Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:30
Static task
static1
Behavioral task
behavioral1
Sample
a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe
Resource
win7-20220812-en
General
-
Target
a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe
-
Size
340KB
-
MD5
4d37950dd556f098d14a099869d35ad4
-
SHA1
f530628df64f620967a0960c687b10bf18579c94
-
SHA256
a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
-
SHA512
f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
SSDEEP
6144:NJXQh6uTjQ4rVmh3k4cSbgzsdrVRRetrEpsKHAK3g3UHYTvLRUQSOObAIASgrtHv:2CAIn0eth0Bpi60uKd6N
Malware Config
Extracted
cybergate
v1.07.5
remote
ir0kz.zapto.org:1213
0G7MT5Q26I65Q0
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
wincfg
-
install_file
newudp.exe
-
install_flag
false
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
audiodgi.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run audiodgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Executes dropped EXE 8 IoCs
Processes:
svchost.exesvchost.exeaudiodgi.exewmpmetwk.exewmpmetwk.exesvchost.exesvchost.exesvchost.exepid process 1764 svchost.exe 1548 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1564 wmpmetwk.exe 292 svchost.exe 1380 svchost.exe 1624 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/1548-69-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1548-71-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1548-72-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1548-77-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1548-81-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1548-83-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1548-100-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/292-105-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/292-107-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1624-123-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1624-124-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1624-125-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/292-131-0x0000000010410000-0x0000000010475000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1764 svchost.exe -
Loads dropped DLL 10 IoCs
Processes:
a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exesvchost.exeaudiodgi.exewmpmetwk.exesvchost.exesvchost.exesvchost.exepid process 1652 a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe 1652 a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe 1764 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1548 svchost.exe 292 svchost.exe 1380 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
audiodgi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
svchost.exewmpmetwk.exesvchost.exedescription pid process target process PID 1764 set thread context of 1548 1764 svchost.exe svchost.exe PID 1660 set thread context of 1564 1660 wmpmetwk.exe wmpmetwk.exe PID 1380 set thread context of 1624 1380 svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exeaudiodgi.exewmpmetwk.exesvchost.exepid process 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1764 svchost.exe 1100 audiodgi.exe 1660 wmpmetwk.exe 1380 svchost.exe 1100 audiodgi.exe 1380 svchost.exe 1100 audiodgi.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exesvchost.exeaudiodgi.exewmpmetwk.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 1652 a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe Token: SeDebugPrivilege 1764 svchost.exe Token: SeDebugPrivilege 1100 audiodgi.exe Token: SeDebugPrivilege 1660 wmpmetwk.exe Token: SeBackupPrivilege 292 svchost.exe Token: SeRestorePrivilege 292 svchost.exe Token: SeDebugPrivilege 292 svchost.exe Token: SeDebugPrivilege 292 svchost.exe Token: SeDebugPrivilege 1380 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exesvchost.exeaudiodgi.exewmpmetwk.exesvchost.exedescription pid process target process PID 1652 wrote to memory of 1764 1652 a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe svchost.exe PID 1652 wrote to memory of 1764 1652 a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe svchost.exe PID 1652 wrote to memory of 1764 1652 a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe svchost.exe PID 1652 wrote to memory of 1764 1652 a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1548 1764 svchost.exe svchost.exe PID 1764 wrote to memory of 1100 1764 svchost.exe audiodgi.exe PID 1764 wrote to memory of 1100 1764 svchost.exe audiodgi.exe PID 1764 wrote to memory of 1100 1764 svchost.exe audiodgi.exe PID 1764 wrote to memory of 1100 1764 svchost.exe audiodgi.exe PID 1100 wrote to memory of 1660 1100 audiodgi.exe wmpmetwk.exe PID 1100 wrote to memory of 1660 1100 audiodgi.exe wmpmetwk.exe PID 1100 wrote to memory of 1660 1100 audiodgi.exe wmpmetwk.exe PID 1100 wrote to memory of 1660 1100 audiodgi.exe wmpmetwk.exe PID 1660 wrote to memory of 1564 1660 wmpmetwk.exe wmpmetwk.exe PID 1660 wrote to memory of 1564 1660 wmpmetwk.exe wmpmetwk.exe PID 1660 wrote to memory of 1564 1660 wmpmetwk.exe wmpmetwk.exe PID 1660 wrote to memory of 1564 1660 wmpmetwk.exe wmpmetwk.exe PID 1660 wrote to memory of 1564 1660 wmpmetwk.exe wmpmetwk.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe PID 1548 wrote to memory of 292 1548 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe"C:\Users\Admin\AppData\Local\Temp\a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeC:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
224KB
MD5b93cc7af92080bea62bc2df6973ff190
SHA108a473d1de8b2df1235c0fc1d1fb9f96d9236a46
SHA2561e3d6f9f91ba95e7cc6d1edc995d395899e5629f2a678382f6cde2d4b97fd165
SHA5129e809d756192f0902c8ed2066cd6ac8746cde6f135497c2757a8ed58227395673092b4c619deca6aa8241c204c237749c0e7fa7aaecda4517e40fa0d8d02f4c8
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
56B
MD53ef045d517db664d7f64d66b65eb2ef4
SHA11e54c90ab24a161c307ca74e7bfbab23ca4795a2
SHA2569ae5ccde3335d02f3b0a5795652cb7e706121f9a8bc1a721e2d6ffb1847a5a7b
SHA512ec6b0f85cda02de19eff6094506c093395f6d45e521b2a3985f348ac71414c51b42464723dc7ab95e95c7e8f17fc4199435614cedfeca22630c23868d2377990
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
105B
MD5b47a08e54bdb31b6379086523cfb268d
SHA16a0fd9c0cd1ad93586bbd970e620b9acb07e10fa
SHA256b5f9da68cf86318a878b27edad6c1449cae1a1eb068dd64956310778de488a8c
SHA5120519ec2e20975adc027d3345a4cca7e0617e54cf076cafbe49c67536233d93062d2b29c01f564b8d4a0ea2684f3c50455ca133415f39eb07cf1703466d60f0b1
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exeFilesize
7KB
MD52e18e07194565987ef816f36c4a2134e
SHA15278b14dc0704abd700264bb9f8610caf5d007eb
SHA25644c927820ec11111ab620bfa75b71986b9e675770a782e3c740040d484e5dbd7
SHA5127160e14ec359e738e77afed6341890a8084605543e7deb8720457825ff013b907e7233cc890a8c63614b4d481bc73fb72cf15378d8f3534dfb9c8064fed6f930
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exeFilesize
7KB
MD52e18e07194565987ef816f36c4a2134e
SHA15278b14dc0704abd700264bb9f8610caf5d007eb
SHA25644c927820ec11111ab620bfa75b71986b9e675770a782e3c740040d484e5dbd7
SHA5127160e14ec359e738e77afed6341890a8084605543e7deb8720457825ff013b907e7233cc890a8c63614b4d481bc73fb72cf15378d8f3534dfb9c8064fed6f930
-
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\System\audiodgi.exeFilesize
7KB
MD52e18e07194565987ef816f36c4a2134e
SHA15278b14dc0704abd700264bb9f8610caf5d007eb
SHA25644c927820ec11111ab620bfa75b71986b9e675770a782e3c740040d484e5dbd7
SHA5127160e14ec359e738e77afed6341890a8084605543e7deb8720457825ff013b907e7233cc890a8c63614b4d481bc73fb72cf15378d8f3534dfb9c8064fed6f930
-
\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
340KB
MD54d37950dd556f098d14a099869d35ad4
SHA1f530628df64f620967a0960c687b10bf18579c94
SHA256a1c65a67003ea2e944a484633a52061028e85c7c5dae4f33509250d8b2b0e653
SHA512f0cae45d1a318b0299a6e893f471792862d5faa8bd27635cb743a89e9a3fd1d362d50a5f213ce6c528c342530a0cb593221b74783451c270828f1ff0500a2814
-
memory/292-103-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/292-105-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/292-107-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/292-97-0x0000000000000000-mapping.dmp
-
memory/292-131-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/1100-93-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1100-79-0x0000000000000000-mapping.dmp
-
memory/1100-129-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1380-126-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1380-132-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1380-109-0x0000000000000000-mapping.dmp
-
memory/1548-92-0x0000000000412000-0x0000000000456000-memory.dmpFilesize
272KB
-
memory/1548-71-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1548-81-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1548-69-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1548-72-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1548-100-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/1548-73-0x0000000000454FD0-mapping.dmp
-
memory/1548-83-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1548-77-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1548-68-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1564-90-0x0000000000054FD0-mapping.dmp
-
memory/1624-125-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1624-127-0x0000000000412000-0x0000000000456000-memory.dmpFilesize
272KB
-
memory/1624-119-0x0000000000454FD0-mapping.dmp
-
memory/1624-124-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1624-123-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1652-55-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1652-54-0x00000000758C1000-0x00000000758C3000-memory.dmpFilesize
8KB
-
memory/1652-62-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1660-94-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1660-130-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1660-86-0x0000000000000000-mapping.dmp
-
memory/1764-58-0x0000000000000000-mapping.dmp
-
memory/1764-128-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB
-
memory/1764-65-0x0000000074700000-0x0000000074CAB000-memory.dmpFilesize
5.7MB