmp
-
memory/2288-134-0x0000000000000000-mapping.dmp
-
memory/2304-168-0x0000000000000000-mapping.dmp
-
memory/3100-156-0x0000000000000000-mapping.dmp
-
memory/3100-141-0x0000000000000000-mapping.dmp
-
memory/3112-157-0x0000000005110000-0x00000000056B4000-memory.dmpFilesize
5.6MB
-
memory/3112-161-0x0000000004B60000-0x0000000004BFC000-memory.dmpFilesize
624KB
-
memory/3112-162-0x0000000004C00000-0x0000000004C92000-memory.dmpFilesize
584KB
-
memory/3112-163-0x0000000004AC0000-0x0000000004B26000-memory.dmpFilesize
408KB
-
memory/3112-150-0x000000000047DA9E-mapping.dmp
-
memory/3112-149-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3112-166-0x0000000005E70000-0x0000000005EC0000-memory.dmpFilesize
320KB
-
memory/3112-167-0x0000000006700000-0x000000000670A000-memory.dmpFilesize
40KB
-
memory/3976-165-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/3976-152-0x000000000047DA9E-mapping.dmp
-
memory/3976-158-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/4492-175-0x0000000000000000-mapping.dmp
-
memory/4700-154-0x000000000047DA9E-mapping.dmp
-
memory/4700-159-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/4700-164-0x0000000074630000-0x0000000074BE1000-memory.dmpFilesize
5.7MB
-
memory/4824-138-0x0000000000000000-mapping.dmp
-
memory/4844-171-0x0000000000000000-mapping.dmp
-
memory/5012-140-0x0000000000000000-mapping.dmp
-
memory/5064-155-0x0000000000000000-mapping.dmp
-
memory/5104-143-0x0000000000000000-mapping.dmp
-
memory/5104-148-0x00007FF83BF50000-0x00007FF83CA11000-memory.dmpFilesize
10.8MB
-
memory/5104-147-0x00007FF83BF50000-0x00007FF83CA11000-memory.dmpFilesize
10.8MB
-
memory/5104-182-0x00007FF83BF50000-0x00007FF83CA11000-memory.dmpFilesize
10.8MB