Analysis
-
max time kernel
301s -
max time network
349s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 18:42
Static task
static1
Behavioral task
behavioral1
Sample
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe
Resource
win7-20221111-en
General
-
Target
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe
-
Size
444KB
-
MD5
41cf7fd047088a9261f9f8c54ff152c5
-
SHA1
ea1753b5c2a776df442adff3f0199d688635ddfb
-
SHA256
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850
-
SHA512
b24de6396a5b248926f11b74e40c7a76b943505182abcca8e5ce886ec5b0976a5e39b25a79c4b75f5d20d990aa1f1afbdd38939d753202a052ddf1ebc157c314
-
SSDEEP
12288:k0cBltgVqNmWZvfVMVfeEk+Sie5hp1juSPvwSux:k0cgcvfVM/UicBu
Malware Config
Extracted
cybergate
v1.07.5
Tr
monkeybreak.no-ip.biz:82
monkeybreak.no-ip.biz:100
V2BF7I3040JHDW
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
Install
-
install_file
explorer.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Unabel to open the file ! Please try to
-
message_box_title
Windows Photo Viewer
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Install\\explorer.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Install\\explorer.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe -
Executes dropped EXE 4 IoCs
Processes:
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exeexplorer.exeexplorer.exeexplorer.exepid process 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe 1456 explorer.exe 1064 explorer.exe 340 explorer.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
explorer.exevbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6V723V50-BW85-K5Q6-6E4Q-550S8PGE8J62}\StubPath = "C:\\Windows\\Install\\explorer.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6V723V50-BW85-K5Q6-6E4Q-550S8PGE8J62} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6V723V50-BW85-K5Q6-6E4Q-550S8PGE8J62}\StubPath = "C:\\Windows\\Install\\explorer.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6V723V50-BW85-K5Q6-6E4Q-550S8PGE8J62} explorer.exe -
Processes:
resource yara_rule behavioral1/memory/1220-86-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1220-96-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1236-101-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1236-104-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1220-106-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/memory/1220-112-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/976-117-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/976-118-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/976-128-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Loads dropped DLL 7 IoCs
Processes:
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exebd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exevbc.exeexplorer.exepid process 1708 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe 1708 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe 1220 vbc.exe 1236 explorer.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exevbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SRWHzHlMxORUMkOscYNhYOcmVVIuWsFTBSEIiWTNfczVtzvILZ = "C:\\Users\\Admin\\AppData\\Local\\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe" bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\Install\\explorer.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\Install\\explorer.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exedescription pid process target process PID 544 set thread context of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe -
Drops file in Windows directory 4 IoCs
Processes:
vbc.exevbc.exedescription ioc process File created C:\Windows\Install\explorer.exe vbc.exe File opened for modification C:\Windows\Install\explorer.exe vbc.exe File opened for modification C:\Windows\Install\explorer.exe vbc.exe File opened for modification C:\Windows\Install\ vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
vbc.exepid process 1220 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vbc.exepid process 976 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
explorer.exevbc.exedescription pid process Token: SeBackupPrivilege 1236 explorer.exe Token: SeRestorePrivilege 1236 explorer.exe Token: SeBackupPrivilege 976 vbc.exe Token: SeRestorePrivilege 976 vbc.exe Token: SeDebugPrivilege 976 vbc.exe Token: SeDebugPrivilege 976 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vbc.exepid process 1220 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exebd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exevbc.exedescription pid process target process PID 1708 wrote to memory of 544 1708 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe PID 1708 wrote to memory of 544 1708 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe PID 1708 wrote to memory of 544 1708 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe PID 1708 wrote to memory of 544 1708 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 544 wrote to memory of 1220 544 bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe vbc.exe PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE PID 1220 wrote to memory of 1280 1220 vbc.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe"C:\Users\Admin\AppData\Local\Temp\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe"C:\Users\Admin\AppData\Roaming\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Install\explorer.exe"C:\Windows\Install\explorer.exe"6⤵
- Executes dropped EXE
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"5⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Install\explorer.exe"C:\Windows\Install\explorer.exe"6⤵
- Executes dropped EXE
-
C:\Windows\Install\explorer.exe"C:\Windows\Install\explorer.exe"5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
224KB
MD55171fb68d9571cd9b916e1703583fb14
SHA1235f4f7a2df3277b3ba12461a756dc76897e810e
SHA25623adab591852ff5c4b44aa80495ecd9547c89529cb3026178d0b39b1e0fa8fac
SHA512f5b19f735fd7cf77a4810f285106e89db60f5e50bd075415868f625dd1d8ae20050a64f225524d661868b349460f847be79d49ae8db5ef4d5eaf8e0bb08d4b78
-
C:\Users\Admin\AppData\Roaming\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exeFilesize
444KB
MD541cf7fd047088a9261f9f8c54ff152c5
SHA1ea1753b5c2a776df442adff3f0199d688635ddfb
SHA256bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850
SHA512b24de6396a5b248926f11b74e40c7a76b943505182abcca8e5ce886ec5b0976a5e39b25a79c4b75f5d20d990aa1f1afbdd38939d753202a052ddf1ebc157c314
-
C:\Users\Admin\AppData\Roaming\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exeFilesize
444KB
MD541cf7fd047088a9261f9f8c54ff152c5
SHA1ea1753b5c2a776df442adff3f0199d688635ddfb
SHA256bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850
SHA512b24de6396a5b248926f11b74e40c7a76b943505182abcca8e5ce886ec5b0976a5e39b25a79c4b75f5d20d990aa1f1afbdd38939d753202a052ddf1ebc157c314
-
C:\Windows\Install\explorer.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
C:\Windows\Install\explorer.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
C:\Windows\Install\explorer.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
C:\Windows\Install\explorer.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Users\Admin\AppData\Roaming\Twain.dllFilesize
18KB
MD52153e2d85da316a0fe302227e0f9af88
SHA148b334c27d604ce7d89c9c825d211d26427176cf
SHA256645b30a3ef5cf05ad0df575fbbdbc05387b5493ce1778935b60d98681fea7bc0
SHA512647b0b95622c2e9086f072ccf110371b38953619b4cb6697e259165ce12e0dd1854bc6351abb8f693d052d730f8790d72929a8c822a26ac369c372478c1e4fac
-
\Users\Admin\AppData\Roaming\Twain.dllFilesize
18KB
MD52153e2d85da316a0fe302227e0f9af88
SHA148b334c27d604ce7d89c9c825d211d26427176cf
SHA256645b30a3ef5cf05ad0df575fbbdbc05387b5493ce1778935b60d98681fea7bc0
SHA512647b0b95622c2e9086f072ccf110371b38953619b4cb6697e259165ce12e0dd1854bc6351abb8f693d052d730f8790d72929a8c822a26ac369c372478c1e4fac
-
\Users\Admin\AppData\Roaming\Twain.dllFilesize
18KB
MD52153e2d85da316a0fe302227e0f9af88
SHA148b334c27d604ce7d89c9c825d211d26427176cf
SHA256645b30a3ef5cf05ad0df575fbbdbc05387b5493ce1778935b60d98681fea7bc0
SHA512647b0b95622c2e9086f072ccf110371b38953619b4cb6697e259165ce12e0dd1854bc6351abb8f693d052d730f8790d72929a8c822a26ac369c372478c1e4fac
-
\Users\Admin\AppData\Roaming\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exeFilesize
444KB
MD541cf7fd047088a9261f9f8c54ff152c5
SHA1ea1753b5c2a776df442adff3f0199d688635ddfb
SHA256bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850
SHA512b24de6396a5b248926f11b74e40c7a76b943505182abcca8e5ce886ec5b0976a5e39b25a79c4b75f5d20d990aa1f1afbdd38939d753202a052ddf1ebc157c314
-
\Users\Admin\AppData\Roaming\bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850.exeFilesize
444KB
MD541cf7fd047088a9261f9f8c54ff152c5
SHA1ea1753b5c2a776df442adff3f0199d688635ddfb
SHA256bd47a667e9d1732ac5a3bf9e90e7de5c20f3d2dbb5ce96166478cc984ec24850
SHA512b24de6396a5b248926f11b74e40c7a76b943505182abcca8e5ce886ec5b0976a5e39b25a79c4b75f5d20d990aa1f1afbdd38939d753202a052ddf1ebc157c314
-
\Windows\Install\explorer.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
\Windows\Install\explorer.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
memory/340-126-0x0000000000000000-mapping.dmp
-
memory/544-64-0x0000000074D50000-0x00000000752FB000-memory.dmpFilesize
5.7MB
-
memory/544-59-0x0000000000000000-mapping.dmp
-
memory/544-81-0x0000000074D50000-0x00000000752FB000-memory.dmpFilesize
5.7MB
-
memory/976-118-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/976-117-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/976-110-0x0000000000000000-mapping.dmp
-
memory/976-128-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/1064-122-0x0000000000000000-mapping.dmp
-
memory/1220-84-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-79-0x000000000040E1A8-mapping.dmp
-
memory/1220-86-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/1220-69-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-91-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-125-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-70-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-96-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1220-72-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-83-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-80-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-73-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-106-0x00000000104F0000-0x0000000010555000-memory.dmpFilesize
404KB
-
memory/1220-74-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-112-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/1220-78-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-76-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1220-75-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1236-104-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1236-101-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/1236-95-0x00000000754B1000-0x00000000754B3000-memory.dmpFilesize
8KB
-
memory/1236-93-0x0000000000000000-mapping.dmp
-
memory/1280-89-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/1456-121-0x0000000000000000-mapping.dmp
-
memory/1708-55-0x0000000076D71000-0x0000000076D73000-memory.dmpFilesize
8KB
-
memory/1708-65-0x0000000074D50000-0x00000000752FB000-memory.dmpFilesize
5.7MB
-
memory/1708-56-0x0000000074D50000-0x00000000752FB000-memory.dmpFilesize
5.7MB