Analysis
-
max time kernel
180s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 11:44
Behavioral task
behavioral1
Sample
24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe
Resource
win7-20221111-en
General
-
Target
24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe
-
Size
902KB
-
MD5
24f9560078b41421ef6e7b578e11707d
-
SHA1
9538044dde6f01d845ed85f2aba2d6c5dba4ed84
-
SHA256
24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86
-
SHA512
d16e5473c101b5753e329b952acc84c3c6a0a61444e1a584b91e4966edf0f736bee7b34e096a19ae77be5de131da564a0295199156d088cf99bc6dff57caa63d
-
SSDEEP
24576:LAz5yV99MCTKMQtCypy9IvmAro8+Ehds7ULh6kR:MIEXpIchds7ULhL
Malware Config
Extracted
darkcomet
Guest16
nizamcik.zapto.org:1604
DC_MUTEX-11C9ZRU
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
dmLlC7W9J569
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
Processes:
WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$msdcsc.exepid process 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 1664 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$pid process 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$msdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$msdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeSecurityPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeTakeOwnershipPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeLoadDriverPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeSystemProfilePrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeSystemtimePrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeProfSingleProcessPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeIncBasePriorityPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeCreatePagefilePrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeBackupPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeRestorePrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeShutdownPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeDebugPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeSystemEnvironmentPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeChangeNotifyPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeRemoteShutdownPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeUndockPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeManageVolumePrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeImpersonatePrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeCreateGlobalPrivilege 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: 33 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: 34 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: 35 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Token: SeIncreaseQuotaPrivilege 1664 msdcsc.exe Token: SeSecurityPrivilege 1664 msdcsc.exe Token: SeTakeOwnershipPrivilege 1664 msdcsc.exe Token: SeLoadDriverPrivilege 1664 msdcsc.exe Token: SeSystemProfilePrivilege 1664 msdcsc.exe Token: SeSystemtimePrivilege 1664 msdcsc.exe Token: SeProfSingleProcessPrivilege 1664 msdcsc.exe Token: SeIncBasePriorityPrivilege 1664 msdcsc.exe Token: SeCreatePagefilePrivilege 1664 msdcsc.exe Token: SeBackupPrivilege 1664 msdcsc.exe Token: SeRestorePrivilege 1664 msdcsc.exe Token: SeShutdownPrivilege 1664 msdcsc.exe Token: SeDebugPrivilege 1664 msdcsc.exe Token: SeSystemEnvironmentPrivilege 1664 msdcsc.exe Token: SeChangeNotifyPrivilege 1664 msdcsc.exe Token: SeRemoteShutdownPrivilege 1664 msdcsc.exe Token: SeUndockPrivilege 1664 msdcsc.exe Token: SeManageVolumePrivilege 1664 msdcsc.exe Token: SeImpersonatePrivilege 1664 msdcsc.exe Token: SeCreateGlobalPrivilege 1664 msdcsc.exe Token: 33 1664 msdcsc.exe Token: 34 1664 msdcsc.exe Token: 35 1664 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 1664 msdcsc.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exeWindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$msdcsc.exedescription pid process target process PID 360 wrote to memory of 948 360 24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PID 360 wrote to memory of 948 360 24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PID 360 wrote to memory of 948 360 24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PID 360 wrote to memory of 948 360 24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1220 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ notepad.exe PID 948 wrote to memory of 1664 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ msdcsc.exe PID 948 wrote to memory of 1664 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ msdcsc.exe PID 948 wrote to memory of 1664 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ msdcsc.exe PID 948 wrote to memory of 1664 948 WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ msdcsc.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe PID 1664 wrote to memory of 1556 1664 msdcsc.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe"C:\Users\Admin\AppData\Local\Temp\24c1639572bc578e73fb540049f85965d7507193295d92f76182a74f1159cb86.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$C:\Users\Admin\AppData\Local\Temp\WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$Filesize
715KB
MD5414312cdb310c45b4eb399b7d8ea9469
SHA169d7034422d76f4ffefa9e53765c1cdab21f6297
SHA256706d041d6d4777163cb7ac730caf7f97f6f3f3bd6cfa06cddfb28efe3618b418
SHA5121756d4ac297bae3bf6718d328d981753e64964673ecfe4edab4f6942437ea6bd2b3b0064f2d6a5ba217befb8d36c1af78df0af909dcebd2bee037f829fcad380
-
C:\Users\Admin\AppData\Local\Temp\WindowsPerformanceController.oohqjqzw3il.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$Filesize
715KB
MD5414312cdb310c45b4eb399b7d8ea9469
SHA169d7034422d76f4ffefa9e53765c1cdab21f6297
SHA256706d041d6d4777163cb7ac730caf7f97f6f3f3bd6cfa06cddfb28efe3618b418
SHA5121756d4ac297bae3bf6718d328d981753e64964673ecfe4edab4f6942437ea6bd2b3b0064f2d6a5ba217befb8d36c1af78df0af909dcebd2bee037f829fcad380
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
715KB
MD5414312cdb310c45b4eb399b7d8ea9469
SHA169d7034422d76f4ffefa9e53765c1cdab21f6297
SHA256706d041d6d4777163cb7ac730caf7f97f6f3f3bd6cfa06cddfb28efe3618b418
SHA5121756d4ac297bae3bf6718d328d981753e64964673ecfe4edab4f6942437ea6bd2b3b0064f2d6a5ba217befb8d36c1af78df0af909dcebd2bee037f829fcad380
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
715KB
MD5414312cdb310c45b4eb399b7d8ea9469
SHA169d7034422d76f4ffefa9e53765c1cdab21f6297
SHA256706d041d6d4777163cb7ac730caf7f97f6f3f3bd6cfa06cddfb28efe3618b418
SHA5121756d4ac297bae3bf6718d328d981753e64964673ecfe4edab4f6942437ea6bd2b3b0064f2d6a5ba217befb8d36c1af78df0af909dcebd2bee037f829fcad380
-
\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
715KB
MD5414312cdb310c45b4eb399b7d8ea9469
SHA169d7034422d76f4ffefa9e53765c1cdab21f6297
SHA256706d041d6d4777163cb7ac730caf7f97f6f3f3bd6cfa06cddfb28efe3618b418
SHA5121756d4ac297bae3bf6718d328d981753e64964673ecfe4edab4f6942437ea6bd2b3b0064f2d6a5ba217befb8d36c1af78df0af909dcebd2bee037f829fcad380
-
\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
715KB
MD5414312cdb310c45b4eb399b7d8ea9469
SHA169d7034422d76f4ffefa9e53765c1cdab21f6297
SHA256706d041d6d4777163cb7ac730caf7f97f6f3f3bd6cfa06cddfb28efe3618b418
SHA5121756d4ac297bae3bf6718d328d981753e64964673ecfe4edab4f6942437ea6bd2b3b0064f2d6a5ba217befb8d36c1af78df0af909dcebd2bee037f829fcad380
-
memory/360-60-0x00000000004AC000-0x00000000004CB000-memory.dmpFilesize
124KB
-
memory/360-54-0x000007FEF40C0000-0x000007FEF4AE3000-memory.dmpFilesize
10.1MB
-
memory/360-56-0x00000000004AC000-0x00000000004CB000-memory.dmpFilesize
124KB
-
memory/360-55-0x000007FEF3020000-0x000007FEF40B6000-memory.dmpFilesize
16.6MB
-
memory/948-59-0x00000000767D1000-0x00000000767D3000-memory.dmpFilesize
8KB
-
memory/948-57-0x0000000000000000-mapping.dmp
-
memory/1220-62-0x0000000000000000-mapping.dmp
-
memory/1556-70-0x0000000000000000-mapping.dmp
-
memory/1664-66-0x0000000000000000-mapping.dmp