Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
28-07-2021 05:20
Static task
static1
Behavioral task
behavioral1
Sample
direct.ps1
Resource
win7v20210408
General
-
Target
direct.ps1
-
Size
264B
-
MD5
bc63701022e39b52b73a21448e6b5973
-
SHA1
0195f5f6163eddc5676e357b8e76aa2fa5bf013e
-
SHA256
38cd03b944e9368f595347945a7a3a3fd657601578fbd74f5954875f0db15644
-
SHA512
529d35828dfd0b8b5c380b8d11cf91c1e55d4f55c274929372ff210352519d4b0792fbe67f453d3296e2d38a1e2cdf4070d85028034556d5009d943957884f3c
Malware Config
Extracted
gozi_ifsb
7410
signin.microsoft.com
alliances.bar
allianceline.bar
alliancer.bar
-
build
250206
-
dns_servers
107.174.86.134
107.175.127.22
-
exe_type
loader
-
server_id
12
Signatures
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exerundll32.exeflow pid process 8 3968 powershell.exe 50 3980 rundll32.exe 51 3980 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3980 rundll32.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80595fe07083d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3753721396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30901104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e072f2ec0e258e4d990d6581876b6b19000000000200000000001066000000010000200000001f671fb06faaca8615ab3162b54a1312fa1d500521d66bd507d2d6104c809934000000000e8000000002000020000000a333b62385ad39ef244e793c0ed23745c4b85f8a1e8c753245fa91a41161dfc12000000051fb367f79e18fc008bb89823061a89461d6d5fd755c48fd62cd29e5a69e976240000000f407906b19d060ec0b6d342f7fa5798c7725fe757065411fe15b082b1b66baccd57ef085e6bfdb9bbdc18aef9127ada15aaefc55a9e2795f8f180945af44f082 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c030edf47083d701 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bdbae77083d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31C59E44-EF64-11EB-A11C-56F1F4F21F1A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e072f2ec0e258e4d990d6581876b6b1900000000020000000000106600000001000020000000b3d9cf5962eb0ec28aa2cddd76b00d1e3c421020294344a85d60b91e0bd6b252000000000e80000000020000200000002f9623247c7a3032a96327037e32f384c086f9c177abac2dc17c0f497962e259200000002a785ed01dd68698f477d5096ad9001564e2f4095b9c569d7bfd1d6d65591f2240000000ce50f7cf8448afdcb7eedddcb2aa3c6539174aba2cd6a3fb043b071536c912cfd4e175657573c37fe2ba56c2e862b302ef1eb60a141962c73e404ac8d3f3a82e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e072f2ec0e258e4d990d6581876b6b190000000002000000000010660000000100002000000051fb8e7c54c11579085f70c7291b919974d002c623c07ab1d2ac1140bfe8487b000000000e8000000002000020000000ef9e5d0c372b972483354c7df7a670104abd4f6a43448459335ca1a1ce1d3bcb20000000cecd8b47041e5b5073635d2c8d26d8a7c5d5c82249c6cd7cdf81a26d1637631e40000000a4937a25da790f6d9f27869646dccc92ddaf28a9d17e6d95745a5f76ebe025b2c280ddad690d29c796b06fbe0f64bc0a558da839e24a6aca492c4fb229000808 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e072f2ec0e258e4d990d6581876b6b190000000002000000000010660000000100002000000037e59d2d1fb5ba6345a3fa0f066bbf57ca097883d3d9633086bf6187484a19b8000000000e800000000200002000000002df9a77b32754403e3edfbcf10be22ef6055f78a1aa29cc6ed273fff7e4a89e200000000b3b410f1f6e7c94516bf79797f504cd414d0520350bec3783f00be595b6991a40000000ef67fd4d810b1fd187afdbdcb3ee4d911771c974dc490451cfc57fad6a1d07693187eb7a8431ac0b491a64f5778d86036ec1ae5bc590bd86aad8bfcd7fb2bae1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0904ee07083d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3753721396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e072f2ec0e258e4d990d6581876b6b1900000000020000000000106600000001000020000000dd874e88c20ba60920328ebfc72c04bcfe9aa60cecca6fc1f946483ee68495df000000000e80000000020000200000003a3a8d3d9ea5de14468a142d624ef5bd79b5dbf3de416f367b9aaf4262ecabee2000000085b1dd2e8fef8b8e88c6f3fca627b0ca088caf6a5a3ebcdc6902f5ae8b2c7240400000000ee93d09a5134e1c21367654942b9ac43e5126269852588de2cd2f258a2b8351f51dd7c5ec0aec603cab8b71eae4a3764456564a2ff4599c0b3a473ad03a0f72 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EF80265-EF64-11EB-A11C-56F1F4F21F1A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30901104" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24448C38-EF64-11EB-A11C-56F1F4F21F1A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 3968 powershell.exe 3968 powershell.exe 3968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3968 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 4048 iexplore.exe 856 iexplore.exe 3872 iexplore.exe 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 4048 iexplore.exe 4048 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 856 iexplore.exe 856 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 3872 iexplore.exe 3872 iexplore.exe 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE 2224 iexplore.exe 2224 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
powershell.exerundll32.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 3968 wrote to memory of 3808 3968 powershell.exe rundll32.exe PID 3968 wrote to memory of 3808 3968 powershell.exe rundll32.exe PID 3808 wrote to memory of 3980 3808 rundll32.exe rundll32.exe PID 3808 wrote to memory of 3980 3808 rundll32.exe rundll32.exe PID 3808 wrote to memory of 3980 3808 rundll32.exe rundll32.exe PID 4048 wrote to memory of 2408 4048 iexplore.exe IEXPLORE.EXE PID 4048 wrote to memory of 2408 4048 iexplore.exe IEXPLORE.EXE PID 4048 wrote to memory of 2408 4048 iexplore.exe IEXPLORE.EXE PID 856 wrote to memory of 2596 856 iexplore.exe IEXPLORE.EXE PID 856 wrote to memory of 2596 856 iexplore.exe IEXPLORE.EXE PID 856 wrote to memory of 2596 856 iexplore.exe IEXPLORE.EXE PID 3872 wrote to memory of 3344 3872 iexplore.exe IEXPLORE.EXE PID 3872 wrote to memory of 3344 3872 iexplore.exe IEXPLORE.EXE PID 3872 wrote to memory of 3344 3872 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 2064 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 2064 2224 iexplore.exe IEXPLORE.EXE PID 2224 wrote to memory of 2064 2224 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\direct.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\KkV.bin,DllRegisterServer2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\KkV.bin,DllRegisterServer3⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4048 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3872 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\KkV.binMD5
499200f6a8e223c057c6e16701740721
SHA1ef46f9c62b94715b750173074c51100285ff6fe9
SHA256d7e64f8e65ce586ce2f0a857810b2a23f85140bf5e52e5a824f09787fb2bf45e
SHA512b32e3c480c7533d6fa745b3d22bf7d7bed1d0f52452b77c8232560e3d3e8979db53e0e45eb47e81757b6f20cfa01b20c55d5e63f423d89666ee74e6c9988a511
-
\Users\Admin\AppData\Local\Temp\KkV.binMD5
499200f6a8e223c057c6e16701740721
SHA1ef46f9c62b94715b750173074c51100285ff6fe9
SHA256d7e64f8e65ce586ce2f0a857810b2a23f85140bf5e52e5a824f09787fb2bf45e
SHA512b32e3c480c7533d6fa745b3d22bf7d7bed1d0f52452b77c8232560e3d3e8979db53e0e45eb47e81757b6f20cfa01b20c55d5e63f423d89666ee74e6c9988a511
-
memory/856-139-0x00007FFDD61F0000-0x00007FFDD625B000-memory.dmpFilesize
428KB
-
memory/2064-144-0x0000000000000000-mapping.dmp
-
memory/2224-143-0x00007FFDD61F0000-0x00007FFDD625B000-memory.dmpFilesize
428KB
-
memory/2408-138-0x0000000000000000-mapping.dmp
-
memory/2596-140-0x0000000000000000-mapping.dmp
-
memory/3344-142-0x0000000000000000-mapping.dmp
-
memory/3808-129-0x0000000000000000-mapping.dmp
-
memory/3872-141-0x00007FFDD61F0000-0x00007FFDD625B000-memory.dmpFilesize
428KB
-
memory/3968-118-0x0000012E6FEF0000-0x0000012E6FEF2000-memory.dmpFilesize
8KB
-
memory/3968-124-0x0000012E70230000-0x0000012E70231000-memory.dmpFilesize
4KB
-
memory/3968-133-0x0000012E6FEF6000-0x0000012E6FEF8000-memory.dmpFilesize
8KB
-
memory/3968-120-0x0000012E6FE00000-0x0000012E6FE01000-memory.dmpFilesize
4KB
-
memory/3968-119-0x0000012E6FEF3000-0x0000012E6FEF5000-memory.dmpFilesize
8KB
-
memory/3980-132-0x0000000000000000-mapping.dmp
-
memory/3980-136-0x0000000010000000-0x0000000010090000-memory.dmpFilesize
576KB
-
memory/3980-135-0x0000000000A50000-0x0000000000A51000-memory.dmpFilesize
4KB
-
memory/4048-137-0x00007FFDD5A40000-0x00007FFDD5AAB000-memory.dmpFilesize
428KB