Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 16:14

General

  • Target

    19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe

  • Size

    810KB

  • MD5

    607fc24e7b4fa69bab6c1c53839a7c15

  • SHA1

    534b8db73692f3a7266271eb26dfaa3e3d7f8c50

  • SHA256

    19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e

  • SHA512

    7e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906

  • SSDEEP

    12288:gRm0OqZQDi02wPW6QIOd4/vqUfcfSpKUy7:K2Dd2g1a+3tfYSpW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Signatures

  • Modifies firewall policy service 2 TTPs 9 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 3 IoCs
  • Windows security bypass 2 TTPs 18 IoCs
  • Disables RegEdit via registry modification 3 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 5 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\dwm.exe
    "dwm.exe"
    1⤵
      PID:1016
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:784
      • C:\Windows\system32\fontdrvhost.exe
        "fontdrvhost.exe"
        1⤵
          PID:780
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2392
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:3424
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3356
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:3268
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:1996
                  • C:\Windows\Explorer.EXE
                    C:\Windows\Explorer.EXE
                    1⤵
                      PID:2736
                      • C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe
                        "C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe"
                        2⤵
                        • Modifies firewall policy service
                        • UAC bypass
                        • Windows security bypass
                        • Disables RegEdit via registry modification
                        • Windows security modification
                        • Checks whether UAC is enabled
                        • Drops file in Program Files directory
                        • Drops file in Windows directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of UnmapMainImage
                        • Suspicious use of WriteProcessMemory
                        • System policy modification
                        PID:1608
                        • C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe
                          C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe
                          3⤵
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • Suspicious use of UnmapMainImage
                          • Suspicious use of WriteProcessMemory
                          PID:4692
                          • C:\Program Files (x86)\Microsoft\WaterMark.exe
                            "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                            4⤵
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of UnmapMainImage
                            • Suspicious use of WriteProcessMemory
                            PID:3192
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              5⤵
                              • Modifies Internet Explorer settings
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              PID:3176
                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3176 CREDAT:17410 /prefetch:2
                                6⤵
                                • Modifies Internet Explorer settings
                                • Suspicious use of SetWindowsHookEx
                                PID:4640
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              5⤵
                              • Modifies Internet Explorer settings
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              PID:1920
                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:17410 /prefetch:2
                                6⤵
                                • Modifies firewall policy service
                                • UAC bypass
                                • Windows security bypass
                                • Disables RegEdit via registry modification
                                • Drops file in Program Files directory
                                • Modifies Internet Explorer settings
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:4596
                        • C:\Program Files (x86)\Microsoft\WaterMark.exe
                          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                          3⤵
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of UnmapMainImage
                          • Suspicious use of WriteProcessMemory
                          PID:996
                          • C:\Windows\SysWOW64\svchost.exe
                            C:\Windows\system32\svchost.exe
                            4⤵
                              PID:1652
                            • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe
                              "C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"
                              4⤵
                              • Executes dropped EXE
                              • Drops file in Program Files directory
                              • Suspicious use of UnmapMainImage
                              • Suspicious use of WriteProcessMemory
                              PID:4832
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              4⤵
                              • Modifies Internet Explorer settings
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              PID:2780
                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:17410 /prefetch:2
                                5⤵
                                • Modifies Internet Explorer settings
                                • Suspicious use of SetWindowsHookEx
                                PID:3100
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              4⤵
                                PID:2404
                        • C:\Windows\system32\taskhostw.exe
                          taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                          1⤵
                            PID:2740
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            1⤵
                              PID:4760
                            • C:\Windows\System32\RuntimeBroker.exe
                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                              1⤵
                                PID:3808
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:3516
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                  1⤵
                                    PID:2436
                                  • C:\Windows\SysWOW64\svchost.exe
                                    C:\Windows\system32\svchost.exe
                                    1⤵
                                      PID:1764
                                    • C:\Program Files (x86)\Microsoft\WaterMark.exe
                                      "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                                      1⤵
                                      • Modifies firewall policy service
                                      • UAC bypass
                                      • Windows security bypass
                                      • Disables RegEdit via registry modification
                                      • Executes dropped EXE
                                      • Windows security modification
                                      • Checks whether UAC is enabled
                                      • Drops file in Program Files directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of UnmapMainImage
                                      • Suspicious use of WriteProcessMemory
                                      • System policy modification
                                      PID:5112
                                      • C:\Windows\SysWOW64\svchost.exe
                                        C:\Windows\system32\svchost.exe
                                        2⤵
                                          PID:3440
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                          2⤵
                                          • Modifies Internet Explorer settings
                                          PID:2160
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                          2⤵
                                          • Modifies Internet Explorer settings
                                          PID:2284
                                        • C:\Windows\SysWOW64\NOTEPAD.EXE
                                          "C:\Windows\system32\NOTEPAD.EXE"
                                          2⤵
                                            PID:2548
                                          • C:\Windows\SysWOW64\NOTEPAD.EXE
                                            "C:\Windows\system32\NOTEPAD.EXE"
                                            2⤵
                                              PID:960

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\ODT\office2016setup.exe

                                            Filesize

                                            5.1MB

                                            MD5

                                            135d0d993b22665af76ddd2cfc514d03

                                            SHA1

                                            9d2512797d60c893d209faf0864aaddd19bc4312

                                            SHA256

                                            cb18c994c7a949dbbcf1f2028e9975eba26cbb1e7800b9f4b4a3f94a4e82be58

                                            SHA512

                                            5fb0b651a1e0718a59e4015b390d597d0a7ee74eaed560359a632c8f0be9f05f7569b76f0474fdb0025323fe38bf159f0fedcc009975d970d66de175ed9da3b2

                                          • C:\Program Files (x86)\Microsoft\WaterMark.exe

                                            Filesize

                                            810KB

                                            MD5

                                            607fc24e7b4fa69bab6c1c53839a7c15

                                            SHA1

                                            534b8db73692f3a7266271eb26dfaa3e3d7f8c50

                                            SHA256

                                            19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e

                                            SHA512

                                            7e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906

                                          • C:\Program Files (x86)\Microsoft\WaterMark.exe

                                            Filesize

                                            810KB

                                            MD5

                                            607fc24e7b4fa69bab6c1c53839a7c15

                                            SHA1

                                            534b8db73692f3a7266271eb26dfaa3e3d7f8c50

                                            SHA256

                                            19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e

                                            SHA512

                                            7e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906

                                          • C:\Program Files (x86)\Microsoft\WaterMark.exe

                                            Filesize

                                            810KB

                                            MD5

                                            607fc24e7b4fa69bab6c1c53839a7c15

                                            SHA1

                                            534b8db73692f3a7266271eb26dfaa3e3d7f8c50

                                            SHA256

                                            19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e

                                            SHA512

                                            7e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906

                                          • C:\Program Files (x86)\Microsoft\WaterMark.exe

                                            Filesize

                                            810KB

                                            MD5

                                            607fc24e7b4fa69bab6c1c53839a7c15

                                            SHA1

                                            534b8db73692f3a7266271eb26dfaa3e3d7f8c50

                                            SHA256

                                            19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e

                                            SHA512

                                            7e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906

                                          • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe

                                            Filesize

                                            404KB

                                            MD5

                                            3a51be334f3cedd7185130cd60047496

                                            SHA1

                                            5572a04718cffb848ae660713415b8ab95b3ec5c

                                            SHA256

                                            3e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b

                                            SHA512

                                            ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783

                                          • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe

                                            Filesize

                                            404KB

                                            MD5

                                            3a51be334f3cedd7185130cd60047496

                                            SHA1

                                            5572a04718cffb848ae660713415b8ab95b3ec5c

                                            SHA256

                                            3e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b

                                            SHA512

                                            ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                            Filesize

                                            471B

                                            MD5

                                            5f49b65bdc1713b58ed97d0e9625a968

                                            SHA1

                                            84b74e55478c9abb163aa6629e3fd3b91bed4806

                                            SHA256

                                            a681ab9abc281fd12a7bd06f56e36a21e8ee28b5294815c5e07b781e324a32f9

                                            SHA512

                                            4b502288bef324db8ad33e63c7b6f242ef7954a6fbec3ed012530044c82fee3ad1158febe088bc0deea67ac35646a0a1bd6d961c0f67b11fee584e4f1abd753a

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                            Filesize

                                            434B

                                            MD5

                                            d7bc9ab8744b751295260cd292f9df92

                                            SHA1

                                            95e161169e0c12f8a1c96c9c721c2de0fa630b82

                                            SHA256

                                            e21d3c4090e8ef0331fba0f36b49e4f93b72f3d79583afb89d742131bffc3d12

                                            SHA512

                                            832bdd3a86f855e9a1af5fb35cc86bf22726eb5ca38c70e3e0ab52711d91c56cdcddcbec008cb10a2307ca025629bea405d87c16b124e62f4a34d1f5c3cc0c71

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                            Filesize

                                            434B

                                            MD5

                                            d7bc9ab8744b751295260cd292f9df92

                                            SHA1

                                            95e161169e0c12f8a1c96c9c721c2de0fa630b82

                                            SHA256

                                            e21d3c4090e8ef0331fba0f36b49e4f93b72f3d79583afb89d742131bffc3d12

                                            SHA512

                                            832bdd3a86f855e9a1af5fb35cc86bf22726eb5ca38c70e3e0ab52711d91c56cdcddcbec008cb10a2307ca025629bea405d87c16b124e62f4a34d1f5c3cc0c71

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                            Filesize

                                            434B

                                            MD5

                                            d7bc9ab8744b751295260cd292f9df92

                                            SHA1

                                            95e161169e0c12f8a1c96c9c721c2de0fa630b82

                                            SHA256

                                            e21d3c4090e8ef0331fba0f36b49e4f93b72f3d79583afb89d742131bffc3d12

                                            SHA512

                                            832bdd3a86f855e9a1af5fb35cc86bf22726eb5ca38c70e3e0ab52711d91c56cdcddcbec008cb10a2307ca025629bea405d87c16b124e62f4a34d1f5c3cc0c71

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                            Filesize

                                            434B

                                            MD5

                                            386f6c5ee42f3ebcc442f0b0de468b2b

                                            SHA1

                                            b9362c43b07da3b168716d3f66857237ae1f66ed

                                            SHA256

                                            98080afd98ca4d0ca618617a998160c3274e7516bfc06e54cf4991ce95dedabd

                                            SHA512

                                            8d5a7cbc4f08111c1d29bc1d3c7f6b6fae1d7da7544e26cb2f02f4af2cb636e59cfbae12c08b8f4817a312e2f45e1c290e460272d923a8a803e938398a55982c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E02D5827-5F44-11ED-A0EE-7ADCB3813C8F}.dat

                                            Filesize

                                            3KB

                                            MD5

                                            fabff1e56065d6494da790e9bffdb3f5

                                            SHA1

                                            309b0394d7c1561f80e8f8a5a74700324fd5d4bf

                                            SHA256

                                            9fd502950739ef41b068dba680da60dd60a50cd3da8a560c94ed7484f5cc38c5

                                            SHA512

                                            e1c5dfb2aa06b2e703b915344cabcbc863db975d722b7b086ed7e4102755a6c54d4cfac77589f79ea8c8a4add61c88e943c9de3a3eda90f4058631a562459d1a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E02D5827-5F44-11ED-A0EE-7ADCB3813C8F}.dat

                                            Filesize

                                            5KB

                                            MD5

                                            5dd64efafffdb12763456e5847234e02

                                            SHA1

                                            e3568584c3d62de7c6f182f414be20a7075bb039

                                            SHA256

                                            a0f7389892333317b06442610e15f492c9e8596e72a0de42ad34109bd30040eb

                                            SHA512

                                            c11f8350bad36920ef190cc0767a0415603ba11da8c77d362f588bb1ddd01cae7510b1fbafeb8fd1202a96a09e481c4decbe7999198f562e5bee17c94c9a61ea

                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E0321E07-5F44-11ED-A0EE-7ADCB3813C8F}.dat

                                            Filesize

                                            5KB

                                            MD5

                                            5399945990d522bff7c3ccdd3b811b12

                                            SHA1

                                            c9c7dbe0ae3cae1ef593119e586afe1a3c03eb0a

                                            SHA256

                                            8a418e094319988b6ee924b5c4e8ece4275f29cff1333290f46b2f30dece1678

                                            SHA512

                                            0a5d2c04153734a1f16543cb33b5a86eac6cbe0f7ebeccf4283dd3c68ce5f73c9d5715a794a71594206ba6b263497a4ab54df0d2d38370c8d0a6c57685ad41a0

                                          • C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe

                                            Filesize

                                            404KB

                                            MD5

                                            3a51be334f3cedd7185130cd60047496

                                            SHA1

                                            5572a04718cffb848ae660713415b8ab95b3ec5c

                                            SHA256

                                            3e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b

                                            SHA512

                                            ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783

                                          • C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe

                                            Filesize

                                            404KB

                                            MD5

                                            3a51be334f3cedd7185130cd60047496

                                            SHA1

                                            5572a04718cffb848ae660713415b8ab95b3ec5c

                                            SHA256

                                            3e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b

                                            SHA512

                                            ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783

                                          • C:\Windows\SYSTEM.INI

                                            Filesize

                                            258B

                                            MD5

                                            bc8ef324ba9e648b21cad520bb930ec1

                                            SHA1

                                            b74fd11e133e05970d4afd8054d19eea70cd407b

                                            SHA256

                                            bfaad3dce26fdb61269a11cf9b699faa3ccb12ac182f02d6880fc6a9c1f2c062

                                            SHA512

                                            fbb1bdc34dadea90e71a328ef03b7cd9c15f772b01bdf8d021018f75cbd404f4962172edb816f9fd6bb8081a10d97ea433ba0897d8c150acd1a86e5578444281

                                          • memory/960-212-0x0000000000690000-0x00000000006A4000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/996-175-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/996-208-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/996-199-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/996-193-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/996-196-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/1608-132-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/1608-144-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/1608-153-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/1608-160-0x0000000004B40000-0x0000000005BCE000-memory.dmp

                                            Filesize

                                            16.6MB

                                          • memory/1608-137-0x0000000004B40000-0x0000000005BCE000-memory.dmp

                                            Filesize

                                            16.6MB

                                          • memory/1608-136-0x0000000003710000-0x000000000473A000-memory.dmp

                                            Filesize

                                            16.2MB

                                          • memory/1608-147-0x0000000003710000-0x000000000473A000-memory.dmp

                                            Filesize

                                            16.2MB

                                          • memory/1608-143-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/2548-210-0x0000000000840000-0x0000000000854000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/3192-181-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/3192-195-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/3192-209-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/3192-174-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/3192-170-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/4692-157-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/4692-141-0x0000000000400000-0x0000000000470000-memory.dmp

                                            Filesize

                                            448KB

                                          • memory/4832-167-0x0000000000400000-0x0000000000470000-memory.dmp

                                            Filesize

                                            448KB

                                          • memory/4832-178-0x0000000000400000-0x0000000000470000-memory.dmp

                                            Filesize

                                            448KB

                                          • memory/4832-164-0x0000000000400000-0x0000000000470000-memory.dmp

                                            Filesize

                                            448KB

                                          • memory/4832-183-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/5112-214-0x0000000000400000-0x0000000000421000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/5112-197-0x0000000004730000-0x00000000057BE000-memory.dmp

                                            Filesize

                                            16.6MB

                                          • memory/5112-202-0x0000000003300000-0x000000000432A000-memory.dmp

                                            Filesize

                                            16.2MB

                                          • memory/5112-213-0x0000000004730000-0x00000000057BE000-memory.dmp

                                            Filesize

                                            16.6MB

                                          • memory/5112-200-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/5112-215-0x0000000003300000-0x000000000432A000-memory.dmp

                                            Filesize

                                            16.2MB

                                          • memory/5112-186-0x0000000004730000-0x00000000057BE000-memory.dmp

                                            Filesize

                                            16.6MB

                                          • memory/5112-201-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/5112-185-0x0000000003300000-0x000000000432A000-memory.dmp

                                            Filesize

                                            16.2MB

                                          • memory/5112-198-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB

                                          • memory/5112-203-0x0000000000400000-0x00000000004D6000-memory.dmp

                                            Filesize

                                            856KB