Analysis

  • max time kernel
    152s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 09:22

General

  • Target

    2dca5d3b333cae8cffe2d0f12a88e0c75957d37115badc0bdee423d191ac521c.exe

  • Size

    220KB

  • MD5

    3721cd50de4e920456e31bc2a2d232f0

  • SHA1

    57e9861136c0eca5b5a6f370e81b41db4b6519c4

  • SHA256

    2dca5d3b333cae8cffe2d0f12a88e0c75957d37115badc0bdee423d191ac521c

  • SHA512

    f5b947ae8e2af955cc4ea872959f96fbf2bfb56ae46018c4f5197652cd649dfc8951529939653ced3209d08588194be1a0e6a51d9592ae6bf5ed3a6904807ba2

  • SSDEEP

    6144:9sehzRFHS2QUdxOJQbv/DhwEL6iBgYbaX/:9rDBdM2bv/D+I6iBWv

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dca5d3b333cae8cffe2d0f12a88e0c75957d37115badc0bdee423d191ac521c.exe
    "C:\Users\Admin\AppData\Local\Temp\2dca5d3b333cae8cffe2d0f12a88e0c75957d37115badc0bdee423d191ac521c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QVODSE~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QVODSE~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\system32\jkbamw.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Windows\SysWOW64\jkbamw.exe
          C:\Windows\system32\jkbamw.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          PID:2032
      • C:\Windows\SysWOW64\donknw.exe
        C:\Windows\system32\donknw.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:952
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\system32\usbmpx.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\SysWOW64\usbmpx.exe
          C:\Windows\system32\usbmpx.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Windows\SysWOW64\sc.exe
            sc stop ZhuDongFangYu
            5⤵
            • Launches sc.exe
            PID:944
          • C:\Windows\SysWOW64\sc.exe
            sc delete ZhuDongFangYu
            5⤵
            • Launches sc.exe
            PID:1748
          • C:\Windows\SysWOW64\sc.exe
            sc stop 360rp
            5⤵
            • Launches sc.exe
            PID:1464
          • C:\Windows\SysWOW64\sc.exe
            sc delete 360rp
            5⤵
            • Launches sc.exe
            PID:820
          • C:\Windows\SysWOW64\net.exe
            net stop WinDefend
            5⤵
              PID:584
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop WinDefend
                6⤵
                  PID:1596
              • C:\Windows\SysWOW64\sc.exe
                sc config WinDefend start= disabled
                5⤵
                • Launches sc.exe
                PID:1156
              • C:\Windows\SysWOW64\net.exe
                net stop MpsSvc
                5⤵
                  PID:1152
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop MpsSvc
                    6⤵
                      PID:1956
                  • C:\Windows\SysWOW64\sc.exe
                    sc config MpsSvc start= disabled
                    5⤵
                    • Launches sc.exe
                    PID:1704
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\system32\psnwqx.exe
                3⤵
                • Loads dropped DLL
                PID:1120
                • C:\Windows\SysWOW64\psnwqx.exe
                  C:\Windows\system32\psnwqx.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  PID:1976
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1620

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QVODSE~1.EXE

                  Filesize

                  128KB

                  MD5

                  7a742af1b7f3274136d535d5b648f7f2

                  SHA1

                  07e8ca25206b4afc05e0541c3b39c36b18871dd4

                  SHA256

                  51815affb48f658e6bbde685c57f2b5781e4af9b74c8cd43e1010feab3ab84ed

                  SHA512

                  fb369fb7e282c65fe72f60f4aa47ae5ca1f8201f6ea1189cdfed984da6788f07a216821e01dca0073a47d61225a0b77dee31c29f874716e2b7be59606ef8d060

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QVODSE~1.EXE

                  Filesize

                  128KB

                  MD5

                  7a742af1b7f3274136d535d5b648f7f2

                  SHA1

                  07e8ca25206b4afc05e0541c3b39c36b18871dd4

                  SHA256

                  51815affb48f658e6bbde685c57f2b5781e4af9b74c8cd43e1010feab3ab84ed

                  SHA512

                  fb369fb7e282c65fe72f60f4aa47ae5ca1f8201f6ea1189cdfed984da6788f07a216821e01dca0073a47d61225a0b77dee31c29f874716e2b7be59606ef8d060

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe

                  Filesize

                  285KB

                  MD5

                  b797969f089a877ebcb35a1d8ed1a047

                  SHA1

                  ad3bcbbe38e18b35ed02591210b4b7c68ef58118

                  SHA256

                  848ee263813b9386163be888dfd8c7fe14cc2a5a6f2c35ff058d958eed220937

                  SHA512

                  ed1dc1633e2b748ce25f18a260a8efeed683b5ed6d93cc4b2e6dc78c271ad00615501fa2d4a6d349c4906f4d058284eef15643179eea3e39daf03a7e27b36f10

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe

                  Filesize

                  285KB

                  MD5

                  b797969f089a877ebcb35a1d8ed1a047

                  SHA1

                  ad3bcbbe38e18b35ed02591210b4b7c68ef58118

                  SHA256

                  848ee263813b9386163be888dfd8c7fe14cc2a5a6f2c35ff058d958eed220937

                  SHA512

                  ed1dc1633e2b748ce25f18a260a8efeed683b5ed6d93cc4b2e6dc78c271ad00615501fa2d4a6d349c4906f4d058284eef15643179eea3e39daf03a7e27b36f10

                • C:\Windows\SysWOW64\donknw.exe

                  Filesize

                  4KB

                  MD5

                  4d49f75ddecbfa4ede5db598abc8b6e3

                  SHA1

                  4ac56e0595427ab7c3ebce841cb0c7d1467cb8e0

                  SHA256

                  a8e74888a6227da0651e85b39676ef06f92fde8cd06c2a1c9f1785ccc524a32e

                  SHA512

                  8983a6903150bb224ca0c3b66ca827070f8e4ad78752ad2e84fcc33f5ce1439d7fb45596c7cf45d3112df17c6eb058dbc473f08b1f5f63c9abcd5ff714073743

                • C:\Windows\SysWOW64\donknw.exe

                  Filesize

                  4KB

                  MD5

                  4d49f75ddecbfa4ede5db598abc8b6e3

                  SHA1

                  4ac56e0595427ab7c3ebce841cb0c7d1467cb8e0

                  SHA256

                  a8e74888a6227da0651e85b39676ef06f92fde8cd06c2a1c9f1785ccc524a32e

                  SHA512

                  8983a6903150bb224ca0c3b66ca827070f8e4ad78752ad2e84fcc33f5ce1439d7fb45596c7cf45d3112df17c6eb058dbc473f08b1f5f63c9abcd5ff714073743

                • C:\Windows\SysWOW64\jkbamw.exe

                  Filesize

                  18KB

                  MD5

                  64e026ce8ce411fcbe7ced4c593c7926

                  SHA1

                  736d14d09873ea7f1d566e8a82c10b1d8314b0fb

                  SHA256

                  2d1c98a3989646920b91f7fc4a9a1448c16334bec98fb47057027579df9e2525

                  SHA512

                  cedf67585dab274c468bda50cb68e5673452af066b8d58beb7edc614d008e5495a2791418c2f8068000dd8cb7c964aee14d28f09266c36a448ad6dedd47eb40d

                • C:\Windows\SysWOW64\jkbamw.exe

                  Filesize

                  18KB

                  MD5

                  64e026ce8ce411fcbe7ced4c593c7926

                  SHA1

                  736d14d09873ea7f1d566e8a82c10b1d8314b0fb

                  SHA256

                  2d1c98a3989646920b91f7fc4a9a1448c16334bec98fb47057027579df9e2525

                  SHA512

                  cedf67585dab274c468bda50cb68e5673452af066b8d58beb7edc614d008e5495a2791418c2f8068000dd8cb7c964aee14d28f09266c36a448ad6dedd47eb40d

                • C:\Windows\SysWOW64\psnwqx.exe

                  Filesize

                  49KB

                  MD5

                  298c88be018c77c8207db0f04965b4cf

                  SHA1

                  3ac915977f89a4083a8946140ef5585a1ec42697

                  SHA256

                  6b7239ff74a56b3d1ebf5679efc353d97da0ec2007a172cd8786d7bba6d211f1

                  SHA512

                  b4a2e750344b3a11a83de862f9c9cd637888e368b2a98f0456ecf8fc82da932085f86bf240207b3c17bd05c13b7fa65b26d5f98c2d18e516bd3e5245c24931e9

                • C:\Windows\SysWOW64\psnwqx.exe

                  Filesize

                  49KB

                  MD5

                  298c88be018c77c8207db0f04965b4cf

                  SHA1

                  3ac915977f89a4083a8946140ef5585a1ec42697

                  SHA256

                  6b7239ff74a56b3d1ebf5679efc353d97da0ec2007a172cd8786d7bba6d211f1

                  SHA512

                  b4a2e750344b3a11a83de862f9c9cd637888e368b2a98f0456ecf8fc82da932085f86bf240207b3c17bd05c13b7fa65b26d5f98c2d18e516bd3e5245c24931e9

                • C:\Windows\SysWOW64\usbmpx.exe

                  Filesize

                  11KB

                  MD5

                  dd03eadd21e6eb5bb5a78cbca659f231

                  SHA1

                  e7e7ef35b64d32709bf8a7ce5c7c6aa790232e01

                  SHA256

                  9390da2bee16812d225f5b94f1250dfc0f505a97269600f5cc9c01129262e252

                  SHA512

                  939d85fbf63af43838a3b209f90eec15c93ba926a549c8832f17bafc0b4a131f7357174a43b587e4f21998751617b76f8078e910155613e3f71d56bfccc9ce36

                • C:\Windows\SysWOW64\usbmpx.exe

                  Filesize

                  11KB

                  MD5

                  dd03eadd21e6eb5bb5a78cbca659f231

                  SHA1

                  e7e7ef35b64d32709bf8a7ce5c7c6aa790232e01

                  SHA256

                  9390da2bee16812d225f5b94f1250dfc0f505a97269600f5cc9c01129262e252

                  SHA512

                  939d85fbf63af43838a3b209f90eec15c93ba926a549c8832f17bafc0b4a131f7357174a43b587e4f21998751617b76f8078e910155613e3f71d56bfccc9ce36

                • \Users\Admin\AppData\Local\Temp\C340.tmp

                  Filesize

                  1.7MB

                  MD5

                  b5eb5bd3066959611e1f7a80fd6cc172

                  SHA1

                  6fb1532059212c840737b3f923a9c0b152c0887a

                  SHA256

                  1ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc

                  SHA512

                  6c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\QVODSE~1.EXE

                  Filesize

                  128KB

                  MD5

                  7a742af1b7f3274136d535d5b648f7f2

                  SHA1

                  07e8ca25206b4afc05e0541c3b39c36b18871dd4

                  SHA256

                  51815affb48f658e6bbde685c57f2b5781e4af9b74c8cd43e1010feab3ab84ed

                  SHA512

                  fb369fb7e282c65fe72f60f4aa47ae5ca1f8201f6ea1189cdfed984da6788f07a216821e01dca0073a47d61225a0b77dee31c29f874716e2b7be59606ef8d060

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\QVODSE~1.EXE

                  Filesize

                  128KB

                  MD5

                  7a742af1b7f3274136d535d5b648f7f2

                  SHA1

                  07e8ca25206b4afc05e0541c3b39c36b18871dd4

                  SHA256

                  51815affb48f658e6bbde685c57f2b5781e4af9b74c8cd43e1010feab3ab84ed

                  SHA512

                  fb369fb7e282c65fe72f60f4aa47ae5ca1f8201f6ea1189cdfed984da6788f07a216821e01dca0073a47d61225a0b77dee31c29f874716e2b7be59606ef8d060

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\QVODSE~1.EXE

                  Filesize

                  128KB

                  MD5

                  7a742af1b7f3274136d535d5b648f7f2

                  SHA1

                  07e8ca25206b4afc05e0541c3b39c36b18871dd4

                  SHA256

                  51815affb48f658e6bbde685c57f2b5781e4af9b74c8cd43e1010feab3ab84ed

                  SHA512

                  fb369fb7e282c65fe72f60f4aa47ae5ca1f8201f6ea1189cdfed984da6788f07a216821e01dca0073a47d61225a0b77dee31c29f874716e2b7be59606ef8d060

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe

                  Filesize

                  285KB

                  MD5

                  b797969f089a877ebcb35a1d8ed1a047

                  SHA1

                  ad3bcbbe38e18b35ed02591210b4b7c68ef58118

                  SHA256

                  848ee263813b9386163be888dfd8c7fe14cc2a5a6f2c35ff058d958eed220937

                  SHA512

                  ed1dc1633e2b748ce25f18a260a8efeed683b5ed6d93cc4b2e6dc78c271ad00615501fa2d4a6d349c4906f4d058284eef15643179eea3e39daf03a7e27b36f10

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe

                  Filesize

                  285KB

                  MD5

                  b797969f089a877ebcb35a1d8ed1a047

                  SHA1

                  ad3bcbbe38e18b35ed02591210b4b7c68ef58118

                  SHA256

                  848ee263813b9386163be888dfd8c7fe14cc2a5a6f2c35ff058d958eed220937

                  SHA512

                  ed1dc1633e2b748ce25f18a260a8efeed683b5ed6d93cc4b2e6dc78c271ad00615501fa2d4a6d349c4906f4d058284eef15643179eea3e39daf03a7e27b36f10

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe

                  Filesize

                  285KB

                  MD5

                  b797969f089a877ebcb35a1d8ed1a047

                  SHA1

                  ad3bcbbe38e18b35ed02591210b4b7c68ef58118

                  SHA256

                  848ee263813b9386163be888dfd8c7fe14cc2a5a6f2c35ff058d958eed220937

                  SHA512

                  ed1dc1633e2b748ce25f18a260a8efeed683b5ed6d93cc4b2e6dc78c271ad00615501fa2d4a6d349c4906f4d058284eef15643179eea3e39daf03a7e27b36f10

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup4.exe

                  Filesize

                  285KB

                  MD5

                  b797969f089a877ebcb35a1d8ed1a047

                  SHA1

                  ad3bcbbe38e18b35ed02591210b4b7c68ef58118

                  SHA256

                  848ee263813b9386163be888dfd8c7fe14cc2a5a6f2c35ff058d958eed220937

                  SHA512

                  ed1dc1633e2b748ce25f18a260a8efeed683b5ed6d93cc4b2e6dc78c271ad00615501fa2d4a6d349c4906f4d058284eef15643179eea3e39daf03a7e27b36f10

                • \Windows\SysWOW64\donknw.exe

                  Filesize

                  4KB

                  MD5

                  4d49f75ddecbfa4ede5db598abc8b6e3

                  SHA1

                  4ac56e0595427ab7c3ebce841cb0c7d1467cb8e0

                  SHA256

                  a8e74888a6227da0651e85b39676ef06f92fde8cd06c2a1c9f1785ccc524a32e

                  SHA512

                  8983a6903150bb224ca0c3b66ca827070f8e4ad78752ad2e84fcc33f5ce1439d7fb45596c7cf45d3112df17c6eb058dbc473f08b1f5f63c9abcd5ff714073743

                • \Windows\SysWOW64\donknw.exe

                  Filesize

                  4KB

                  MD5

                  4d49f75ddecbfa4ede5db598abc8b6e3

                  SHA1

                  4ac56e0595427ab7c3ebce841cb0c7d1467cb8e0

                  SHA256

                  a8e74888a6227da0651e85b39676ef06f92fde8cd06c2a1c9f1785ccc524a32e

                  SHA512

                  8983a6903150bb224ca0c3b66ca827070f8e4ad78752ad2e84fcc33f5ce1439d7fb45596c7cf45d3112df17c6eb058dbc473f08b1f5f63c9abcd5ff714073743

                • \Windows\SysWOW64\donknw.exe

                  Filesize

                  4KB

                  MD5

                  4d49f75ddecbfa4ede5db598abc8b6e3

                  SHA1

                  4ac56e0595427ab7c3ebce841cb0c7d1467cb8e0

                  SHA256

                  a8e74888a6227da0651e85b39676ef06f92fde8cd06c2a1c9f1785ccc524a32e

                  SHA512

                  8983a6903150bb224ca0c3b66ca827070f8e4ad78752ad2e84fcc33f5ce1439d7fb45596c7cf45d3112df17c6eb058dbc473f08b1f5f63c9abcd5ff714073743

                • \Windows\SysWOW64\jkbamw.exe

                  Filesize

                  18KB

                  MD5

                  64e026ce8ce411fcbe7ced4c593c7926

                  SHA1

                  736d14d09873ea7f1d566e8a82c10b1d8314b0fb

                  SHA256

                  2d1c98a3989646920b91f7fc4a9a1448c16334bec98fb47057027579df9e2525

                  SHA512

                  cedf67585dab274c468bda50cb68e5673452af066b8d58beb7edc614d008e5495a2791418c2f8068000dd8cb7c964aee14d28f09266c36a448ad6dedd47eb40d

                • \Windows\SysWOW64\jkbamw.exe

                  Filesize

                  18KB

                  MD5

                  64e026ce8ce411fcbe7ced4c593c7926

                  SHA1

                  736d14d09873ea7f1d566e8a82c10b1d8314b0fb

                  SHA256

                  2d1c98a3989646920b91f7fc4a9a1448c16334bec98fb47057027579df9e2525

                  SHA512

                  cedf67585dab274c468bda50cb68e5673452af066b8d58beb7edc614d008e5495a2791418c2f8068000dd8cb7c964aee14d28f09266c36a448ad6dedd47eb40d

                • \Windows\SysWOW64\jkbamw.exe

                  Filesize

                  18KB

                  MD5

                  64e026ce8ce411fcbe7ced4c593c7926

                  SHA1

                  736d14d09873ea7f1d566e8a82c10b1d8314b0fb

                  SHA256

                  2d1c98a3989646920b91f7fc4a9a1448c16334bec98fb47057027579df9e2525

                  SHA512

                  cedf67585dab274c468bda50cb68e5673452af066b8d58beb7edc614d008e5495a2791418c2f8068000dd8cb7c964aee14d28f09266c36a448ad6dedd47eb40d

                • \Windows\SysWOW64\psnwqx.exe

                  Filesize

                  49KB

                  MD5

                  298c88be018c77c8207db0f04965b4cf

                  SHA1

                  3ac915977f89a4083a8946140ef5585a1ec42697

                  SHA256

                  6b7239ff74a56b3d1ebf5679efc353d97da0ec2007a172cd8786d7bba6d211f1

                  SHA512

                  b4a2e750344b3a11a83de862f9c9cd637888e368b2a98f0456ecf8fc82da932085f86bf240207b3c17bd05c13b7fa65b26d5f98c2d18e516bd3e5245c24931e9

                • \Windows\SysWOW64\psnwqx.exe

                  Filesize

                  49KB

                  MD5

                  298c88be018c77c8207db0f04965b4cf

                  SHA1

                  3ac915977f89a4083a8946140ef5585a1ec42697

                  SHA256

                  6b7239ff74a56b3d1ebf5679efc353d97da0ec2007a172cd8786d7bba6d211f1

                  SHA512

                  b4a2e750344b3a11a83de862f9c9cd637888e368b2a98f0456ecf8fc82da932085f86bf240207b3c17bd05c13b7fa65b26d5f98c2d18e516bd3e5245c24931e9

                • \Windows\SysWOW64\psnwqx.exe

                  Filesize

                  49KB

                  MD5

                  298c88be018c77c8207db0f04965b4cf

                  SHA1

                  3ac915977f89a4083a8946140ef5585a1ec42697

                  SHA256

                  6b7239ff74a56b3d1ebf5679efc353d97da0ec2007a172cd8786d7bba6d211f1

                  SHA512

                  b4a2e750344b3a11a83de862f9c9cd637888e368b2a98f0456ecf8fc82da932085f86bf240207b3c17bd05c13b7fa65b26d5f98c2d18e516bd3e5245c24931e9

                • \Windows\SysWOW64\usbmpx.exe

                  Filesize

                  11KB

                  MD5

                  dd03eadd21e6eb5bb5a78cbca659f231

                  SHA1

                  e7e7ef35b64d32709bf8a7ce5c7c6aa790232e01

                  SHA256

                  9390da2bee16812d225f5b94f1250dfc0f505a97269600f5cc9c01129262e252

                  SHA512

                  939d85fbf63af43838a3b209f90eec15c93ba926a549c8832f17bafc0b4a131f7357174a43b587e4f21998751617b76f8078e910155613e3f71d56bfccc9ce36

                • \Windows\SysWOW64\usbmpx.exe

                  Filesize

                  11KB

                  MD5

                  dd03eadd21e6eb5bb5a78cbca659f231

                  SHA1

                  e7e7ef35b64d32709bf8a7ce5c7c6aa790232e01

                  SHA256

                  9390da2bee16812d225f5b94f1250dfc0f505a97269600f5cc9c01129262e252

                  SHA512

                  939d85fbf63af43838a3b209f90eec15c93ba926a549c8832f17bafc0b4a131f7357174a43b587e4f21998751617b76f8078e910155613e3f71d56bfccc9ce36

                • \Windows\SysWOW64\usbmpx.exe

                  Filesize

                  11KB

                  MD5

                  dd03eadd21e6eb5bb5a78cbca659f231

                  SHA1

                  e7e7ef35b64d32709bf8a7ce5c7c6aa790232e01

                  SHA256

                  9390da2bee16812d225f5b94f1250dfc0f505a97269600f5cc9c01129262e252

                  SHA512

                  939d85fbf63af43838a3b209f90eec15c93ba926a549c8832f17bafc0b4a131f7357174a43b587e4f21998751617b76f8078e910155613e3f71d56bfccc9ce36

                • memory/864-54-0x0000000076831000-0x0000000076833000-memory.dmp

                  Filesize

                  8KB

                • memory/1620-124-0x0000000003330000-0x0000000003534000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1620-125-0x0000000003330000-0x0000000003534000-memory.dmp

                  Filesize

                  2.0MB