Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 09:19
Behavioral task
behavioral1
Sample
ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe
Resource
win10v2004-20220901-en
General
-
Target
ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe
-
Size
243KB
-
MD5
44643696a1c92cad0c89458847d6712d
-
SHA1
b2d8c4b2dfae4b17b3bdbcf32984da816d6bbbd7
-
SHA256
ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55
-
SHA512
f0a81d56c6a6d5cd4c991831ba281b989952a212c247bded6c26616d4365298c9905025bbe6925e4bf851fd119ab05fb8994b5a98a8fd3bdd55453e46b76521f
-
SSDEEP
6144:ttsH5vwieeDU5kU6qjBq+W8jZ7rvaU3+mW4ZeoSKo:ywiex5khq8jeFzF7ZeoSZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Processes:
IMG0012.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMG0012.exe -
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2320-136-0x0000000000400000-0x0000000000451000-memory.dmp modiloader_stage2 behavioral2/memory/2320-144-0x0000000000400000-0x0000000000451000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
IMG0012.exepid process 2320 IMG0012.exe -
Processes:
resource yara_rule behavioral2/memory/4252-132-0x0000000000400000-0x000000000040D000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IMG0012.exe upx C:\Users\Admin\AppData\Local\Temp\IMG0012.exe upx behavioral2/memory/2320-136-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4252-137-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/2320-144-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe -
Loads dropped DLL 6 IoCs
Processes:
IMG0012.exeIEXPLORE.EXEpid process 2320 IMG0012.exe 2320 IMG0012.exe 2320 IMG0012.exe 2320 IMG0012.exe 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE -
Processes:
IMG0012.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMG0012.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IMG0012.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1399936480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7EED901E-6FED-11ED-A0EE-F63A18EFECFD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1399936480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999546" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906cc154fa03d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376495109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30999546" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30999546" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1408689060" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d79060000000002000000000010660000000100002000000014dbae9828372644f4820429cfb81b3cc816121fc6499ce6bdc8cdb6f188e4f0000000000e8000000002000020000000e07ca79ecb969e4b1f41839378b1c0f57b504461c8b945cbffa5dbbd41b6b7d9200000007887eb1e3282ae93f891904406314ede683d75abd6e7729b109f4265ccaaa609400000007f835a93fb92a3d51f3f2fe54a221223ddeed4773243bd8260aa25744f034991b01d540f18e5018089bd2800e87b913ea4e8bb8454393a6e34d2c23856d2f459 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cab054fa03d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d7906000000000200000000001066000000010000200000000d79001c8f9d0c0b3774385d618cff3bc162c0ed338d958be98bdefff207a190000000000e8000000002000020000000f11c2d51c75567cb84dd2d355752b2e270400948bc4f203efd9bf86e016bec3c200000005a83b82e7b8b8d1715250b52e6c57f865c2b2387a49d7b2037cfecfc8aa76fe640000000a43c2f693e4629f35cdc9539919ba654afa750d69b3fa5ffe11b4abbc2ee397a3337444bb19a9d2fd56987907ae0ceebca27ebbd7615637a3d0f94b84253b52f iexplore.exe -
Modifies registry class 1 IoCs
Processes:
ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
IMG0012.exevssvc.exeIEXPLORE.EXEdescription pid process Token: SeDebugPrivilege 2320 IMG0012.exe Token: SeBackupPrivilege 4864 vssvc.exe Token: SeRestorePrivilege 4864 vssvc.exe Token: SeAuditPrivilege 4864 vssvc.exe Token: SeDebugPrivilege 2320 IMG0012.exe Token: SeDebugPrivilege 3740 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIMG0012.exepid process 3968 iexplore.exe 3968 iexplore.exe 3740 IEXPLORE.EXE 3740 IEXPLORE.EXE 2320 IMG0012.exe 2320 IMG0012.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exeiexplore.exedescription pid process target process PID 4252 wrote to memory of 2320 4252 ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe IMG0012.exe PID 4252 wrote to memory of 2320 4252 ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe IMG0012.exe PID 4252 wrote to memory of 2320 4252 ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe IMG0012.exe PID 4252 wrote to memory of 3968 4252 ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe iexplore.exe PID 4252 wrote to memory of 3968 4252 ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe iexplore.exe PID 3968 wrote to memory of 3740 3968 iexplore.exe IEXPLORE.EXE PID 3968 wrote to memory of 3740 3968 iexplore.exe IEXPLORE.EXE PID 3968 wrote to memory of 3740 3968 iexplore.exe IEXPLORE.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
IMG0012.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMG0012.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe"C:\Users\Admin\AppData\Local\Temp\ba0ad305e5680f0f61789e864090fc11772378937b8adf1536b3273112c73d55.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IMG0012.exe"C:\Users\Admin\AppData\Local\Temp\IMG0012.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\kub.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3968 CREDAT:17410 /prefetch:23⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5bd4f3cb3175ff83bbc2c827705950a60
SHA19d940539de8317a8a6444559d9fc9f190dd9f80b
SHA256ff821119d7d2bf9d795503ed63996c81611b84cdcdacac943da9a9ae2d0d2384
SHA51202b99cb5a7e2cf6004fd010c5718f85830aca7b6f43b5ed929d2df8ca4209a29cfd9e54280a35392b2617ab58e578c097834ce24e9baa8b226c6181c64c0d377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
434B
MD5cd9753df50dbfa5ef31cd0a7801b4637
SHA1b1a5281a9054724a80913e640e0a4f014e4bea8b
SHA2568e5317f5cd406519b0321d497e152528488860f20fc0ea69b993ff8c581a5bb8
SHA51298997157a33e0d3c6318ef87e99a4010645d8a6256a5e9e9ac8c587f4966b2a3fa34767354ab590ef2fb1fb43d2f99414630e04269a3448660c0133d10a4da11
-
C:\Users\Admin\AppData\Local\Temp\IMG0012.exeFilesize
113KB
MD5849dfc2e717d555679040c40ddbefee4
SHA1e15aca3e1f9036ca94f091340e2cf29d3add4933
SHA2560e07607bf4988792060788b79db2ef4c3f08c822f84d53f94df19bbe4a01a6da
SHA512e92e080e9f81ca601a29bfbc3bbb9fde3ba521fcc7daf952a8d7c0aed09a96c698b79ed8145ec53fe2d8058e11282883295abb9ee3adfaaf468a43b08cb9d309
-
C:\Users\Admin\AppData\Local\Temp\IMG0012.exeFilesize
113KB
MD5849dfc2e717d555679040c40ddbefee4
SHA1e15aca3e1f9036ca94f091340e2cf29d3add4933
SHA2560e07607bf4988792060788b79db2ef4c3f08c822f84d53f94df19bbe4a01a6da
SHA512e92e080e9f81ca601a29bfbc3bbb9fde3ba521fcc7daf952a8d7c0aed09a96c698b79ed8145ec53fe2d8058e11282883295abb9ee3adfaaf468a43b08cb9d309
-
C:\Users\Admin\AppData\Local\Temp\cmsetac.dllFilesize
33KB
MD549616bec13d584f8e3b7db118a487152
SHA125311db5ff28d48c9eeb067fb185e8dff0f2e11d
SHA25656f1dcd83fbfe3a0e067981dc44f9478c0b2200897b3d6c799d9ef105033c70e
SHA5125deaa832321f5a49e8649cc55b4b429810afbc45d0f0d44fa2b6d6714d0c47ce1b6656ba6bd1cd2dfbfa0654c0cd813dcd02b19cc5820888b353917d4a541d8b
-
C:\Users\Admin\AppData\Local\Temp\cmsetac.dllFilesize
33KB
MD549616bec13d584f8e3b7db118a487152
SHA125311db5ff28d48c9eeb067fb185e8dff0f2e11d
SHA25656f1dcd83fbfe3a0e067981dc44f9478c0b2200897b3d6c799d9ef105033c70e
SHA5125deaa832321f5a49e8649cc55b4b429810afbc45d0f0d44fa2b6d6714d0c47ce1b6656ba6bd1cd2dfbfa0654c0cd813dcd02b19cc5820888b353917d4a541d8b
-
C:\Users\Admin\AppData\Local\Temp\cmsetac.dllFilesize
33KB
MD549616bec13d584f8e3b7db118a487152
SHA125311db5ff28d48c9eeb067fb185e8dff0f2e11d
SHA25656f1dcd83fbfe3a0e067981dc44f9478c0b2200897b3d6c799d9ef105033c70e
SHA5125deaa832321f5a49e8649cc55b4b429810afbc45d0f0d44fa2b6d6714d0c47ce1b6656ba6bd1cd2dfbfa0654c0cd813dcd02b19cc5820888b353917d4a541d8b
-
C:\Users\Admin\AppData\Local\Temp\cmsetac.dllFilesize
33KB
MD549616bec13d584f8e3b7db118a487152
SHA125311db5ff28d48c9eeb067fb185e8dff0f2e11d
SHA25656f1dcd83fbfe3a0e067981dc44f9478c0b2200897b3d6c799d9ef105033c70e
SHA5125deaa832321f5a49e8649cc55b4b429810afbc45d0f0d44fa2b6d6714d0c47ce1b6656ba6bd1cd2dfbfa0654c0cd813dcd02b19cc5820888b353917d4a541d8b
-
C:\Users\Admin\AppData\Local\Temp\cmsetac.dllFilesize
33KB
MD549616bec13d584f8e3b7db118a487152
SHA125311db5ff28d48c9eeb067fb185e8dff0f2e11d
SHA25656f1dcd83fbfe3a0e067981dc44f9478c0b2200897b3d6c799d9ef105033c70e
SHA5125deaa832321f5a49e8649cc55b4b429810afbc45d0f0d44fa2b6d6714d0c47ce1b6656ba6bd1cd2dfbfa0654c0cd813dcd02b19cc5820888b353917d4a541d8b
-
C:\Users\Admin\AppData\Local\Temp\kub.gifFilesize
121KB
MD5da7c2e72525f7b41163721cad6b7f513
SHA18f4d787b2de385b731cc8429426c2134b7d2f12a
SHA256925f81f01e3ad300969f10af624febf1ea74a4d8c1a613ab72e9998bd41177d7
SHA512dc35e038473e6c4f7be06cd0b6059551b59826555a9280924ed841959070e2859050a07810c25f70c2458b4160a4da6ee6130471b2742da3d7a3170cbbacebff
-
C:\Users\Admin\AppData\Local\Temp\ntdtcstp.dllFilesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350
-
C:\Users\Admin\AppData\Local\Temp\ntdtcstp.dllFilesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350
-
memory/2320-136-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/2320-144-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/2320-143-0x00000000036C0000-0x00000000036CE000-memory.dmpFilesize
56KB
-
memory/2320-133-0x0000000000000000-mapping.dmp
-
memory/4252-137-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/4252-132-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB