Analysis
-
max time kernel
150s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 02:11
Static task
static1
Behavioral task
behavioral1
Sample
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe
Resource
win10v2004-20220414-en
General
-
Target
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe
-
Size
1.1MB
-
MD5
6962527d9ac313319bd2b87cd12ab32c
-
SHA1
cd5c57102e56d6af901919edf41dd85d9f012351
-
SHA256
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a
-
SHA512
048f07a350e08d49e70b3a1a1d017c515f700ad0de2415130efe71c455b81cd656ab820104eff6bf39444d9cae1c2220066715ed8efec0e898602e9ea5ab3532
Malware Config
Signatures
-
Processes:
frm_QANATS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" frm_QANATS.exe -
Processes:
frm_QANATS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" frm_QANATS.exe -
Executes dropped EXE 3 IoCs
Processes:
frm_QANATS.exefrm_QANATS.exefrm_QANATS.exepid process 3564 frm_QANATS.exe 736 frm_QANATS.exe 4192 frm_QANATS.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe -
Processes:
frm_QANATS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" frm_QANATS.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
frm_QANATS.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce frm_QANATS.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\frm_Roldan = "wscript \"C:\\Users\\Admin\\AppData\\Local\\Temp\\frm_QANATS.vbs\"" frm_QANATS.exe -
Processes:
frm_QANATS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" frm_QANATS.exe -
Program crash 46 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4088 4656 WerFault.exe iexplore.exe 3088 2564 WerFault.exe iexplore.exe 4368 2568 WerFault.exe iexplore.exe 1920 3392 WerFault.exe iexplore.exe 3876 1512 WerFault.exe iexplore.exe 3248 1204 WerFault.exe iexplore.exe 620 2916 WerFault.exe iexplore.exe 2908 1268 WerFault.exe iexplore.exe 3872 2688 WerFault.exe iexplore.exe 2608 312 WerFault.exe iexplore.exe 2168 3984 WerFault.exe iexplore.exe 3056 2964 WerFault.exe iexplore.exe 3140 4052 WerFault.exe iexplore.exe 3164 4308 WerFault.exe iexplore.exe 2924 3820 WerFault.exe iexplore.exe 3560 3132 WerFault.exe iexplore.exe 2216 4240 WerFault.exe iexplore.exe 2940 2792 WerFault.exe iexplore.exe 4136 4112 WerFault.exe iexplore.exe 4140 4104 WerFault.exe iexplore.exe 3456 2812 WerFault.exe iexplore.exe 4780 2956 WerFault.exe iexplore.exe 3292 1856 WerFault.exe iexplore.exe 4752 3564 WerFault.exe iexplore.exe 636 8 WerFault.exe iexplore.exe 4088 5040 WerFault.exe iexplore.exe 1064 1060 WerFault.exe iexplore.exe 2056 1660 WerFault.exe iexplore.exe 4768 1164 WerFault.exe iexplore.exe 5052 1580 WerFault.exe iexplore.exe 4936 2788 WerFault.exe iexplore.exe 1376 4972 WerFault.exe iexplore.exe 60 2304 WerFault.exe iexplore.exe 2468 2440 WerFault.exe iexplore.exe 3012 4740 WerFault.exe iexplore.exe 4804 4000 WerFault.exe iexplore.exe 2832 2028 WerFault.exe iexplore.exe 4904 4296 WerFault.exe iexplore.exe 4004 2612 WerFault.exe iexplore.exe 3556 5100 WerFault.exe iexplore.exe 3736 3696 WerFault.exe iexplore.exe 1332 2560 WerFault.exe iexplore.exe 3924 1500 WerFault.exe iexplore.exe 2784 428 WerFault.exe iexplore.exe 5024 1288 WerFault.exe iexplore.exe 3252 64 WerFault.exe iexplore.exe -
Suspicious use of SetThreadContext 47 IoCs
Processes:
frm_QANATS.exefrm_QANATS.exedescription pid process target process PID 736 set thread context of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 4192 set thread context of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1204 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2916 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1268 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2688 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 312 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 3984 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2964 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4052 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4308 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 3820 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 3132 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4240 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2792 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4112 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4104 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2812 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2956 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1856 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 3564 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 8 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 5040 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1060 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1660 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1164 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1580 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2788 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4972 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2304 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2440 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4740 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4000 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2028 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 4296 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2612 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 5100 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 3696 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 2560 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1500 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 428 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 1288 4192 frm_QANATS.exe iexplore.exe PID 4192 set thread context of 64 4192 frm_QANATS.exe iexplore.exe -
Drops file in Windows directory 4 IoCs
Processes:
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exee22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exefrm_QANATS.exefrm_QANATS.exedescription ioc process File opened for modification C:\Windows\win.ini e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe File opened for modification C:\Windows\win.ini e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe File opened for modification C:\Windows\win.ini frm_QANATS.exe File opened for modification C:\Windows\win.ini frm_QANATS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
frm_QANATS.exepid process 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe 4192 frm_QANATS.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exee22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exefrm_QANATS.exefrm_QANATS.exefrm_QANATS.exepid process 4700 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe 432 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe 3564 frm_QANATS.exe 736 frm_QANATS.exe 4192 frm_QANATS.exe -
Suspicious use of UnmapMainImage 3 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exepid process 1512 iexplore.exe 4112 iexplore.exe 1660 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exee22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exefrm_QANATS.exefrm_QANATS.exefrm_QANATS.exedescription pid process target process PID 4700 wrote to memory of 432 4700 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe PID 4700 wrote to memory of 432 4700 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe PID 4700 wrote to memory of 432 4700 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe PID 432 wrote to memory of 3564 432 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe frm_QANATS.exe PID 432 wrote to memory of 3564 432 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe frm_QANATS.exe PID 432 wrote to memory of 3564 432 e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe frm_QANATS.exe PID 3564 wrote to memory of 736 3564 frm_QANATS.exe frm_QANATS.exe PID 3564 wrote to memory of 736 3564 frm_QANATS.exe frm_QANATS.exe PID 3564 wrote to memory of 736 3564 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 736 wrote to memory of 4192 736 frm_QANATS.exe frm_QANATS.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 4656 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2564 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 2568 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 3392 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1512 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1204 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1204 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1204 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1204 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1204 4192 frm_QANATS.exe iexplore.exe PID 4192 wrote to memory of 1204 4192 frm_QANATS.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
frm_QANATS.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" frm_QANATS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe"C:\Users\Admin\AppData\Local\Temp\e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe"C:\Users\Admin\AppData\Local\Temp\e22a21011a6e843389fbbe8cab856a3ba7ecc184c779e2767cc91e666fa7b66a.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe"C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe"C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe"C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe"5⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1204 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 312 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 127⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\frm_QANATS.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 127⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4656 -ip 46561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2564 -ip 25641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2568 -ip 25681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3392 -ip 33921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1512 -ip 15121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1204 -ip 12041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2916 -ip 29161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1268 -ip 12681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2688 -ip 26881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 312 -ip 3121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3984 -ip 39841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2964 -ip 29641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4052 -ip 40521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3820 -ip 38201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3132 -ip 31321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4240 -ip 42401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2792 -ip 27921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4112 -ip 41121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4104 -ip 41041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2812 -ip 28121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2956 -ip 29561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 1856 -ip 18561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 3564 -ip 35641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 8 -ip 81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 5040 -ip 50401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 1060 -ip 10601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 1660 -ip 16601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 1164 -ip 11641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 2788 -ip 27881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 852 -p 2304 -ip 23041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 2440 -ip 24401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 868 -p 4740 -ip 47401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 860 -p 4000 -ip 40001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 2028 -ip 20281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 884 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 856 -p 2612 -ip 26121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 5100 -ip 51001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 888 -p 3696 -ip 36961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 896 -p 2560 -ip 25601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 888 -p 1500 -ip 15001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 892 -p 428 -ip 4281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 1288 -ip 12881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 864 -p 64 -ip 641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exeFilesize
1.1MB
MD572b518574405809b54d8e2d3a4283d50
SHA19429216ebd67da45ac4b9dbc24e5c47a24425e26
SHA2564fde57eb8070711e8e30fe34ab1a1bf785f40a38d2fcb6468c2266f9b6e4cd2e
SHA512a4def1b82fb9d93cadc35c6ffbb65660372962b3a66c1df9ca392055a30beec6cbe2a3f80006b32570efab0b865803e83138cecc3e23679f7946bdcce5bdccff
-
C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exeFilesize
1.1MB
MD572b518574405809b54d8e2d3a4283d50
SHA19429216ebd67da45ac4b9dbc24e5c47a24425e26
SHA2564fde57eb8070711e8e30fe34ab1a1bf785f40a38d2fcb6468c2266f9b6e4cd2e
SHA512a4def1b82fb9d93cadc35c6ffbb65660372962b3a66c1df9ca392055a30beec6cbe2a3f80006b32570efab0b865803e83138cecc3e23679f7946bdcce5bdccff
-
C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exeFilesize
1.1MB
MD572b518574405809b54d8e2d3a4283d50
SHA19429216ebd67da45ac4b9dbc24e5c47a24425e26
SHA2564fde57eb8070711e8e30fe34ab1a1bf785f40a38d2fcb6468c2266f9b6e4cd2e
SHA512a4def1b82fb9d93cadc35c6ffbb65660372962b3a66c1df9ca392055a30beec6cbe2a3f80006b32570efab0b865803e83138cecc3e23679f7946bdcce5bdccff
-
C:\Users\Admin\AppData\Local\Temp\frm_QANATS.exeFilesize
1.1MB
MD572b518574405809b54d8e2d3a4283d50
SHA19429216ebd67da45ac4b9dbc24e5c47a24425e26
SHA2564fde57eb8070711e8e30fe34ab1a1bf785f40a38d2fcb6468c2266f9b6e4cd2e
SHA512a4def1b82fb9d93cadc35c6ffbb65660372962b3a66c1df9ca392055a30beec6cbe2a3f80006b32570efab0b865803e83138cecc3e23679f7946bdcce5bdccff
-
C:\Windows\win.iniFilesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06
-
C:\Windows\win.iniFilesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06
-
C:\Windows\win.iniFilesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06
-
memory/432-132-0x0000000000000000-mapping.dmp
-
memory/432-138-0x0000000002BF0000-0x0000000002CF0000-memory.dmpFilesize
1024KB
-
memory/432-139-0x00007FFFB29D0000-0x00007FFFB2BC5000-memory.dmpFilesize
2.0MB
-
memory/432-140-0x0000000077D20000-0x0000000077EC3000-memory.dmpFilesize
1.6MB
-
memory/432-144-0x0000000077D20000-0x0000000077EC3000-memory.dmpFilesize
1.6MB
-
memory/736-148-0x0000000000000000-mapping.dmp
-
memory/736-160-0x00007FFFB29D0000-0x00007FFFB2BC5000-memory.dmpFilesize
2.0MB
-
memory/736-161-0x0000000077D21000-0x0000000077E41000-memory.dmpFilesize
1.1MB
-
memory/3564-141-0x0000000000000000-mapping.dmp
-
memory/3564-152-0x0000000002C60000-0x0000000002D60000-memory.dmpFilesize
1024KB
-
memory/3564-154-0x00007FFFB29D0000-0x00007FFFB2BC5000-memory.dmpFilesize
2.0MB
-
memory/3564-155-0x0000000077D20000-0x0000000077EC3000-memory.dmpFilesize
1.6MB
-
memory/4192-156-0x0000000000000000-mapping.dmp
-
memory/4192-157-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4192-164-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4192-165-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4700-137-0x0000000077D20000-0x0000000077EC3000-memory.dmpFilesize
1.6MB
-
memory/4700-136-0x00007FFFB29D0000-0x00007FFFB2BC5000-memory.dmpFilesize
2.0MB