Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2022, 10:32

General

  • Target

    file.exe

  • Size

    231KB

  • MD5

    65373ca1501ea5eee86d6cfec11e0b93

  • SHA1

    2b256b6d19c48b79bec386037465dcfc6527d610

  • SHA256

    06082ff07e6a1d8c0f9fa2096e866d63fafbac246b596a600ee28c3eb6b094bf

  • SHA512

    666047807783b478d0b5132ebbf9c76f636336b8c15f1ea172482e337cf9086bedfb8bb38314f60572df34be651d5d5d26762c9c6ea98a2a1d4f625f9cb615f1

  • SSDEEP

    3072:jy8GLffxhTV5C5eyhw1w0f2TpS7xeuISMphWPtYKs/xAI99:+LnHTa5K7fMQ7k1LW1YDZ

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

22500

C2

confisg.edge.skype.com

http://

s28bxcw.xyz

config.edgse.skype.com

http://89.43.107.7

Attributes
  • base_path

    /recycle/

  • build

    250249

  • exe_type

    loader

  • extension

    .alo

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

amadey

Version

3.63

C2

62.204.41.165/g8sjnd3xe/index.php

Extracted

Family

gozi

Botnet

22500

C2

confisg.edge.skype.com

http://s28bxcw.xyz

http://89.43.107.7

Attributes
  • base_path

    /recycle/

  • build

    250249

  • exe_type

    worker

  • extension

    .alo

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Detects Smokeloader packer 1 IoCs
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2932
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B6E1.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\B6E1.dll
        3⤵
        • Loads dropped DLL
        PID:2884
    • C:\Users\Admin\AppData\Local\Temp\B8D6.exe
      C:\Users\Admin\AppData\Local\Temp\B8D6.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
        "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2936
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          • outlook_win_path
          PID:4896
    • C:\Users\Admin\AppData\Local\Temp\B9C1.exe
      C:\Users\Admin\AppData\Local\Temp\B9C1.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
        "C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe"
        3⤵
        • Executes dropped EXE
        PID:3796
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" "about:<hta:application><script>Blyd='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Blyd).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\D89F7C49-5721-CA4E-A18C-7B9E6580DFB2\\\ActiveChip'));if(!window.flag)close()</script>"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name wswwvip -value gp; new-alias -name dwykcj -value iex; dwykcj ([System.Text.Encoding]::ASCII.GetString((wswwvip "HKCU:Software\AppDataLow\Software\Microsoft\D89F7C49-5721-CA4E-A18C-7B9E6580DFB2").ActiveBook))
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4000
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4uykyc0u\4uykyc0u.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3496
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6174.tmp" "c:\Users\Admin\AppData\Local\Temp\4uykyc0u\CSCEA8D1BDF4B648A8BD2F6FF766FE4.TMP"
            5⤵
              PID:1868
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fjgvoe4s\fjgvoe4s.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1920
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES62CC.tmp" "c:\Users\Admin\AppData\Local\Temp\fjgvoe4s\CSCAE4EF84FFA9B4C358D32DB661588A8B.TMP"
              5⤵
                PID:4260
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\B6E1.dll"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1552
          • C:\Windows\system32\PING.EXE
            ping localhost -n 5
            3⤵
            • Runs ping.exe
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:3140
        • C:\Windows\syswow64\cmd.exe
          "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
          2⤵
            PID:2372
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3416
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:3696
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:4872
              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                1⤵
                • Executes dropped EXE
                PID:3204
              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe
                1⤵
                • Executes dropped EXE
                PID:4668

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\4uykyc0u\4uykyc0u.dll

                Filesize

                3KB

                MD5

                92e0089d2f701974e7d621160784b4ef

                SHA1

                68e8cf47e95e779d3b68daf10620926681f646e3

                SHA256

                3434cc322bd9dc322fa113ff152b6896ba6dfb011ffe710c2aad7b518390bc14

                SHA512

                272b1c201c3d2a0d2e40571cbae2a4188535fc419ff16a54bb87df5a3304c90e8cc14504585ca5af107a028a65e9c8b631b97e08f528109382c6e3b32a75001a

              • C:\Users\Admin\AppData\Local\Temp\B6E1.dll

                Filesize

                584KB

                MD5

                71bb495869bfff145090bdb878800130

                SHA1

                5d1e298129bc9c8bf6d1b5d3d9f321a8858e9ab5

                SHA256

                9475ff9c5e05af184d06a10b33225f74e89cb941495a82bf4038df98169a432f

                SHA512

                ef22db3f32bf5cd34bc69245c41e9eea8bff7b61c8062631a0817744155e802c7caf4f2711ff653572a15903fc07b1af283cd2289d75f268c22eec14ae173c73

              • C:\Users\Admin\AppData\Local\Temp\B6E1.dll

                Filesize

                584KB

                MD5

                71bb495869bfff145090bdb878800130

                SHA1

                5d1e298129bc9c8bf6d1b5d3d9f321a8858e9ab5

                SHA256

                9475ff9c5e05af184d06a10b33225f74e89cb941495a82bf4038df98169a432f

                SHA512

                ef22db3f32bf5cd34bc69245c41e9eea8bff7b61c8062631a0817744155e802c7caf4f2711ff653572a15903fc07b1af283cd2289d75f268c22eec14ae173c73

              • C:\Users\Admin\AppData\Local\Temp\B8D6.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\B8D6.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\B9C1.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\B9C1.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\RES6174.tmp

                Filesize

                1KB

                MD5

                2c582c5a1364f31a19a057becf13b2b1

                SHA1

                6a3e007874521a800e36718262e9eacfb6ecfde5

                SHA256

                540d87223f200e3a5ac2bd52652a7ea6c5bc3dbfdc055c5486d4f2a59f938a6f

                SHA512

                342f82f65aaf0151dc44e03ce412e05030680a2f194b4ca8493aa562ade6cb4a533be6d3134d9b8ce5e48b9ba6a334ba92a463c3db938ae0d285293ae0d3f621

              • C:\Users\Admin\AppData\Local\Temp\RES62CC.tmp

                Filesize

                1KB

                MD5

                11cdbd4f5f8885c9af94d4aed3f924e1

                SHA1

                a61053991d9f1b4c441d0684073d666a047091e6

                SHA256

                d602106449120f62b8eccb61002b5f3c00ef4ed635ca6d5a12e22f96bc4f1bff

                SHA512

                2765d1d205de2457a341e833cd5750075dc39aa83783af4a47c20d120dde0bf84e1720b6c390f497d890bf8b79956664d8c6df9e26370ac110dd4771c8811cea

              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\cb465ca805\nbveek.exe

                Filesize

                235KB

                MD5

                1d641e8215a82151e8925673bfb171a1

                SHA1

                12885d250304d50920b79a00524250eaac5a7741

                SHA256

                5882c280879e455296e2ff9e0570d6dfe4780cf18e62e7c8ba346a97a719d445

                SHA512

                b6791f1b56ee4e992bc4726a7a6cbdbef10bbfad3eb1dfa968679344932ab06d76640e49d5018adb3ab386b36917e12b5d7a93e9d27c4a28af4ac1b8896ec6ce

              • C:\Users\Admin\AppData\Local\Temp\fjgvoe4s\fjgvoe4s.dll

                Filesize

                3KB

                MD5

                38c38b1b0858023ae4f4e5d6364649e3

                SHA1

                a77d4bfb66c2c80a2c0f49ac92a117b6841ca257

                SHA256

                64ec39aa39a9d477e4e5f08b8a0e31ea7d6e0f1a2ae74ddfc2a5437ed6a609e3

                SHA512

                7d2e03405614e9c9933ebd5a93c5c98bded3893a182289647a0e4dbf86ee6fe0eb7ff138efd246e2b68662a3d0778d39c8e01f8adfed1a554f29c8238c00fd60

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                126KB

                MD5

                70134bf4d1cd851b382b2930a2e182ea

                SHA1

                8454d476c0d36564792b49be546593af3eab29f4

                SHA256

                5e4cb0cc51202cef27c4f5da63362ceee8c29a03e61ac19efda3c137b657d9ef

                SHA512

                1af07ab22359f69fe32e359883f7d31f3068582ba0eddcb1faf6bf7686f32f51e36cdf645ac9dd727a4bf9b8c390245d7e71faf17c1a18ff3054c55f19c770bd

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                126KB

                MD5

                70134bf4d1cd851b382b2930a2e182ea

                SHA1

                8454d476c0d36564792b49be546593af3eab29f4

                SHA256

                5e4cb0cc51202cef27c4f5da63362ceee8c29a03e61ac19efda3c137b657d9ef

                SHA512

                1af07ab22359f69fe32e359883f7d31f3068582ba0eddcb1faf6bf7686f32f51e36cdf645ac9dd727a4bf9b8c390245d7e71faf17c1a18ff3054c55f19c770bd

              • \??\c:\Users\Admin\AppData\Local\Temp\4uykyc0u\4uykyc0u.0.cs

                Filesize

                408B

                MD5

                f58cc7462a9dc35fa5ccf9d605d846f9

                SHA1

                c864bbe18005d5c8e0c95cf71cf82afc1f2222a0

                SHA256

                adea20d896d1565230e0799ac1e5e14719062ce0e00080c412222a98bddcadcb

                SHA512

                d13c80ea909a9f6ebedeaa8d4e73cfd01d3d8b465b02b1f5663f22ef189e9f0b5329b60fcb6c888334c370c69ca92dee1a9b5f0b0262377132e4a6822970e6f1

              • \??\c:\Users\Admin\AppData\Local\Temp\4uykyc0u\4uykyc0u.cmdline

                Filesize

                369B

                MD5

                a0186122e7f09b089dab62a6cd94284f

                SHA1

                ca35b912537bb78f10c00940470fb6a3820e1c3b

                SHA256

                a3dc5259e2b0d69eef5cf1b62872c78408d730718d83406b8c8869aafb98c32a

                SHA512

                27fdcd6388f3783ade52b4b7baa44806f0b879015dc9077f12417ee859e4225908619bb5f745842844158151836a181e1284edec7369bcb5b9bb409e5702486a

              • \??\c:\Users\Admin\AppData\Local\Temp\4uykyc0u\CSCEA8D1BDF4B648A8BD2F6FF766FE4.TMP

                Filesize

                652B

                MD5

                bf24b90ee44f9059efd228fffe5d52e4

                SHA1

                b3026998ff779fc6b26d77aa3f108b9ef0c04548

                SHA256

                78430cebcb3bde0e8ac943eb879f5573054458220beaa1094446ab1e33ec1f79

                SHA512

                7d69673c240f8fb8ed4ea22da1c28e6b476f9c0844f2ea4cd526c085c3b05cc8ff91c184a51ec908cc546a3ef64a4331a3a4cb4ddefa091058dae2dd8c0639b2

              • \??\c:\Users\Admin\AppData\Local\Temp\fjgvoe4s\CSCAE4EF84FFA9B4C358D32DB661588A8B.TMP

                Filesize

                652B

                MD5

                31401aa8925048f551d794341cce3037

                SHA1

                f508d87afb808d08a6a00d5a6e43d4e6098f1b16

                SHA256

                f91432d43b73473143b9dfac0378173f9d56e6e781868a0f67f45dcc430791f6

                SHA512

                7c93e97680e30d20715fa8dbc13d41ebadb0631e02891aadd8e64a53b2a00ca181e9ba372ab5cfbbc4ef32b26a45229b23405f583d2f79d6187112f3243c43cf

              • \??\c:\Users\Admin\AppData\Local\Temp\fjgvoe4s\fjgvoe4s.0.cs

                Filesize

                408B

                MD5

                0a5374e53f44ac8b609707a893f72b21

                SHA1

                83ec00746897bcacf4c5a049b7e090d057f62cf9

                SHA256

                0388c68b7b848cb08941edbfe4bcaa8f6df3c461df1c9a7542103e279f64c5f9

                SHA512

                ce62cb7723a6fcb5448c7c096c293a503662888f75f1a92ea8a9a15955e82ad6f7773829604633782f0e3e8d5bb07286bc281a94d2f99f0f57d4cea4e873cdd4

              • \??\c:\Users\Admin\AppData\Local\Temp\fjgvoe4s\fjgvoe4s.cmdline

                Filesize

                369B

                MD5

                7775c7913176c7c6c3c4a90dfde489c6

                SHA1

                c240bce756af9dd734e6f49a4d92cf94eb0ef738

                SHA256

                36836256e1df8b955d7a351660ad96d1851a6735f01ae8c3cddd862201ba2d7e

                SHA512

                37e06f382684a4ccbece65850dfbaf5d7adaef8eb4d5a29f77a01b8db1ac197a454601a7994506d61269f8466a257f255f3e21974361fd69e85c7d5004e2a4e4

              • memory/1012-162-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-200-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-161-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-243-0x0000000008160000-0x0000000008202000-memory.dmp

                Filesize

                648KB

              • memory/1012-163-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-164-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-165-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-166-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-167-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-168-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-169-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-170-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-171-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-172-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-173-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-174-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-175-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-176-0x0000000007B40000-0x0000000007B50000-memory.dmp

                Filesize

                64KB

              • memory/1012-177-0x0000000007B40000-0x0000000007B50000-memory.dmp

                Filesize

                64KB

              • memory/1012-178-0x0000000007B40000-0x0000000007B50000-memory.dmp

                Filesize

                64KB

              • memory/1012-179-0x0000000007B40000-0x0000000007B50000-memory.dmp

                Filesize

                64KB

              • memory/1012-159-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-236-0x0000000008160000-0x0000000008202000-memory.dmp

                Filesize

                648KB

              • memory/1012-208-0x0000000000670000-0x0000000000680000-memory.dmp

                Filesize

                64KB

              • memory/1012-207-0x0000000000670000-0x0000000000680000-memory.dmp

                Filesize

                64KB

              • memory/1012-184-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-185-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-186-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-187-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-188-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-189-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-190-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-191-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-192-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-193-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-194-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-195-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-196-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-197-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-198-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-199-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-160-0x0000000006F10000-0x0000000006F20000-memory.dmp

                Filesize

                64KB

              • memory/1012-201-0x0000000000660000-0x0000000000670000-memory.dmp

                Filesize

                64KB

              • memory/1012-202-0x0000000000670000-0x0000000000680000-memory.dmp

                Filesize

                64KB

              • memory/1012-203-0x0000000000670000-0x0000000000680000-memory.dmp

                Filesize

                64KB

              • memory/1012-204-0x0000000000670000-0x0000000000680000-memory.dmp

                Filesize

                64KB

              • memory/1012-205-0x0000000000660000-0x0000000000670000-memory.dmp

                Filesize

                64KB

              • memory/1012-206-0x0000000000670000-0x0000000000680000-memory.dmp

                Filesize

                64KB

              • memory/1552-237-0x0000015D4A500000-0x0000015D4A5A2000-memory.dmp

                Filesize

                648KB

              • memory/2372-241-0x0000000000676B20-0x0000000000676B24-memory.dmp

                Filesize

                4B

              • memory/2372-242-0x00000000012C0000-0x0000000001356000-memory.dmp

                Filesize

                600KB

              • memory/2884-157-0x0000000000B00000-0x0000000000B06000-memory.dmp

                Filesize

                24KB

              • memory/2884-145-0x0000000000B30000-0x0000000000B3D000-memory.dmp

                Filesize

                52KB

              • memory/2884-140-0x0000000000400000-0x0000000000495000-memory.dmp

                Filesize

                596KB

              • memory/2932-135-0x0000000000400000-0x000000000045E000-memory.dmp

                Filesize

                376KB

              • memory/2932-132-0x00000000005FD000-0x000000000060E000-memory.dmp

                Filesize

                68KB

              • memory/2932-134-0x0000000000400000-0x000000000045E000-memory.dmp

                Filesize

                376KB

              • memory/2932-133-0x00000000005B0000-0x00000000005B9000-memory.dmp

                Filesize

                36KB

              • memory/3140-240-0x0000028017FC0000-0x0000028018062000-memory.dmp

                Filesize

                648KB

              • memory/3416-234-0x00000166E4A70000-0x00000166E4B12000-memory.dmp

                Filesize

                648KB

              • memory/3696-235-0x000001731EDB0000-0x000001731EE52000-memory.dmp

                Filesize

                648KB

              • memory/4000-229-0x0000018C7F0F0000-0x0000018C7F12C000-memory.dmp

                Filesize

                240KB

              • memory/4000-231-0x00007FFD3DFA0000-0x00007FFD3EA61000-memory.dmp

                Filesize

                10.8MB

              • memory/4000-232-0x0000018C7F0F0000-0x0000018C7F12C000-memory.dmp

                Filesize

                240KB

              • memory/4000-213-0x0000018C7E390000-0x0000018C7E3B2000-memory.dmp

                Filesize

                136KB

              • memory/4000-214-0x00007FFD3DFA0000-0x00007FFD3EA61000-memory.dmp

                Filesize

                10.8MB

              • memory/4872-239-0x0000020B459D0000-0x0000020B45A72000-memory.dmp

                Filesize

                648KB