Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    24-01-2022 17:26

General

  • Target

    ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186.exe

  • Size

    263KB

  • MD5

    5f8d526cc16823160c06593405a3b393

  • SHA1

    64b97251781b811078236469b999e61bde4563d0

  • SHA256

    ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186

  • SHA512

    ba5690e0b0288e9ca2d647a68f6927717ae77298e3037474386e2bbf3d0ea64c5f6be26bca4e9d995751291964ef8f5b6cea058b7c432dd7782890e91494f295

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://abpa.at/upload/

http://emaratghajari.com/upload/

http://d7qw.cn/upload/

http://alumik-group.ru/upload/

http://zamkikurgan.ru/upload/

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

systembc

C2

5.39.221.47:4001

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 7 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

    suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 2 IoCs
  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:2884
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:3848
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:404
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:2964
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:2816
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:2712
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 2712 -s 980
                  2⤵
                  • Program crash
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  PID:3236
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
                1⤵
                  PID:2512
                • C:\Windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  1⤵
                    PID:2284
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                    1⤵
                      PID:2248
                    • C:\Windows\system32\sihost.exe
                      sihost.exe
                      1⤵
                        PID:2216
                      • C:\Users\Admin\AppData\Local\Temp\ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186.exe
                        "C:\Users\Admin\AppData\Local\Temp\ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186.exe"
                        1⤵
                        • Checks SCSI registry key(s)
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        PID:772
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:2896
                        • C:\Windows\System32\WaaSMedicAgent.exe
                          C:\Windows\System32\WaaSMedicAgent.exe 291ded432813b106132338050d83d2ae YgVdqpoXwUiqHaJ9UTdVaQ.0.1.0.0.0
                          1⤵
                          • Modifies data under HKEY_USERS
                          PID:216
                        • C:\Users\Admin\AppData\Local\Temp\27C4.exe
                          C:\Users\Admin\AppData\Local\Temp\27C4.exe
                          1⤵
                          • Executes dropped EXE
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: MapViewOfSection
                          PID:816
                        • C:\Users\Admin\AppData\Local\Temp\623E.exe
                          C:\Users\Admin\AppData\Local\Temp\623E.exe
                          1⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          PID:1180
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1044
                            2⤵
                            • Program crash
                            PID:820
                        • C:\Users\Admin\AppData\Local\Temp\623E.exe
                          C:\Users\Admin\AppData\Local\Temp\623E.exe start
                          1⤵
                          • Executes dropped EXE
                          PID:1784
                        • C:\Windows\system32\cmd.exe
                          cmd
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3456
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2904
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3896
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
                            2⤵
                              PID:2912
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
                              2⤵
                                PID:204
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
                                2⤵
                                  PID:220
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
                                  2⤵
                                    PID:3152
                                  • C:\Windows\System32\Wbem\WMIC.exe
                                    wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
                                    2⤵
                                      PID:3652
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                                      2⤵
                                        PID:2592
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                                        2⤵
                                          PID:2492
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                                          2⤵
                                            PID:924
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                                            2⤵
                                              PID:3328
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                                              2⤵
                                                PID:532
                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                                                2⤵
                                                  PID:3524
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                                                  2⤵
                                                    PID:3312
                                                • C:\Windows\system32\msiexec.exe
                                                  C:\Windows\system32\msiexec.exe /V
                                                  1⤵
                                                    PID:1424
                                                  • C:\Users\Admin\AppData\Roaming\wsddduj
                                                    C:\Users\Admin\AppData\Roaming\wsddduj
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:3808
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 344
                                                      2⤵
                                                      • Program crash
                                                      • Checks processor information in registry
                                                      • Enumerates system info in registry
                                                      PID:1464
                                                  • C:\Users\Admin\AppData\Roaming\urddduj
                                                    C:\Users\Admin\AppData\Roaming\urddduj
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Checks SCSI registry key(s)
                                                    • Suspicious behavior: MapViewOfSection
                                                    PID:3348
                                                  • C:\Windows\system32\rundll32.exe
                                                    C:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask
                                                    1⤵
                                                      PID:3144
                                                    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                                                      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                                                      1⤵
                                                        PID:876
                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                        1⤵
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SetWindowsHookEx
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2872
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:17410 /prefetch:2
                                                          2⤵
                                                          • Modifies Internet Explorer settings
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:3248
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k wusvcs -p
                                                        1⤵
                                                          PID:1688
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3808 -ip 3808
                                                          1⤵
                                                          • Suspicious use of NtCreateProcessExOtherParentProcess
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2260
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
                                                          1⤵
                                                            PID:3216
                                                          • C:\Windows\SysWOW64\explorer.exe
                                                            C:\Windows\SysWOW64\explorer.exe
                                                            1⤵
                                                              PID:3580
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 868
                                                                2⤵
                                                                • Program crash
                                                                • Checks processor information in registry
                                                                • Enumerates system info in registry
                                                                PID:1044
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3580 -ip 3580
                                                              1⤵
                                                              • Suspicious use of NtCreateProcessExOtherParentProcess
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:3280
                                                            • C:\Windows\explorer.exe
                                                              C:\Windows\explorer.exe
                                                              1⤵
                                                                PID:3608
                                                              • C:\Windows\SysWOW64\explorer.exe
                                                                C:\Windows\SysWOW64\explorer.exe
                                                                1⤵
                                                                • Suspicious behavior: MapViewOfSection
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:4060
                                                              • C:\Windows\explorer.exe
                                                                C:\Windows\explorer.exe
                                                                1⤵
                                                                • Suspicious behavior: MapViewOfSection
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:2240
                                                              • C:\Windows\SysWOW64\explorer.exe
                                                                C:\Windows\SysWOW64\explorer.exe
                                                                1⤵
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:60
                                                              • C:\Windows\explorer.exe
                                                                C:\Windows\explorer.exe
                                                                1⤵
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:3956
                                                              • C:\Windows\SysWOW64\explorer.exe
                                                                C:\Windows\SysWOW64\explorer.exe
                                                                1⤵
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:924
                                                              • C:\Windows\explorer.exe
                                                                C:\Windows\explorer.exe
                                                                1⤵
                                                                • Suspicious behavior: MapViewOfSection
                                                                PID:1960
                                                              • C:\Windows\system32\WerFault.exe
                                                                C:\Windows\system32\WerFault.exe -pss -s 184 -p 2712 -ip 2712
                                                                1⤵
                                                                • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                PID:2196
                                                              • C:\Windows\system32\DllHost.exe
                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                1⤵
                                                                  PID:1588
                                                                  • C:\Windows\system32\WerFault.exe
                                                                    C:\Windows\system32\WerFault.exe -u -p 1588 -s 832
                                                                    2⤵
                                                                    • Program crash
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    PID:4036
                                                                • C:\Windows\system32\WerFault.exe
                                                                  C:\Windows\system32\WerFault.exe -pss -s 408 -p 1588 -ip 1588
                                                                  1⤵
                                                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                  PID:3944
                                                                • C:\Windows\system32\DllHost.exe
                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                  1⤵
                                                                    PID:3972
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -u -p 3972 -s 804
                                                                      2⤵
                                                                      • Program crash
                                                                      • Checks processor information in registry
                                                                      • Enumerates system info in registry
                                                                      PID:2736
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1180 -ip 1180
                                                                    1⤵
                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                    PID:3512
                                                                  • C:\Windows\system32\WerFault.exe
                                                                    C:\Windows\system32\WerFault.exe -pss -s 408 -p 3972 -ip 3972
                                                                    1⤵
                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                    PID:1952
                                                                  • C:\Windows\system32\DllHost.exe
                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                    1⤵
                                                                      PID:3692
                                                                      • C:\Windows\system32\WerFault.exe
                                                                        C:\Windows\system32\WerFault.exe -u -p 3692 -s 780
                                                                        2⤵
                                                                        • Program crash
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        PID:2868
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -pss -s 456 -p 3692 -ip 3692
                                                                      1⤵
                                                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                      PID:684

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v6

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\Local\Temp\27C4.exe

                                                                      MD5

                                                                      5affe49e1c3db929dc1c92b14b669b83

                                                                      SHA1

                                                                      c8a7f95141f60f3f7cb677261a63bd6e417021d3

                                                                      SHA256

                                                                      92f34680d5fd6d7620e11f6d17910bd777ceca3f037f5a03d5e8fbeb81616992

                                                                      SHA512

                                                                      282a49bb04a2075c45367df59dd035704910d3769e8c8c6ccd3f3944b0f5e313de975b0f3b91c5ec0ebbfd5a84377eb8d328ab0fde5a53920d4a04e4a5d56c36

                                                                    • C:\Users\Admin\AppData\Local\Temp\27C4.exe

                                                                      MD5

                                                                      5affe49e1c3db929dc1c92b14b669b83

                                                                      SHA1

                                                                      c8a7f95141f60f3f7cb677261a63bd6e417021d3

                                                                      SHA256

                                                                      92f34680d5fd6d7620e11f6d17910bd777ceca3f037f5a03d5e8fbeb81616992

                                                                      SHA512

                                                                      282a49bb04a2075c45367df59dd035704910d3769e8c8c6ccd3f3944b0f5e313de975b0f3b91c5ec0ebbfd5a84377eb8d328ab0fde5a53920d4a04e4a5d56c36

                                                                    • C:\Users\Admin\AppData\Local\Temp\623E.exe

                                                                      MD5

                                                                      a01b0bc4b44afddf64029a86f41784dd

                                                                      SHA1

                                                                      ac559d7084e3fb42766dd71a413143ec6c29a56c

                                                                      SHA256

                                                                      9b4820342b301b20cac729a24a9c3215b968221b5a47c0640a455f6cde72a968

                                                                      SHA512

                                                                      bb543579cef5003eda5c9a9a7715cc5bcda25ea2491155bfd942317c77573b7736f749e84bf51b04f0fb0328a2db875f893d85604aeebb67bf03f8d4e61848d7

                                                                    • C:\Users\Admin\AppData\Local\Temp\623E.exe

                                                                      MD5

                                                                      a01b0bc4b44afddf64029a86f41784dd

                                                                      SHA1

                                                                      ac559d7084e3fb42766dd71a413143ec6c29a56c

                                                                      SHA256

                                                                      9b4820342b301b20cac729a24a9c3215b968221b5a47c0640a455f6cde72a968

                                                                      SHA512

                                                                      bb543579cef5003eda5c9a9a7715cc5bcda25ea2491155bfd942317c77573b7736f749e84bf51b04f0fb0328a2db875f893d85604aeebb67bf03f8d4e61848d7

                                                                    • C:\Users\Admin\AppData\Local\Temp\623E.exe

                                                                      MD5

                                                                      a01b0bc4b44afddf64029a86f41784dd

                                                                      SHA1

                                                                      ac559d7084e3fb42766dd71a413143ec6c29a56c

                                                                      SHA256

                                                                      9b4820342b301b20cac729a24a9c3215b968221b5a47c0640a455f6cde72a968

                                                                      SHA512

                                                                      bb543579cef5003eda5c9a9a7715cc5bcda25ea2491155bfd942317c77573b7736f749e84bf51b04f0fb0328a2db875f893d85604aeebb67bf03f8d4e61848d7

                                                                    • C:\Users\Admin\AppData\Roaming\urddduj

                                                                      MD5

                                                                      5affe49e1c3db929dc1c92b14b669b83

                                                                      SHA1

                                                                      c8a7f95141f60f3f7cb677261a63bd6e417021d3

                                                                      SHA256

                                                                      92f34680d5fd6d7620e11f6d17910bd777ceca3f037f5a03d5e8fbeb81616992

                                                                      SHA512

                                                                      282a49bb04a2075c45367df59dd035704910d3769e8c8c6ccd3f3944b0f5e313de975b0f3b91c5ec0ebbfd5a84377eb8d328ab0fde5a53920d4a04e4a5d56c36

                                                                    • C:\Users\Admin\AppData\Roaming\urddduj

                                                                      MD5

                                                                      5affe49e1c3db929dc1c92b14b669b83

                                                                      SHA1

                                                                      c8a7f95141f60f3f7cb677261a63bd6e417021d3

                                                                      SHA256

                                                                      92f34680d5fd6d7620e11f6d17910bd777ceca3f037f5a03d5e8fbeb81616992

                                                                      SHA512

                                                                      282a49bb04a2075c45367df59dd035704910d3769e8c8c6ccd3f3944b0f5e313de975b0f3b91c5ec0ebbfd5a84377eb8d328ab0fde5a53920d4a04e4a5d56c36

                                                                    • C:\Users\Admin\AppData\Roaming\wsddduj

                                                                      MD5

                                                                      5f8d526cc16823160c06593405a3b393

                                                                      SHA1

                                                                      64b97251781b811078236469b999e61bde4563d0

                                                                      SHA256

                                                                      ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186

                                                                      SHA512

                                                                      ba5690e0b0288e9ca2d647a68f6927717ae77298e3037474386e2bbf3d0ea64c5f6be26bca4e9d995751291964ef8f5b6cea058b7c432dd7782890e91494f295

                                                                    • C:\Users\Admin\AppData\Roaming\wsddduj

                                                                      MD5

                                                                      5f8d526cc16823160c06593405a3b393

                                                                      SHA1

                                                                      64b97251781b811078236469b999e61bde4563d0

                                                                      SHA256

                                                                      ca389b38fb88de27d8e6782f9642d98989af618e7d1af4cd6b8e5fc8eed31186

                                                                      SHA512

                                                                      ba5690e0b0288e9ca2d647a68f6927717ae77298e3037474386e2bbf3d0ea64c5f6be26bca4e9d995751291964ef8f5b6cea058b7c432dd7782890e91494f295

                                                                    • memory/60-187-0x0000000002940000-0x0000000002949000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/60-186-0x0000000002950000-0x0000000002955000-memory.dmp

                                                                      Filesize

                                                                      20KB

                                                                    • memory/404-204-0x00000144ED920000-0x00000144ED921000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/772-131-0x0000000000590000-0x0000000000599000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/772-132-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                      Filesize

                                                                      292KB

                                                                    • memory/772-130-0x0000000000580000-0x0000000000588000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/816-137-0x0000000000550000-0x0000000000559000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/816-138-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                      Filesize

                                                                      292KB

                                                                    • memory/816-136-0x0000000000540000-0x0000000000548000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/820-306-0x00000000007F0000-0x00000000007FB000-memory.dmp

                                                                      Filesize

                                                                      44KB

                                                                    • memory/820-304-0x0000000000800000-0x0000000000801000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/876-194-0x0000000005340000-0x0000000005341000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/876-195-0x0000000005330000-0x000000000533B000-memory.dmp

                                                                      Filesize

                                                                      44KB

                                                                    • memory/924-190-0x0000000002950000-0x0000000002956000-memory.dmp

                                                                      Filesize

                                                                      24KB

                                                                    • memory/924-191-0x0000000002940000-0x000000000294B000-memory.dmp

                                                                      Filesize

                                                                      44KB

                                                                    • memory/1180-142-0x0000000000540000-0x0000000000548000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/1180-193-0x00000000021B0000-0x00000000021BB000-memory.dmp

                                                                      Filesize

                                                                      44KB

                                                                    • memory/1180-192-0x0000000003350000-0x0000000003351000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1180-143-0x00000000005A0000-0x00000000005A5000-memory.dmp

                                                                      Filesize

                                                                      20KB

                                                                    • memory/1180-144-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                      Filesize

                                                                      292KB

                                                                    • memory/1784-146-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                      Filesize

                                                                      292KB

                                                                    • memory/1960-196-0x0000000000DE0000-0x0000000000DE7000-memory.dmp

                                                                      Filesize

                                                                      28KB

                                                                    • memory/1960-197-0x0000000000DD0000-0x0000000000DDD000-memory.dmp

                                                                      Filesize

                                                                      52KB

                                                                    • memory/2216-198-0x0000017C09D80000-0x0000017C09D81000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2240-184-0x00000000003C0000-0x00000000003CE000-memory.dmp

                                                                      Filesize

                                                                      56KB

                                                                    • memory/2240-183-0x00000000003D0000-0x00000000003D9000-memory.dmp

                                                                      Filesize

                                                                      36KB

                                                                    • memory/2248-199-0x000001A3E4F10000-0x000001A3E4F11000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2284-200-0x0000011A0C040000-0x0000011A0C041000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2284-218-0x0000011A0C040000-0x0000011A0C041000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2424-148-0x0000000002A60000-0x00000000082C0000-memory.dmp

                                                                      Filesize

                                                                      88.4MB

                                                                    • memory/2424-185-0x0000000002A60000-0x00000000082C0000-memory.dmp

                                                                      Filesize

                                                                      88.4MB

                                                                    • memory/2424-139-0x0000000000AC0000-0x0000000000AD6000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/2424-133-0x0000000000B90000-0x0000000000BA6000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/2512-201-0x00000165E3AD0000-0x00000165E3AD1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2816-202-0x000001D585490000-0x000001D585491000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2884-203-0x0000022A2FB70000-0x0000022A2FB71000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2896-206-0x000001D418B50000-0x000001D418B51000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3348-174-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                      Filesize

                                                                      292KB

                                                                    • memory/3580-178-0x0000000002C00000-0x0000000002C75000-memory.dmp

                                                                      Filesize

                                                                      468KB

                                                                    • memory/3580-179-0x0000000002940000-0x00000000029AB000-memory.dmp

                                                                      Filesize

                                                                      428KB

                                                                    • memory/3608-180-0x0000000000590000-0x000000000059C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3808-175-0x0000000000400000-0x0000000000449000-memory.dmp

                                                                      Filesize

                                                                      292KB

                                                                    • memory/3848-205-0x0000027186460000-0x0000027186461000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3956-189-0x00000000012A0000-0x00000000012AC000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3956-188-0x00000000012B0000-0x00000000012B6000-memory.dmp

                                                                      Filesize

                                                                      24KB

                                                                    • memory/4060-181-0x0000000002B20000-0x0000000002B27000-memory.dmp

                                                                      Filesize

                                                                      28KB

                                                                    • memory/4060-182-0x0000000002B10000-0x0000000002B1B000-memory.dmp

                                                                      Filesize

                                                                      44KB