Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 09:56
Static task
static1
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20230831-en
General
-
Target
Client.exe
-
Size
181KB
-
MD5
e54d9f8d9757fe6eead98ab59bd59ffa
-
SHA1
60c8766682b968d9367f9099378f2c9f0ed07278
-
SHA256
64eee9187e295afcb6989200de6fef6ca563d48881784c38765e5cc590e55ad6
-
SHA512
b362675e7c21b0336ed5844ed453334bd93257ea6901fed5b532d06db54ad775c33c17c753414f34c8c9117ce38cc072a4b59deeb7add1ea76b63183948f511e
-
SSDEEP
3072:+gZW8+P3NtOTH8CG95Ja4tXybaVLbPkxAgaX6wwzCqIg9:+SWfPLOL85hlVfjRSIg9
Malware Config
Extracted
gozi
Extracted
gozi
5050
netsecurez.com
whofoxy.com
mimemoa.com
ntcgo.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
fotexion.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/432-0-0x0000000000C80000-0x0000000000C8C000-memory.dmp dave -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
Client.exepowershell.execontrol.exeExplorer.EXEdescription pid process target process PID 432 set thread context of 4116 432 Client.exe control.exe PID 4900 set thread context of 3144 4900 powershell.exe Explorer.EXE PID 4116 set thread context of 3144 4116 control.exe Explorer.EXE PID 3144 set thread context of 3656 3144 Explorer.EXE RuntimeBroker.exe PID 3144 set thread context of 3908 3144 Explorer.EXE RuntimeBroker.exe PID 3144 set thread context of 2112 3144 Explorer.EXE RuntimeBroker.exe PID 4116 set thread context of 3308 4116 control.exe rundll32.exe PID 3144 set thread context of 1064 3144 Explorer.EXE RuntimeBroker.exe PID 3144 set thread context of 4108 3144 Explorer.EXE cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
RuntimeBroker.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\013c76bb-c024-4aad- = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e7b48f53-39a4-429b- = dc3700385afcd901 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\30bc4d46-650f-4f22- = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3c3e477e-805f-44d9- = 1c1142395afcd901 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\45a366b0-67f9-4faf- RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\702aa88b-c24c-4553- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\013c76bb-c024-4aad- = "\\\\?\\Volume{6ADA6BFC-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\a81b36d9e8e2df21b0ad71fb4f1c0ee88658c75432b48db5c14fd0e27767bad4" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fc45b296-cc16-4938- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3c3e477e-805f-44d9- RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\38c137f8-5ac1-4d56- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\30bc4d46-650f-4f22- = "\\\\?\\Volume{6ADA6BFC-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\a81b36d9e8e2df21b0ad71fb4f1c0ee88658c75432b48db5c14fd0e27767bad4" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fc45b296-cc16-4938- = d0d4ee375afcd901 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\30bc4d46-650f-4f22- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d468aba9-7588-4dbd- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3795bab5-0c50-411c- = 0e0cb5395afcd901 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\2b5e18e2-76d6-4597- RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\30bc4d46-650f-4f22- RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bf276d87-f7a5-4f25- RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\38c137f8-5ac1-4d56- = 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 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d8626230-1f40-45cf- = "\\\\?\\Volume{6ADA6BFC-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\ec9e2f4d1945b186e33b090d0fdd0eb715b9ad87b9f94df1fbe070591a747868" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e78c7c7a-9a4b-4c72- = "0" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\38c137f8-5ac1-4d56- RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e78c7c7a-9a4b-4c72- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3c3e477e-805f-44d9- = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\45a366b0-67f9-4faf- = 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 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e7b48f53-39a4-429b- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e7b48f53-39a4-429b- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d468aba9-7588-4dbd- = 372e5b395afcd901 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d468aba9-7588-4dbd- = "\\\\?\\Volume{6ADA6BFC-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\ec9e2f4d1945b186e33b090d0fdd0eb715b9ad87b9f94df1fbe070591a747868" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3795bab5-0c50-411c- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3795bab5-0c50-411c- = "8324" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bf276d87-f7a5-4f25- = "0" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3c3e477e-805f-44d9- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3795bab5-0c50-411c- = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3795bab5-0c50-411c- = 0114020000000000c0000000000000464c0000000114020000000000c0000000000000468300000020000000f20651385afcd90149ab97395afcd90149ab97395afcd90173ff04000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad013200000000004b57ea7d2000343465386133376366376664336262343638633065303839396564613631653064346433663261333439353563363665666132666438316230326335396364640000b20009000400efbe4b57ea7d4b57ea7d2e000000000000000000000000000000000000000000000000000aa80200340034006500380061003300370063006600370066006400330062006200340036003800630030006500300038003900390065006400610036003100650030006400340064003300660032006100330034003900350035006300360036006500660061003200660064003800310062003000320063003500390063006400640000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea00000018000000030000001bd15cf31000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c34346538613337636637666433626234363863306530383939656461363165306434643366326133343935356336366566613266643831623032633539636464000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000006d647574706377610000000000000000b42f3bdbec912542a73a54e72c5db9856d56e2959353ee119784424ef1d7cb82b42f3bdbec912542a73a54e72c5db9856d56e2959353ee119784424ef1d7cb82ce000000090000a08900000031535053e28a5846bc4c3843bbfc139326986dce6d00000004000000001f0000002e00000053002d0031002d0035002d00320031002d0033003000320037003500350032003000370031002d003400340036003000350030003000320031002d0031003200350034003000370031003200310035002d0031003000300030000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d000000680000000048000000fc6bda6a000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fc45b296-cc16-4938- RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d656d545-e460-410d- RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\38c137f8-5ac1-4d56- = db8bc4375afcd901 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e78c7c7a-9a4b-4c72- = "\\\\?\\Volume{6ADA6BFC-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\6b183fa0dd6e7c25fca150f1bbc578a579373a2d3e97db43c7a2d0f6fd2efe80" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\45a366b0-67f9-4faf- = "8324" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03da94ec-f291-47ed- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d8626230-1f40-45cf- = "8324" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d8626230-1f40-45cf- = "0" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e78c7c7a-9a4b-4c72- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d468aba9-7588-4dbd- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\013c76bb-c024-4aad- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fc45b296-cc16-4938- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\3795bab5-0c50-411c- = "\\\\?\\Volume{6ADA6BFC-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\44e8a37cf7fd3bb468c0e0899eda61e0d4d3f2a34955c66efa2fd81b02c59cdd" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\013c76bb-c024-4aad- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\38c137f8-5ac1-4d56- = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d8626230-1f40-45cf- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fc45b296-cc16-4938- = "8324" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d468aba9-7588-4dbd- = "0" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d468aba9-7588-4dbd- RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\d8626230-1f40-45cf- RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fc45b296-cc16-4938- RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bf276d87-f7a5-4f25- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bf276d87-f7a5-4f25- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\bf276d87-f7a5-4f25- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\30bc4d46-650f-4f22- = e3a9d3385afcd901 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e78c7c7a-9a4b-4c72- = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\45a366b0-67f9-4faf- = "\\\\?\\Volume{6ADA6BFC-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\72610bd0e2a203e614400d4b3fecc4dbd7e7e3c5384a235504ab541cc7c786a3" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\38c137f8-5ac1-4d56- = "0" RuntimeBroker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Client.exepowershell.exeExplorer.EXEpid process 432 Client.exe 432 Client.exe 4900 powershell.exe 4900 powershell.exe 4900 powershell.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3144 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
Client.exepowershell.execontrol.exeExplorer.EXEpid process 432 Client.exe 4900 powershell.exe 4116 control.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 4116 control.exe 3144 Explorer.EXE 3144 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 4900 powershell.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3144 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3144 Explorer.EXE -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeClient.execontrol.exeExplorer.EXEdescription pid process target process PID 2224 wrote to memory of 4900 2224 mshta.exe powershell.exe PID 2224 wrote to memory of 4900 2224 mshta.exe powershell.exe PID 4900 wrote to memory of 412 4900 powershell.exe csc.exe PID 4900 wrote to memory of 412 4900 powershell.exe csc.exe PID 412 wrote to memory of 4076 412 csc.exe cvtres.exe PID 412 wrote to memory of 4076 412 csc.exe cvtres.exe PID 4900 wrote to memory of 2324 4900 powershell.exe csc.exe PID 4900 wrote to memory of 2324 4900 powershell.exe csc.exe PID 2324 wrote to memory of 2840 2324 csc.exe cvtres.exe PID 2324 wrote to memory of 2840 2324 csc.exe cvtres.exe PID 432 wrote to memory of 4116 432 Client.exe control.exe PID 432 wrote to memory of 4116 432 Client.exe control.exe PID 432 wrote to memory of 4116 432 Client.exe control.exe PID 432 wrote to memory of 4116 432 Client.exe control.exe PID 432 wrote to memory of 4116 432 Client.exe control.exe PID 4900 wrote to memory of 3144 4900 powershell.exe Explorer.EXE PID 4900 wrote to memory of 3144 4900 powershell.exe Explorer.EXE PID 4900 wrote to memory of 3144 4900 powershell.exe Explorer.EXE PID 4900 wrote to memory of 3144 4900 powershell.exe Explorer.EXE PID 4116 wrote to memory of 3144 4116 control.exe Explorer.EXE PID 4116 wrote to memory of 3144 4116 control.exe Explorer.EXE PID 4116 wrote to memory of 3144 4116 control.exe Explorer.EXE PID 4116 wrote to memory of 3144 4116 control.exe Explorer.EXE PID 3144 wrote to memory of 3656 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3656 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3656 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3656 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3908 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3908 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3908 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3908 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 2112 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 2112 3144 Explorer.EXE RuntimeBroker.exe PID 4116 wrote to memory of 3308 4116 control.exe rundll32.exe PID 4116 wrote to memory of 3308 4116 control.exe rundll32.exe PID 4116 wrote to memory of 3308 4116 control.exe rundll32.exe PID 3144 wrote to memory of 2112 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 2112 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 1064 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 1064 3144 Explorer.EXE RuntimeBroker.exe PID 4116 wrote to memory of 3308 4116 control.exe rundll32.exe PID 3144 wrote to memory of 1064 3144 Explorer.EXE RuntimeBroker.exe PID 4116 wrote to memory of 3308 4116 control.exe rundll32.exe PID 3144 wrote to memory of 1064 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 4108 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 4108 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 4108 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 4108 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 4108 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 4108 3144 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\control.exeC:\Windows\system32\control.exe -h3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h4⤵
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Bklg='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bklg).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F\\\MemoryMusic'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name rvgsdlfyg -value gp; new-alias -name edenxet -value iex; edenxet ([System.Text.Encoding]::ASCII.GetString((rvgsdlfyg "HKCU:Software\AppDataLow\Software\Microsoft\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F").LinkAbout))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hoi1u3ur\hoi1u3ur.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1325.tmp" "c:\Users\Admin\AppData\Local\Temp\hoi1u3ur\CSC1ED04C0686A84055ACDD37CC5A86EC65.TMP"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q5n5bij3\q5n5bij3.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES28D0.tmp" "c:\Users\Admin\AppData\Local\Temp\q5n5bij3\CSCC672AC686F164B3CA4478C2D381F253.TMP"5⤵
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES1325.tmpFilesize
1KB
MD542236e465c9e886e03ce54823fa7c90b
SHA1fc60bf1642a5bbc876ecdf1c038c9b8612733448
SHA2567c9c2e5820e090d06a6b47608602d7d18997c58181d32b9d0be3d761da3d3aee
SHA512a20f11aaf1ae2e4576a88c43f9320a2a772d36bb36d3cc87778285217b4bc5630ddda26d549b09a0f6a2b1872fec573001f6b73317605986eb2f4e199c28dbed
-
C:\Users\Admin\AppData\Local\Temp\RES28D0.tmpFilesize
1KB
MD50e4ce6dc97d3c34cd90a58b86efe2df2
SHA18648d9bfdb5fe808c93017bcb99d31de935e9ac2
SHA2562d7ad0be8afbd0a3a29287c29f4211361d0fc38804d0de2badd05ce9ce592ed1
SHA5123583eaa081237477f2d0e9c52fbd05ef23c4b8314995ec48be527eae3e65a022588537455585e11523c93dbb1e1b8a3858834ed985147276c0f016cf51bbfba2
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1m0d2voz.pgh.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\hoi1u3ur\hoi1u3ur.dllFilesize
3KB
MD5f866a2d0f45dc9c6b4c4b4b47579cc95
SHA1d16ee0ba8001722faad7feb4e62a28c81e6d29bf
SHA25640a4cc5e09b566cc80e95ff356ec87c431e59ed04e513d5b0c36e5f7e1ae9eca
SHA51202cc0c0678530a43e920f49e3673e152b388fe10e505075d2da48d934a69c7c33b7897887085256e4a8b82d8ed94c8c20f2a887638d80cf8ef48fab10f442515
-
C:\Users\Admin\AppData\Local\Temp\q5n5bij3\q5n5bij3.dllFilesize
3KB
MD5ec5bbed7f5c5a30ad4c2e1a51e7081be
SHA1cb8b838335099c3676c94840bef3b2d3f19d3340
SHA2561098e3fe26cd3f35fc217201add4a0cea523d0b72437fa181dae770c9e546861
SHA512b972c29c8988411c112c4aeb9df218a6f67a5242ab100448ecf7bd959b1918546d3c5930ee055ebcab1c4c02f36fb66622b60be5c4b2895250c87aa2904e6c1d
-
\??\c:\Users\Admin\AppData\Local\Temp\hoi1u3ur\CSC1ED04C0686A84055ACDD37CC5A86EC65.TMPFilesize
652B
MD59723ba2a28feec7bb681bef1838cfed5
SHA1a5f5f0b1ef059725e56f620eac69a3bd877900dc
SHA2565e2e099ba777784879614cf6bb21ac95a1cf51511ecd7af100d466fce3d1e526
SHA5126c12524e26fc5a10662986a4a774cc69c9af7a5b55b708b7ff94ff1aad171d67c101bd541fc222597e6048f17ca0ae86c08a7790e09846c3520e19689a4cec25
-
\??\c:\Users\Admin\AppData\Local\Temp\hoi1u3ur\hoi1u3ur.0.csFilesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
\??\c:\Users\Admin\AppData\Local\Temp\hoi1u3ur\hoi1u3ur.cmdlineFilesize
369B
MD541aec3f66f57eadda273a26a4dedec68
SHA182672c778a4a9c3c9e197c095a8827f5a4e67ba3
SHA256b691ff76f3d7ea16c139bc302228120107b075deec7a65a41d508d36f6a94f8f
SHA512a0b0dc5ac636d59c5becf281530e697ba47a48012a7887cf3fd1310055e2f92b7b6ec371915687d67d54a8f564ef2b792feede6c65a2b160bd4ab2e0e68dfd1e
-
\??\c:\Users\Admin\AppData\Local\Temp\q5n5bij3\CSCC672AC686F164B3CA4478C2D381F253.TMPFilesize
652B
MD5b90938957e989f300f5a7766cfd840e8
SHA18674eb639989cd5459dba86ac7eac5926062ca5c
SHA25691d63a23c76d99f6513c8abdf6fad454969578567d0a9316819759a7e70cbe1c
SHA5120678949352c73fb5aac1571586103ea54bf4cb15bc9d0911e9ad78ba644daf5e4e42ed5604f38d62e0a99ca794d29e1d3465e266b5e6a2b24c2ebafd3c478e0a
-
\??\c:\Users\Admin\AppData\Local\Temp\q5n5bij3\q5n5bij3.0.csFilesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
\??\c:\Users\Admin\AppData\Local\Temp\q5n5bij3\q5n5bij3.cmdlineFilesize
369B
MD531dce7e6ce9ccecaa4eb67dba3e2ae7b
SHA1836afb49070ed6dbf812d42c7730678d281b2cfc
SHA2560144ee3597e4912de2f2c5c5c18f2bc26afdd0360af47e956c7bb86f4d230111
SHA512b010ee43ad1133010781d5bd85ed57dea2a9222a08c1a97809a512bd44a9d81bdbc4adf166cc57757cb8c5275b4e3f4587789b2405d99874c24c27e6b5a35b8e
-
memory/432-5-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/432-1-0x0000000000C90000-0x0000000000C9F000-memory.dmpFilesize
60KB
-
memory/432-11-0x0000000000D10000-0x0000000000D1D000-memory.dmpFilesize
52KB
-
memory/432-0-0x0000000000C80000-0x0000000000C8C000-memory.dmpFilesize
48KB
-
memory/432-14-0x0000000000B50000-0x0000000000B63000-memory.dmpFilesize
76KB
-
memory/1064-113-0x000001BC78340000-0x000001BC783E4000-memory.dmpFilesize
656KB
-
memory/1064-135-0x000001BC78340000-0x000001BC783E4000-memory.dmpFilesize
656KB
-
memory/1064-118-0x000001BC77FD0000-0x000001BC77FD1000-memory.dmpFilesize
4KB
-
memory/2112-105-0x0000022572D70000-0x0000022572D71000-memory.dmpFilesize
4KB
-
memory/2112-104-0x00000225734C0000-0x0000022573564000-memory.dmpFilesize
656KB
-
memory/2112-134-0x00000225734C0000-0x0000022573564000-memory.dmpFilesize
656KB
-
memory/3144-72-0x00000000094B0000-0x0000000009554000-memory.dmpFilesize
656KB
-
memory/3144-73-0x00000000010E0000-0x00000000010E1000-memory.dmpFilesize
4KB
-
memory/3144-125-0x0000000009560000-0x0000000009604000-memory.dmpFilesize
656KB
-
memory/3144-81-0x00000000010F0000-0x00000000010F1000-memory.dmpFilesize
4KB
-
memory/3144-112-0x00000000094B0000-0x0000000009554000-memory.dmpFilesize
656KB
-
memory/3144-78-0x0000000009560000-0x0000000009604000-memory.dmpFilesize
656KB
-
memory/3308-115-0x00000147B9CF0000-0x00000147B9CF1000-memory.dmpFilesize
4KB
-
memory/3308-123-0x00000147B9C40000-0x00000147B9CE4000-memory.dmpFilesize
656KB
-
memory/3308-110-0x00000147B9C40000-0x00000147B9CE4000-memory.dmpFilesize
656KB
-
memory/3656-132-0x000001F3BB500000-0x000001F3BB5A4000-memory.dmpFilesize
656KB
-
memory/3656-91-0x000001F3BB500000-0x000001F3BB5A4000-memory.dmpFilesize
656KB
-
memory/3656-92-0x000001F3BB130000-0x000001F3BB131000-memory.dmpFilesize
4KB
-
memory/3908-99-0x000001BFFF790000-0x000001BFFF791000-memory.dmpFilesize
4KB
-
memory/3908-133-0x000001BFFF7D0000-0x000001BFFF874000-memory.dmpFilesize
656KB
-
memory/3908-98-0x000001BFFF7D0000-0x000001BFFF874000-memory.dmpFilesize
656KB
-
memory/4108-130-0x0000000000B70000-0x0000000000C08000-memory.dmpFilesize
608KB
-
memory/4108-127-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB
-
memory/4108-126-0x0000000000B70000-0x0000000000C08000-memory.dmpFilesize
608KB
-
memory/4116-66-0x0000000000110000-0x00000000001B4000-memory.dmpFilesize
656KB
-
memory/4116-67-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/4116-95-0x0000000000110000-0x00000000001B4000-memory.dmpFilesize
656KB
-
memory/4116-124-0x0000000000110000-0x00000000001B4000-memory.dmpFilesize
656KB
-
memory/4900-39-0x000001A8000F0000-0x000001A800100000-memory.dmpFilesize
64KB
-
memory/4900-37-0x000001A8000F0000-0x000001A800100000-memory.dmpFilesize
64KB
-
memory/4900-62-0x000001A818910000-0x000001A818918000-memory.dmpFilesize
32KB
-
memory/4900-48-0x000001A8188F0000-0x000001A8188F8000-memory.dmpFilesize
32KB
-
memory/4900-85-0x000001A818920000-0x000001A81895D000-memory.dmpFilesize
244KB
-
memory/4900-90-0x00007FFA59860000-0x00007FFA5A321000-memory.dmpFilesize
10.8MB
-
memory/4900-38-0x000001A8000F0000-0x000001A800100000-memory.dmpFilesize
64KB
-
memory/4900-64-0x000001A818920000-0x000001A81895D000-memory.dmpFilesize
244KB
-
memory/4900-36-0x00007FFA59860000-0x00007FFA5A321000-memory.dmpFilesize
10.8MB
-
memory/4900-29-0x000001A8000F0000-0x000001A800100000-memory.dmpFilesize
64KB
-
memory/4900-27-0x000001A8000F0000-0x000001A800100000-memory.dmpFilesize
64KB
-
memory/4900-28-0x000001A8000F0000-0x000001A800100000-memory.dmpFilesize
64KB
-
memory/4900-26-0x00007FFA59860000-0x00007FFA5A321000-memory.dmpFilesize
10.8MB
-
memory/4900-25-0x000001A87F610000-0x000001A87F632000-memory.dmpFilesize
136KB