Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe
Resource
win7-20220901-en
General
-
Target
838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe
-
Size
1.3MB
-
MD5
2ceb126e45e29ae5260343d67d666379
-
SHA1
44bfc88df3e9bbaddbc08da0d2cfb18cce9d7722
-
SHA256
838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933
-
SHA512
142317bf8f5f5a2bb09011b90fe1b20c6d465f74aaa4b429554e0bbb9841f2ac1fffc6fbdf7b2f1ac4417732b14550a21162871404a0bb28c0c9e9697ef12039
-
SSDEEP
24576:1t24elz/eTxEP26JA7bnH2v27efUlcaVW67fsMxTLc2UgaRg299pWN7wyyw:h/WPK7QlsqKWKf15op1Wiyh
Malware Config
Extracted
darkcomet
Guest16
5.254.112.46:1604
DC_MUTEX-TWH65U6
-
gencode
g2krJbMz8YKU
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
rsqrc.batrsqrc.batRegSvcs.exepid process 2036 rsqrc.bat 1952 rsqrc.bat 948 RegSvcs.exe -
Processes:
resource yara_rule behavioral1/memory/948-95-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/948-97-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/948-98-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/948-101-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/948-103-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/948-105-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/948-106-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/948-107-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Loads dropped DLL 7 IoCs
Processes:
838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exersqrc.batrsqrc.batpid process 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe 2036 rsqrc.bat 1952 rsqrc.bat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rsqrc.batdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\jhnjd\\rsqrc.bat C:\\Users\\Admin\\AppData\\Roaming\\jhnjd\\wptjq.kll" rsqrc.bat Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run rsqrc.bat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rsqrc.batdescription pid process target process PID 1952 set thread context of 948 1952 rsqrc.bat RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1284 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
rsqrc.batpid process 1952 rsqrc.bat 1952 rsqrc.bat 1952 rsqrc.bat 1952 rsqrc.bat 1952 rsqrc.bat 1952 rsqrc.bat 1952 rsqrc.bat 1952 rsqrc.bat 1952 rsqrc.bat -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
taskkill.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1284 taskkill.exe Token: SeIncreaseQuotaPrivilege 948 RegSvcs.exe Token: SeSecurityPrivilege 948 RegSvcs.exe Token: SeTakeOwnershipPrivilege 948 RegSvcs.exe Token: SeLoadDriverPrivilege 948 RegSvcs.exe Token: SeSystemProfilePrivilege 948 RegSvcs.exe Token: SeSystemtimePrivilege 948 RegSvcs.exe Token: SeProfSingleProcessPrivilege 948 RegSvcs.exe Token: SeIncBasePriorityPrivilege 948 RegSvcs.exe Token: SeCreatePagefilePrivilege 948 RegSvcs.exe Token: SeBackupPrivilege 948 RegSvcs.exe Token: SeRestorePrivilege 948 RegSvcs.exe Token: SeShutdownPrivilege 948 RegSvcs.exe Token: SeDebugPrivilege 948 RegSvcs.exe Token: SeSystemEnvironmentPrivilege 948 RegSvcs.exe Token: SeChangeNotifyPrivilege 948 RegSvcs.exe Token: SeRemoteShutdownPrivilege 948 RegSvcs.exe Token: SeUndockPrivilege 948 RegSvcs.exe Token: SeManageVolumePrivilege 948 RegSvcs.exe Token: SeImpersonatePrivilege 948 RegSvcs.exe Token: SeCreateGlobalPrivilege 948 RegSvcs.exe Token: 33 948 RegSvcs.exe Token: 34 948 RegSvcs.exe Token: 35 948 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1444 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 948 RegSvcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exersqrc.batrsqrc.batdescription pid process target process PID 1460 wrote to memory of 2036 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe rsqrc.bat PID 1460 wrote to memory of 2036 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe rsqrc.bat PID 1460 wrote to memory of 2036 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe rsqrc.bat PID 1460 wrote to memory of 2036 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe rsqrc.bat PID 1460 wrote to memory of 2036 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe rsqrc.bat PID 1460 wrote to memory of 2036 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe rsqrc.bat PID 1460 wrote to memory of 2036 1460 838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe rsqrc.bat PID 2036 wrote to memory of 1952 2036 rsqrc.bat rsqrc.bat PID 2036 wrote to memory of 1952 2036 rsqrc.bat rsqrc.bat PID 2036 wrote to memory of 1952 2036 rsqrc.bat rsqrc.bat PID 2036 wrote to memory of 1952 2036 rsqrc.bat rsqrc.bat PID 2036 wrote to memory of 1952 2036 rsqrc.bat rsqrc.bat PID 2036 wrote to memory of 1952 2036 rsqrc.bat rsqrc.bat PID 2036 wrote to memory of 1952 2036 rsqrc.bat rsqrc.bat PID 1952 wrote to memory of 976 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 976 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 976 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 976 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 976 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 976 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 976 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 2004 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 2004 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 2004 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 2004 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 2004 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 2004 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 2004 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1652 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1652 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1652 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1652 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1652 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1652 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1652 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 816 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 816 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 816 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 816 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 816 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 816 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 816 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 672 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 672 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 672 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 672 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 672 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 672 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 672 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 364 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 364 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 364 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 364 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 364 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 364 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 364 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1692 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1692 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1692 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1692 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1692 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1692 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 1692 1952 rsqrc.bat mshta.exe PID 1952 wrote to memory of 524 1952 rsqrc.bat cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe"C:\Users\Admin\AppData\Local\Temp\838ba1578a4d8a917dd4f9ef7754a9e25389b4d67d271c3c71500c55f5f62933.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Roaming\jhnjd\rsqrc.bat"C:\Users\Admin\AppData\Roaming\jhnjd\rsqrc.bat" wptjq.kll2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batC:\Users\Admin\AppData\Roaming\jhnjd\rsqrc.bat C:\Users\Admin\AppData\Roaming\jhnjd\GKIVI3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:976
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:2004
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:1652
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:816
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:672
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:364
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"4⤵PID:1692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C taskkill /f /IM mshta.exe4⤵PID:524
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /IM mshta.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:948
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
33KB
MD5aaa0a6db78a883fa65ded2f45bf0819d
SHA1f5af5366e662d6b608d9bea1add23fd0dfb23b75
SHA2561ed4ce274b96cc7a02429f04203f9e173d25a817953f3651444afa1b15fd3a15
SHA51231388ab17f959b77fe3f559cc48b39f5f0c644ff3217b6bf2e1e5044ceac6bf1ae906fe1018009e494d475b9732c7b9ca0cb56236377d7a4e4c702da7c06d73e
-
C:\Users\Admin\AppData\Roaming\jhnjd\GKIVIFilesize
117KB
MD53384979a23fbe4de79286b1901121b19
SHA15e69f43dcc8ed992ab17c233271712bb0bf60f13
SHA256ae2427d833c91c213875fe7e70b05c88e949859da91b33681d598e3fd6b4f740
SHA5120f98ff4b4c631dfc388e515dcaa3e858ed2c9581a63d9ab3ec588ea9ef17a593dc632c6f9093c13944812f273153ea0f0b37a1ca8aaa30a23d1199dcdf832fa3
-
C:\Users\Admin\AppData\Roaming\jhnjd\YMQGIXFilesize
36KB
MD50aac4b05aeb233740b90d11654cfb4c5
SHA1b593bba4350616176b1a545098120fff9e2d7e2a
SHA2561a9d10aeeff5c9d2b7fde7171980ce29585b7815fb40d10812a85768f12ff8ca
SHA5128225d0f32cd6ef4b2ce124dd534fd0127beafce07b88b38b0ce2c54d3d1249d53ad306b0524f48a706c7da38151a41a06d6935ce17d663663db19139bcc18120
-
C:\Users\Admin\AppData\Roaming\jhnjd\evcvtFilesize
1KB
MD529dbcf965f4dff981947089c033ce279
SHA14515a4a916ddd532916623a5c1e3dce65b23ebe0
SHA256a1b87f397a8247361bea88e4fc9586ab9cf0dda6b63025bd7e381861a1153b9b
SHA5125c12af9573942a9277de140f541f2b4793eb9de131f79a3b871890e390ae5c025a29b74f260d94792a3197ebb505f1416fb4d3d4769947e9bac6b30b9acd42c5
-
C:\Users\Admin\AppData\Roaming\jhnjd\kjuqxFilesize
253KB
MD5cc9b49169076c95352ff036ec8d5b417
SHA1961b7929f2f2a6a5847c90b5e31822cf9e9d9bd7
SHA256394554cefb606f39adf9fbd6bce30d4d9e7eed21d08a906f499702a3558df436
SHA512ca3f6463f1080e7471fcfc95cda867cebf1fd2a411232cbbc47c74cc100d5eb6f91aa4c9ce51bab72e267a7b79211e0193072b131d50c0f6b18e416afc394e07
-
C:\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
C:\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
C:\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
C:\Users\Admin\AppData\Roaming\jhnjd\ruhpc.nxmFilesize
117KB
MD574f54b55d58214debc9039ede4212c1a
SHA1f2008323fa362b20808c00c6b27001802059fafd
SHA25657f3016b9344b070f515928149652c0579c5319504c206a200412f44efb0c571
SHA512329953a8293b7247c03cad7ef93b2f6ba652e399256acb09f7c7820e6d17756520038ab20148b6b4f3cf6580c8a0b01719bfb4fe03ee7bb8148d61274150380a
-
C:\Users\Admin\AppData\Roaming\jhnjd\who.jpgFilesize
422KB
MD5fbfa893bdf7e3ebf0c6002422e309f5a
SHA16960c3b9120c31e7f147d5711279cd3f12642155
SHA25650dd467a197f04e93ddd3bb6dafeb7400446ee23aef75b53eaf18f77d5ab8bc9
SHA512049b5c3ecae33cd478b3a00d15dd36be8d33e942dea89ad9793f387d491d9352775c2c8b74e80143442bdee8440dc98c4d9fcab6e6b138c118d48c7d4c01790f
-
C:\Users\Admin\AppData\Roaming\jhnjd\wptjq.kllFilesize
3KB
MD579d5c6f556e0bd45eb399cb806488195
SHA10dbf3209bc2c21c4ce40497b8210b3d03e3a95a4
SHA256b6715a8d5b4651cbda91206008672a0350fbb22c9f159a253f33d63d575159ce
SHA512f0b6ef4db0edb893aaca0d12b0491e8c00e654df6e39fb271b0dad6fe2b25b71a53582fdf2377324ba2958bc4ae3b29de9b3352fa5f1842fdc6653a8b689551b
-
\Users\Admin\AppData\Local\Temp\RegSvcs.exeFilesize
33KB
MD5aaa0a6db78a883fa65ded2f45bf0819d
SHA1f5af5366e662d6b608d9bea1add23fd0dfb23b75
SHA2561ed4ce274b96cc7a02429f04203f9e173d25a817953f3651444afa1b15fd3a15
SHA51231388ab17f959b77fe3f559cc48b39f5f0c644ff3217b6bf2e1e5044ceac6bf1ae906fe1018009e494d475b9732c7b9ca0cb56236377d7a4e4c702da7c06d73e
-
\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
\Users\Admin\AppData\Roaming\jhnjd\rsqrc.batFilesize
731KB
MD5a3f4db4d9a13413af1a172eb61dfa83a
SHA1900655e1c4b7c14ca7c92ddb7a81dbd4fbcf2ee9
SHA2560bf1d81ebe9d6325dcbf6f6be3c2ed121c0032d692994a857e588f36df742448
SHA5123a07cec8a8702c38d9452ecae4d5228de7a9a999cd41944e3a387cd4776725958e7b83b27bb762bd5d8da3399aedc3a43664edc7ce106612967a74f22a3ff595
-
memory/364-83-0x0000000000000000-mapping.dmp
-
memory/524-87-0x0000000000000000-mapping.dmp
-
memory/672-81-0x0000000000000000-mapping.dmp
-
memory/816-79-0x0000000000000000-mapping.dmp
-
memory/948-107-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-98-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-105-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-103-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-95-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-101-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-106-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-99-0x00000000004B8C50-mapping.dmp
-
memory/948-94-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/948-97-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/976-74-0x0000000000000000-mapping.dmp
-
memory/1284-89-0x0000000000000000-mapping.dmp
-
memory/1460-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/1652-78-0x0000000000000000-mapping.dmp
-
memory/1692-85-0x0000000000000000-mapping.dmp
-
memory/1952-69-0x0000000000000000-mapping.dmp
-
memory/2004-76-0x0000000000000000-mapping.dmp
-
memory/2036-61-0x0000000000000000-mapping.dmp