Analysis

  • max time kernel
    191s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:39

General

  • Target

    721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3.exe

  • Size

    153KB

  • MD5

    2fa0e36b36382b74e6e6a437ad664a80

  • SHA1

    08f7be08af95995e5a3bb7787e23e3954e7ebe5b

  • SHA256

    721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

  • SHA512

    3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

  • SSDEEP

    3072:Wy277Ci2HMm3nQuTz5U0Ofr2AUx4bzWKeH3tMCmzsaz:Wy27mi2Hj3Qg112rhUxl/3thEse

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 20 IoCs
  • Executes dropped EXE 9 IoCs
  • Drops file in System32 directory 20 IoCs
  • Runs .reg file with regedit 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3.exe
    "C:\Users\Admin\AppData\Local\Temp\721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\a.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Windows\SysWOW64\regedit.exe
        REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
        3⤵
        • Modifies security service
        • Runs .reg file with regedit
        PID:3944
    • C:\Windows\SysWOW64\ssms.exe
      C:\Windows\system32\ssms.exe 1168 "C:\Users\Admin\AppData\Local\Temp\721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\a.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\SysWOW64\regedit.exe
          REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
          4⤵
          • Modifies security service
          • Runs .reg file with regedit
          PID:1588
      • C:\Windows\SysWOW64\ssms.exe
        C:\Windows\system32\ssms.exe 1184 "C:\Windows\SysWOW64\ssms.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:4932
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c c:\a.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4500
          • C:\Windows\SysWOW64\regedit.exe
            REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
            5⤵
            • Modifies security service
            • Runs .reg file with regedit
            PID:5064
        • C:\Windows\SysWOW64\ssms.exe
          C:\Windows\system32\ssms.exe 1156 "C:\Windows\SysWOW64\ssms.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c c:\a.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4308
            • C:\Windows\SysWOW64\regedit.exe
              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
              6⤵
              • Modifies security service
              • Runs .reg file with regedit
              PID:4860
          • C:\Windows\SysWOW64\ssms.exe
            C:\Windows\system32\ssms.exe 1148 "C:\Windows\SysWOW64\ssms.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:4900
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c c:\a.bat
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3120
              • C:\Windows\SysWOW64\regedit.exe
                REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                7⤵
                • Modifies security service
                • Runs .reg file with regedit
                PID:4920
            • C:\Windows\SysWOW64\ssms.exe
              C:\Windows\system32\ssms.exe 1152 "C:\Windows\SysWOW64\ssms.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:5092
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c c:\a.bat
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1860
                • C:\Windows\SysWOW64\regedit.exe
                  REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                  8⤵
                  • Modifies security service
                  • Runs .reg file with regedit
                  PID:516
              • C:\Windows\SysWOW64\ssms.exe
                C:\Windows\system32\ssms.exe 1160 "C:\Windows\SysWOW64\ssms.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:2808
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c c:\a.bat
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:732
                  • C:\Windows\SysWOW64\regedit.exe
                    REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                    9⤵
                    • Modifies security service
                    • Runs .reg file with regedit
                    PID:692
                • C:\Windows\SysWOW64\ssms.exe
                  C:\Windows\system32\ssms.exe 1172 "C:\Windows\SysWOW64\ssms.exe"
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:2004
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c c:\a.bat
                    9⤵
                      PID:2500
                      • C:\Windows\SysWOW64\regedit.exe
                        REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                        10⤵
                        • Modifies security service
                        • Runs .reg file with regedit
                        PID:3380
                    • C:\Windows\SysWOW64\ssms.exe
                      C:\Windows\system32\ssms.exe 1164 "C:\Windows\SysWOW64\ssms.exe"
                      9⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      PID:1904
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c c:\a.bat
                        10⤵
                          PID:3644
                          • C:\Windows\SysWOW64\regedit.exe
                            REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                            11⤵
                            • Modifies security service
                            • Runs .reg file with regedit
                            PID:2776
                        • C:\Windows\SysWOW64\ssms.exe
                          C:\Windows\system32\ssms.exe 1176 "C:\Windows\SysWOW64\ssms.exe"
                          10⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          PID:2768
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c c:\a.bat
                            11⤵
                              PID:4444
                              • C:\Windows\SysWOW64\regedit.exe
                                REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                12⤵
                                • Modifies security service
                                • Runs .reg file with regedit
                                PID:2476

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Users\Admin\AppData\Local\Temp\1.reg

          Filesize

          3KB

          MD5

          9e5db93bd3302c217b15561d8f1e299d

          SHA1

          95a5579b336d16213909beda75589fd0a2091f30

          SHA256

          f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

          SHA512

          b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • C:\Windows\SysWOW64\ssms.exe

          Filesize

          153KB

          MD5

          2fa0e36b36382b74e6e6a437ad664a80

          SHA1

          08f7be08af95995e5a3bb7787e23e3954e7ebe5b

          SHA256

          721c1700d7dbd9bbb8a4e5561bf598b21bd8a5a69f6cee8ad9865335856158b3

          SHA512

          3efb86874972bd502672e77468991d45b9094f9dc7f42cd0a6a0ab8a504138c7820f8df0da92c9404e71a1ab1000a7ef1246ccc0be7b623bb2bd966e135488ed

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • \??\c:\a.bat

          Filesize

          5KB

          MD5

          0019a0451cc6b9659762c3e274bc04fb

          SHA1

          5259e256cc0908f2846e532161b989f1295f479b

          SHA256

          ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

          SHA512

          314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

        • memory/516-165-0x0000000000000000-mapping.dmp

        • memory/624-139-0x0000000000000000-mapping.dmp

        • memory/692-171-0x0000000000000000-mapping.dmp

        • memory/732-169-0x0000000000000000-mapping.dmp

        • memory/1588-141-0x0000000000000000-mapping.dmp

        • memory/1860-163-0x0000000000000000-mapping.dmp

        • memory/1904-179-0x0000000000000000-mapping.dmp

        • memory/2004-173-0x0000000000000000-mapping.dmp

        • memory/2092-149-0x0000000000000000-mapping.dmp

        • memory/2476-189-0x0000000000000000-mapping.dmp

        • memory/2500-175-0x0000000000000000-mapping.dmp

        • memory/2768-185-0x0000000000000000-mapping.dmp

        • memory/2776-183-0x0000000000000000-mapping.dmp

        • memory/2808-167-0x0000000000000000-mapping.dmp

        • memory/3120-157-0x0000000000000000-mapping.dmp

        • memory/3380-177-0x0000000000000000-mapping.dmp

        • memory/3644-181-0x0000000000000000-mapping.dmp

        • memory/3744-136-0x0000000000000000-mapping.dmp

        • memory/3944-134-0x0000000000000000-mapping.dmp

        • memory/4128-132-0x0000000000000000-mapping.dmp

        • memory/4308-151-0x0000000000000000-mapping.dmp

        • memory/4444-187-0x0000000000000000-mapping.dmp

        • memory/4500-145-0x0000000000000000-mapping.dmp

        • memory/4860-153-0x0000000000000000-mapping.dmp

        • memory/4900-155-0x0000000000000000-mapping.dmp

        • memory/4920-159-0x0000000000000000-mapping.dmp

        • memory/4932-143-0x0000000000000000-mapping.dmp

        • memory/5064-147-0x0000000000000000-mapping.dmp

        • memory/5092-161-0x0000000000000000-mapping.dmp