Analysis
-
max time kernel
124s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
03-05-2021 13:38
Behavioral task
behavioral1
Sample
PicturesViewer.exe
Resource
win7v20210410
General
-
Target
PicturesViewer.exe
-
Size
673KB
-
MD5
c8f1fdd8dd3724f89cef6d9ea9ec85fd
-
SHA1
30d5e006337e17b512ff5ed878cc1beb1664abb0
-
SHA256
7ceaaa2ae96ba6400a09c96ae63a472a6b54535833a8eb5a9bba1afa7645c571
-
SHA512
0dce8b7705707318f8c227e9a9fcf363884b20374c05f233217042f1272ca0921ea637ca435de56f618463cf00cd234cc006de47ac62112047425add28ea1a73
Malware Config
Extracted
qakbot
324.141
spx125
1590138228
190.75.168.108:2078
93.114.192.211:2222
47.39.76.74:443
182.56.134.44:995
24.201.79.208:2078
207.246.71.122:443
50.244.112.10:443
88.207.27.144:443
72.204.242.138:443
72.204.242.138:2078
72.204.242.138:990
76.187.8.160:443
220.135.31.140:2222
86.126.97.183:2222
86.126.112.153:995
68.49.120.179:443
101.108.125.44:443
203.101.163.187:443
197.165.212.10:443
207.255.161.8:2078
207.255.161.8:995
98.243.187.85:443
207.255.161.8:32103
108.227.161.27:995
189.140.112.184:443
172.78.87.180:443
71.205.158.156:443
72.28.255.159:995
68.39.177.147:995
73.94.229.115:443
108.58.9.238:995
1.40.42.4:443
74.33.69.208:443
66.222.88.126:995
72.204.242.138:53
24.99.180.247:443
47.152.210.233:443
24.10.42.174:443
140.82.21.191:443
72.190.101.70:443
78.188.109.130:443
211.24.72.253:443
70.124.29.226:443
71.241.247.189:443
216.201.162.158:443
24.43.22.220:993
46.214.139.81:443
49.191.9.180:995
75.183.135.48:443
47.153.115.154:995
50.247.230.33:995
70.183.127.6:995
76.170.77.99:443
188.26.98.35:443
66.68.22.151:443
137.99.224.198:443
75.81.25.223:443
97.127.144.203:2222
76.111.128.194:443
50.78.93.74:443
171.97.10.201:2222
72.204.242.138:50003
67.170.137.8:443
24.122.228.88:443
72.186.1.237:443
189.159.148.145:995
203.106.195.139:443
100.12.173.247:995
98.121.187.78:443
79.78.131.124:443
98.116.62.242:443
89.137.215.100:443
173.245.152.231:443
68.204.164.222:443
217.162.149.212:443
95.77.223.168:443
72.132.249.144:995
79.114.196.138:443
85.122.141.42:443
188.173.70.18:443
117.217.231.113:443
47.202.98.230:443
80.14.209.42:2222
103.76.160.110:443
210.195.177.30:443
24.226.137.154:443
50.244.112.106:443
172.242.156.50:443
5.107.239.212:2222
81.133.234.36:2222
79.116.237.126:443
77.237.188.30:995
5.12.214.109:2222
174.130.225.61:443
102.41.118.44:995
197.50.133.40:443
84.117.176.32:443
24.202.42.48:2222
98.32.60.217:443
72.16.212.108:465
67.250.184.157:443
85.186.50.42:443
98.16.204.189:995
154.56.64.21:443
99.196.208.15:443
72.204.242.138:995
72.29.181.77:2078
72.240.245.253:443
96.56.237.174:990
47.40.244.237:443
100.4.173.223:443
71.213.29.14:995
65.100.244.179:2083
173.90.33.182:2222
104.36.135.227:443
173.175.29.210:443
102.190.246.65:6881
68.4.137.211:443
61.3.126.96:443
188.25.233.157:2222
82.79.67.68:443
73.163.242.114:443
100.38.123.22:443
96.18.240.158:443
71.8.33.238:443
5.182.39.156:443
199.116.241.147:443
94.10.81.239:443
104.221.4.11:2222
184.180.157.203:2222
82.210.157.185:443
65.60.228.130:443
96.56.237.174:465
72.204.242.138:50001
67.165.206.193:995
75.87.161.32:995
64.19.74.29:995
72.204.242.138:32102
187.155.67.97:443
68.174.15.223:443
176.223.114.184:443
197.210.96.222:995
71.77.252.14:2222
46.214.62.199:443
71.185.60.227:443
68.207.50.2:443
108.27.217.44:443
74.134.46.7:443
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe cryptone -
Executes dropped EXE 4 IoCs
Processes:
exotku.exeexotku.exeexotku.exeexotku.exepid process 3076 exotku.exe 3168 exotku.exe 1660 exotku.exe 1308 exotku.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
PicturesViewer.exeexotku.exeexotku.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc PicturesViewer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service exotku.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service exotku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 PicturesViewer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc PicturesViewer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc exotku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 exotku.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc exotku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 exotku.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc exotku.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service exotku.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service PicturesViewer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 exotku.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc exotku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 exotku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 PicturesViewer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service PicturesViewer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service exotku.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 5 IoCs
Processes:
PicturesViewer.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PicturesViewer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PicturesViewer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PicturesViewer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PicturesViewer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PicturesViewer.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
PicturesViewer.exePicturesViewer.exeexotku.exeexotku.exeexplorer.exePicturesViewer.exeexotku.exeexotku.exepid process 3232 PicturesViewer.exe 3232 PicturesViewer.exe 1948 PicturesViewer.exe 1948 PicturesViewer.exe 1948 PicturesViewer.exe 1948 PicturesViewer.exe 3076 exotku.exe 3076 exotku.exe 3168 exotku.exe 3168 exotku.exe 3168 exotku.exe 3168 exotku.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 1644 PicturesViewer.exe 1644 PicturesViewer.exe 1660 exotku.exe 1660 exotku.exe 1308 exotku.exe 1308 exotku.exe 1308 exotku.exe 1308 exotku.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
exotku.exepid process 3076 exotku.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
PicturesViewer.exeexotku.exePicturesViewer.execmd.exeexotku.exedescription pid process target process PID 3232 wrote to memory of 1948 3232 PicturesViewer.exe PicturesViewer.exe PID 3232 wrote to memory of 1948 3232 PicturesViewer.exe PicturesViewer.exe PID 3232 wrote to memory of 1948 3232 PicturesViewer.exe PicturesViewer.exe PID 3232 wrote to memory of 3076 3232 PicturesViewer.exe exotku.exe PID 3232 wrote to memory of 3076 3232 PicturesViewer.exe exotku.exe PID 3232 wrote to memory of 3076 3232 PicturesViewer.exe exotku.exe PID 3232 wrote to memory of 3360 3232 PicturesViewer.exe schtasks.exe PID 3232 wrote to memory of 3360 3232 PicturesViewer.exe schtasks.exe PID 3232 wrote to memory of 3360 3232 PicturesViewer.exe schtasks.exe PID 3076 wrote to memory of 3168 3076 exotku.exe exotku.exe PID 3076 wrote to memory of 3168 3076 exotku.exe exotku.exe PID 3076 wrote to memory of 3168 3076 exotku.exe exotku.exe PID 3076 wrote to memory of 2120 3076 exotku.exe explorer.exe PID 3076 wrote to memory of 2120 3076 exotku.exe explorer.exe PID 3076 wrote to memory of 2120 3076 exotku.exe explorer.exe PID 3076 wrote to memory of 2120 3076 exotku.exe explorer.exe PID 1644 wrote to memory of 520 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 520 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 660 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 660 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3356 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3356 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 4048 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 4048 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3740 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3740 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 4052 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 4052 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3652 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3652 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3724 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 3724 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 1536 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 1536 1644 PicturesViewer.exe reg.exe PID 1644 wrote to memory of 1660 1644 PicturesViewer.exe exotku.exe PID 1644 wrote to memory of 1660 1644 PicturesViewer.exe exotku.exe PID 1644 wrote to memory of 1660 1644 PicturesViewer.exe exotku.exe PID 1644 wrote to memory of 528 1644 PicturesViewer.exe cmd.exe PID 1644 wrote to memory of 528 1644 PicturesViewer.exe cmd.exe PID 1644 wrote to memory of 2116 1644 PicturesViewer.exe schtasks.exe PID 1644 wrote to memory of 2116 1644 PicturesViewer.exe schtasks.exe PID 528 wrote to memory of 1896 528 cmd.exe PING.EXE PID 528 wrote to memory of 1896 528 cmd.exe PING.EXE PID 1660 wrote to memory of 1308 1660 exotku.exe exotku.exe PID 1660 wrote to memory of 1308 1660 exotku.exe exotku.exe PID 1660 wrote to memory of 1308 1660 exotku.exe exotku.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe"C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn iuwxvar /tr "\"C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe\" /I iuwxvar" /SC ONCE /Z /ST 13:37 /ET 13:492⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exeC:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe /I iuwxvar1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf" /d "0"2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeC:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\PicturesViewer.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /DELETE /F /TN iuwxvar2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.datMD5
98a8418a19660b653ab680fa8a107272
SHA16586979617db1361927dab714d529491965794af
SHA256e88814ad9f37728260899df261e4deb7b0e66f6615efdee845e6d6e4c4261e07
SHA5120192744b423bc00a86bb5083955ba368ccdd390dadcd935ec57384385dfe1ff6bdcd4dbba35c587050b5d147c67120a2ce18ded704fb6a56400812c817a41f0e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeMD5
c8f1fdd8dd3724f89cef6d9ea9ec85fd
SHA130d5e006337e17b512ff5ed878cc1beb1664abb0
SHA2567ceaaa2ae96ba6400a09c96ae63a472a6b54535833a8eb5a9bba1afa7645c571
SHA5120dce8b7705707318f8c227e9a9fcf363884b20374c05f233217042f1272ca0921ea637ca435de56f618463cf00cd234cc006de47ac62112047425add28ea1a73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeMD5
c8f1fdd8dd3724f89cef6d9ea9ec85fd
SHA130d5e006337e17b512ff5ed878cc1beb1664abb0
SHA2567ceaaa2ae96ba6400a09c96ae63a472a6b54535833a8eb5a9bba1afa7645c571
SHA5120dce8b7705707318f8c227e9a9fcf363884b20374c05f233217042f1272ca0921ea637ca435de56f618463cf00cd234cc006de47ac62112047425add28ea1a73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeMD5
c8f1fdd8dd3724f89cef6d9ea9ec85fd
SHA130d5e006337e17b512ff5ed878cc1beb1664abb0
SHA2567ceaaa2ae96ba6400a09c96ae63a472a6b54535833a8eb5a9bba1afa7645c571
SHA5120dce8b7705707318f8c227e9a9fcf363884b20374c05f233217042f1272ca0921ea637ca435de56f618463cf00cd234cc006de47ac62112047425add28ea1a73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeMD5
c8f1fdd8dd3724f89cef6d9ea9ec85fd
SHA130d5e006337e17b512ff5ed878cc1beb1664abb0
SHA2567ceaaa2ae96ba6400a09c96ae63a472a6b54535833a8eb5a9bba1afa7645c571
SHA5120dce8b7705707318f8c227e9a9fcf363884b20374c05f233217042f1272ca0921ea637ca435de56f618463cf00cd234cc006de47ac62112047425add28ea1a73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Wluynlwlgf\exotku.exeMD5
c8f1fdd8dd3724f89cef6d9ea9ec85fd
SHA130d5e006337e17b512ff5ed878cc1beb1664abb0
SHA2567ceaaa2ae96ba6400a09c96ae63a472a6b54535833a8eb5a9bba1afa7645c571
SHA5120dce8b7705707318f8c227e9a9fcf363884b20374c05f233217042f1272ca0921ea637ca435de56f618463cf00cd234cc006de47ac62112047425add28ea1a73
-
memory/520-135-0x0000000000000000-mapping.dmp
-
memory/528-146-0x0000000000000000-mapping.dmp
-
memory/660-136-0x0000000000000000-mapping.dmp
-
memory/1308-151-0x0000000000000000-mapping.dmp
-
memory/1308-154-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/1536-143-0x0000000000000000-mapping.dmp
-
memory/1644-134-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/1660-149-0x00000000004B0000-0x00000000005FA000-memory.dmpFilesize
1.3MB
-
memory/1660-150-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/1660-144-0x0000000000000000-mapping.dmp
-
memory/1896-148-0x0000000000000000-mapping.dmp
-
memory/1948-116-0x0000000000000000-mapping.dmp
-
memory/1948-118-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/1948-117-0x00000000020A0000-0x00000000020D7000-memory.dmpFilesize
220KB
-
memory/2116-147-0x0000000000000000-mapping.dmp
-
memory/2120-129-0x0000000000000000-mapping.dmp
-
memory/2120-130-0x0000000003270000-0x00000000032AA000-memory.dmpFilesize
232KB
-
memory/2120-131-0x0000000004E30000-0x0000000004E62000-memory.dmpFilesize
200KB
-
memory/3076-123-0x00000000004B0000-0x000000000055E000-memory.dmpFilesize
696KB
-
memory/3076-124-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/3076-119-0x0000000000000000-mapping.dmp
-
memory/3168-128-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/3168-127-0x00000000004B0000-0x00000000005FA000-memory.dmpFilesize
1.3MB
-
memory/3168-125-0x0000000000000000-mapping.dmp
-
memory/3232-114-0x00000000004B0000-0x00000000005FA000-memory.dmpFilesize
1.3MB
-
memory/3232-115-0x0000000000400000-0x00000000004AB000-memory.dmpFilesize
684KB
-
memory/3356-137-0x0000000000000000-mapping.dmp
-
memory/3360-122-0x0000000000000000-mapping.dmp
-
memory/3652-141-0x0000000000000000-mapping.dmp
-
memory/3724-142-0x0000000000000000-mapping.dmp
-
memory/3740-139-0x0000000000000000-mapping.dmp
-
memory/4048-138-0x0000000000000000-mapping.dmp
-
memory/4052-140-0x0000000000000000-mapping.dmp