Analysis
-
max time kernel
150s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 03:14
Static task
static1
Behavioral task
behavioral1
Sample
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe
Resource
win10v2004-20220414-en
General
-
Target
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe
-
Size
5.0MB
-
MD5
2747aa7b8dd712fdc6e2baeb9fa7b708
-
SHA1
50d2875a2dcb62ab3ee2af662f804747f2e92dfb
-
SHA256
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec
-
SHA512
83be96162542d7e35eb4b429b62c245264dcc14f4191b84a1973855a01854ac6c14858499cb879f0a02b145b221f97d30faecdf25f8079b60fa223fae2bb6c00
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
ComInfo.dllShowDrive.dl_ShowEFI.dl_Getptw.dllpid process 1876 ComInfo.dll 2148 ShowDrive.dl_ 1356 ShowEFI.dl_ 1472 Getptw.dll -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WININST~140\ComInfo.dll upx C:\Users\Admin\AppData\Roaming\WININST~140\ComInfo.dll upx -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exeShowDrive.dl_description ioc process File opened (read-only) \??\u: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\w: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\F: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\k: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\p: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\r: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\t: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\N: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\W: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\X: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\Q: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\f: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\h: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\l: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\m: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\q: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\s: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\L: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\i: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\x: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\y: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\I: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\R: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\V: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\z: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\G: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\J: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\P: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\j: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\D: ShowDrive.dl_ File opened (read-only) \??\K: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\M: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\O: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\S: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\Y: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\a: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\b: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\g: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\n: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\T: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\e: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\o: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\v: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\H: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\U: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe File opened (read-only) \??\Z: 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
ComInfo.dllShowEFI.dl_Getptw.dlldescription ioc process File opened for modification \??\PhysicalDrive0 ComInfo.dll File opened for modification \??\PhysicalDrive0 ShowEFI.dl_ File opened for modification \??\PhysicalDrive0 Getptw.dll -
NTFS ADS 1 IoCs
Processes:
ComInfo.dlldescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:{impersonationLevel=impersonate}!\root\cimv2 ComInfo.dll -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Getptw.dllpid process 1472 Getptw.dll 1472 Getptw.dll 1472 Getptw.dll 1472 Getptw.dll -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exepid process 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
Processes:
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exepid process 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exepid process 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.execmd.execmd.execmd.exedescription pid process target process PID 1652 wrote to memory of 1876 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe ComInfo.dll PID 1652 wrote to memory of 1876 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe ComInfo.dll PID 1652 wrote to memory of 1876 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe ComInfo.dll PID 1652 wrote to memory of 2244 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 1652 wrote to memory of 2244 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 1652 wrote to memory of 2244 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 2244 wrote to memory of 2148 2244 cmd.exe ShowDrive.dl_ PID 2244 wrote to memory of 2148 2244 cmd.exe ShowDrive.dl_ PID 2244 wrote to memory of 2148 2244 cmd.exe ShowDrive.dl_ PID 1652 wrote to memory of 4884 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 1652 wrote to memory of 4884 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 1652 wrote to memory of 4884 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 4884 wrote to memory of 1356 4884 cmd.exe ShowEFI.dl_ PID 4884 wrote to memory of 1356 4884 cmd.exe ShowEFI.dl_ PID 1652 wrote to memory of 4344 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 1652 wrote to memory of 4344 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 1652 wrote to memory of 4344 1652 3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe cmd.exe PID 4344 wrote to memory of 1472 4344 cmd.exe Getptw.dll PID 4344 wrote to memory of 1472 4344 cmd.exe Getptw.dll PID 4344 wrote to memory of 1472 4344 cmd.exe Getptw.dll
Processes
-
C:\Users\Admin\AppData\Local\Temp\3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe"C:\Users\Admin\AppData\Local\Temp\3364d476259221501252167627d3d9ae1bd0b488c4e68343593d94fea37a71ec.exe"1⤵
- Enumerates connected drives
- Maps connected drives based on registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WININST~140\ComInfo.dllC:\Users\Admin\AppData\Roaming\WININST~140\ComInfo.dll2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- NTFS ADS
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\WININST~140\ShowDrive.dl_ *2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WININST~140\ShowDrive.dl_C:\Users\Admin\AppData\Roaming\WININST~140\ShowDrive.dl_ *3⤵
- Executes dropped EXE
- Enumerates connected drives
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\WININST~140\ShowEFI.dl_2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WININST~140\ShowEFI.dl_C:\Users\Admin\AppData\Roaming\WININST~140\ShowEFI.dl_3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\WININST~140\Getptw.dll -a/part2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WININST~140\Getptw.dllC:\Users\Admin\AppData\Roaming\WININST~140\Getptw.dll -a/part3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WININST~140\ComInfo.dllFilesize
368KB
MD5d27d87f0f87816f71f6ffddbbbd34213
SHA1ccc9192b3aa179033756fdd0e0b5210305cf870d
SHA2567e9fba8991d7f901f671bfb38dbf81600c70e6f603b48b2e65f6745c178217f0
SHA512bde4a6d8627027a9fc31e08975f07f9a01220806d8bce1c774204443d182cd454d74b2e11da21e0d74f9284ea3f84b4954507b0f40beadb996a7c9be8a6c8e10
-
C:\Users\Admin\AppData\Roaming\WININST~140\ComInfo.dllFilesize
368KB
MD5d27d87f0f87816f71f6ffddbbbd34213
SHA1ccc9192b3aa179033756fdd0e0b5210305cf870d
SHA2567e9fba8991d7f901f671bfb38dbf81600c70e6f603b48b2e65f6745c178217f0
SHA512bde4a6d8627027a9fc31e08975f07f9a01220806d8bce1c774204443d182cd454d74b2e11da21e0d74f9284ea3f84b4954507b0f40beadb996a7c9be8a6c8e10
-
C:\Users\Admin\AppData\Roaming\WININST~140\Getptw.dllFilesize
21KB
MD594d297ccb80b1f7940ea98ffdfc25257
SHA19461b88f14384e5e5a0dd0147552e81bf5dbfa1e
SHA256dd4694e89ae067e49e4f9581782a277eb0fab052aa1539717fecf8449a872f75
SHA512303f81ffc71d5aa8a8ce733c9104d5e4172c098a78f78baac001a90161493f21c907bc49dc28a6424596862deec9311e12bdd3d92df8ba08c041786b262b4256
-
C:\Users\Admin\AppData\Roaming\WININST~140\Getptw.dllFilesize
21KB
MD594d297ccb80b1f7940ea98ffdfc25257
SHA19461b88f14384e5e5a0dd0147552e81bf5dbfa1e
SHA256dd4694e89ae067e49e4f9581782a277eb0fab052aa1539717fecf8449a872f75
SHA512303f81ffc71d5aa8a8ce733c9104d5e4172c098a78f78baac001a90161493f21c907bc49dc28a6424596862deec9311e12bdd3d92df8ba08c041786b262b4256
-
C:\Users\Admin\AppData\Roaming\WININST~140\ShowDrive.dl_Filesize
4KB
MD563f0697283a67db3f50b440f142044ed
SHA1ea3ceae6750d9a481bf88012adfab874bcb67f80
SHA25609c07db40dacd999e726786fc9a8f5e37688d94997f2692da63746f417851f0f
SHA512967ca158809ecfc2baf99092f425876e137842b96446ca4b5b61fb75a244e479e739049895289de70b7656e5fafd1cb792ac1ce5d8eeb015e6ede7224898a028
-
C:\Users\Admin\AppData\Roaming\WININST~140\ShowDrive.dl_Filesize
4KB
MD563f0697283a67db3f50b440f142044ed
SHA1ea3ceae6750d9a481bf88012adfab874bcb67f80
SHA25609c07db40dacd999e726786fc9a8f5e37688d94997f2692da63746f417851f0f
SHA512967ca158809ecfc2baf99092f425876e137842b96446ca4b5b61fb75a244e479e739049895289de70b7656e5fafd1cb792ac1ce5d8eeb015e6ede7224898a028
-
C:\Users\Admin\AppData\Roaming\WININST~140\ShowEFI.dl_Filesize
19KB
MD55aadc3b8ad1735a7a0e89c574e90c50f
SHA17370502043a42d434632f7221fbea2a7062f1f84
SHA256cfe2144727f11e2cfb42e64be6773ad58cd6f6036c3027a2b9aad2c40946734f
SHA5123e1c83824e2e58378e5e48399959f75addd251a83d6f01612f37c647cb940a6afbd7fed935f62ee9a02d2bddfb806f212c948f93b10463cb61795970b774be3e
-
C:\Users\Admin\AppData\Roaming\WININST~140\ShowEFI.dl_Filesize
19KB
MD55aadc3b8ad1735a7a0e89c574e90c50f
SHA17370502043a42d434632f7221fbea2a7062f1f84
SHA256cfe2144727f11e2cfb42e64be6773ad58cd6f6036c3027a2b9aad2c40946734f
SHA5123e1c83824e2e58378e5e48399959f75addd251a83d6f01612f37c647cb940a6afbd7fed935f62ee9a02d2bddfb806f212c948f93b10463cb61795970b774be3e
-
memory/1356-138-0x0000000000000000-mapping.dmp
-
memory/1472-142-0x0000000000000000-mapping.dmp
-
memory/1876-130-0x0000000000000000-mapping.dmp
-
memory/2148-134-0x0000000000000000-mapping.dmp
-
memory/2244-133-0x0000000000000000-mapping.dmp
-
memory/4344-141-0x0000000000000000-mapping.dmp
-
memory/4884-137-0x0000000000000000-mapping.dmp