Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:39
Static task
static1
Behavioral task
behavioral1
Sample
0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe
Resource
win7-20230220-en
General
-
Target
0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe
-
Size
1.6MB
-
MD5
e221de400b5cfb955cb0973e189da049
-
SHA1
af8000af453527e4901fb534143c455a4e68e9ce
-
SHA256
0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1
-
SHA512
aba03236398d59ca93bb56f8a7f512f9b7fc4aa279c70332287b35833d9840eee5a1067c3800e3def9be81f51a3bee5bac71c35423606f047b427f295fb5b387
-
SSDEEP
24576:WKMlgd2tUtSuoL3Mj+B4OrUgeAI7GiFsJ9FU+Z6ehMFxY+bSQzMwRaZOrD:RAtUguoL3Mj+ZIgqGi+FU+ZZz+eQzwOH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Engine.exePatrol.exe.pifpid process 4104 Engine.exe 1864 Patrol.exe.pif -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SETUP_29934\Engine.exe upx C:\Users\Admin\AppData\Local\Temp\SETUP_29934\Engine.exe upx behavioral2/memory/4104-154-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral2/memory/4104-227-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral2/memory/4104-230-0x0000000000400000-0x0000000000557000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Modifies registry class 2 IoCs
Processes:
svchost.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-144354903-2550862337-1367551827-1000\{B8664FC2-A1E7-4627-8EE6-68108F58D8CD} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-144354903-2550862337-1367551827-1000\{38B9C573-1C32-487D-BBFB-1CFD417ABA6F} svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exepowershell.exepowershell.exePatrol.exe.pifpid process 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 4464 powershell.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 4464 powershell.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 4464 powershell.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 1480 powershell.exe 1480 powershell.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 1480 powershell.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe 1864 Patrol.exe.pif 1864 Patrol.exe.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4464 powershell.exe Token: SeDebugPrivilege 1480 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Patrol.exe.pifpid process 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Patrol.exe.pifpid process 1864 Patrol.exe.pif 1864 Patrol.exe.pif 1864 Patrol.exe.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3992 OpenWith.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exeEngine.exeCmD.execmd.exedescription pid process target process PID 2472 wrote to memory of 4104 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe Engine.exe PID 2472 wrote to memory of 4104 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe Engine.exe PID 2472 wrote to memory of 4104 2472 0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe Engine.exe PID 4104 wrote to memory of 4160 4104 Engine.exe CmD.exe PID 4104 wrote to memory of 4160 4104 Engine.exe CmD.exe PID 4104 wrote to memory of 4160 4104 Engine.exe CmD.exe PID 4160 wrote to memory of 5072 4160 CmD.exe cmd.exe PID 4160 wrote to memory of 5072 4160 CmD.exe cmd.exe PID 4160 wrote to memory of 5072 4160 CmD.exe cmd.exe PID 5072 wrote to memory of 4464 5072 cmd.exe powershell.exe PID 5072 wrote to memory of 4464 5072 cmd.exe powershell.exe PID 5072 wrote to memory of 4464 5072 cmd.exe powershell.exe PID 5072 wrote to memory of 1480 5072 cmd.exe powershell.exe PID 5072 wrote to memory of 1480 5072 cmd.exe powershell.exe PID 5072 wrote to memory of 1480 5072 cmd.exe powershell.exe PID 5072 wrote to memory of 1732 5072 cmd.exe findstr.exe PID 5072 wrote to memory of 1732 5072 cmd.exe findstr.exe PID 5072 wrote to memory of 1732 5072 cmd.exe findstr.exe PID 5072 wrote to memory of 1864 5072 cmd.exe Patrol.exe.pif PID 5072 wrote to memory of 1864 5072 cmd.exe Patrol.exe.pif PID 5072 wrote to memory of 1864 5072 cmd.exe Patrol.exe.pif PID 5072 wrote to memory of 1176 5072 cmd.exe PING.EXE PID 5072 wrote to memory of 1176 5072 cmd.exe PING.EXE PID 5072 wrote to memory of 1176 5072 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe"C:\Users\Admin\AppData\Local\Temp\0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\Engine.exeC:\Users\Admin\AppData\Local\Temp\SETUP_29934\Engine.exe /TH_ID=_2380 /OriginExe="C:\Users\Admin\AppData\Local\Temp\0f407885972527820e108a66a95f8d0917d185a8244ca3a762a28bb53fe430d1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\CmD.exeC:\Windows\system32\CmD.exe /c cmd < Dynamics3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avgui5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^paceEasterSuccessfulAmongTt$" Failing5⤵
-
C:\Users\Admin\AppData\Local\Temp\qgkk2rvj.bgz\28728\Patrol.exe.pif28728\\Patrol.exe.pif 28728\\k5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 85⤵
- Runs ping.exe
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5beef0e0d393bd7f60d48781a860fc2a7
SHA15ffd79fbb4913e395fde812bee2048f14238da87
SHA25625e38ddb2f12aba999dff1fb3ca0be331685c527608230bbf0cf0c4c28c33ac9
SHA512d77ccd47a19d018d1209c8d93257cfed0fcc3a087eb298e56cb234ce244c828f45dbee4d182aad2d7bfaed83832382408bc07423a04d82d168d48f0f354e126f
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00000#AllFilesize
13KB
MD5b760db51ea80f3affb6d560363467cc6
SHA11fc7dfdf6e7ab710e8fb72e7b811a8b0733bc437
SHA2565265907c3206d6997cf7948e09527f87d82893ea6f282009d16207020951e32a
SHA5121ed267cbb86675130fc3cfcad54f2978d6448bb9638c9e8b12e76bf43700de9c2ddfec1ffdd4675cd962e4ec5762f297d249aa3447026b74f822e899aea748f5
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00001#BowFilesize
149KB
MD5480593e4e45c2aae97d43acfd72cc303
SHA17d410fedb3638039e3acb6dab7fbd87c11d3f569
SHA256fd5ea03406b9219d335f2333081d085e5b3619ca3328fba6c1fe8d648912766e
SHA5125b8016abe13de58925cbdb41f7e4693ad14aaed14d25640b9c98ce6fd29b89f5e512b3afc45c0d2d185045100ad0f6d8c6285e21ac780efad2c0e0be4ac02e55
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00002#BumperFilesize
16KB
MD57d6f12a386d1c9e6cf9916c3173c5932
SHA16f19920c185eb9e549a9c5732e10296f36f5e4a4
SHA256056e281b03196c827913481ddd2c0299daef2668b76779a1dbb612e42f74fae2
SHA512345ad236b57f89b0b0c3f1f26f692fdea3933b73dd993e4960cd46593ea99e4b59b848e967ec53e0332141b1527c5c524a500e469f572c02777bcb0d386a2b15
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00003#DynamicsFilesize
14KB
MD58287ce1d975af35e954e923b5921457a
SHA1fd61d52c8d2776b874f2508fff0384f985f7cf97
SHA256492308217b40ff311e9775bc71d8b42fbf781add2660f3cf5ece897cbe280078
SHA512ab95b1b072d1adaef6b90cabf3ebdbd3a3d413da688b728a4cb277dad317d19c9e2c7b4f8eecd703392ba7157805e1bb122bb84b207b072d5b2785223190a9f1
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00004#ImmunologyFilesize
151KB
MD5aa17279505ac32160034f8a8839e8f80
SHA1b49b784bdde5a031ac5d48e46d933f46cee6927c
SHA256534059d1faebac35160fbe7f8faef0b9eec47aaeebf42137bdca98e8fd972242
SHA5124f55c0c355cb619056e415a9cc1762515a878b1fa9ccc9ed521b5f54c3684ac577ca7bb2a22fd87ea255767299d828a27b5a19f264d9ac4da36b716f240397cb
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00005#MangaFilesize
1.1MB
MD556a8a8e2e85abe12c648ae6eee609f43
SHA1fac9d4f4f0de4dba79a22990eb689eceaaf37192
SHA256d3f732f5b4878880012ab6edcd21b761a317ea2abbc25e510f9f1c3932d2cb71
SHA512bcd3b99219efbfc4b2aee914ce031dd5327687cd197c4c0fa69ed11bb3559288ec046680b6e5113bc1237be29ff515af32c198a4f7341973ca93e3ca8cc57c6e
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00006#MemoryFilesize
44KB
MD5e7e32c2a8485d1a2e30168429aba09db
SHA1328513ea848a9ba4b05ad7b35f738a71a5e46b06
SHA2568bba3408bea12bdf541766bbb2a9ddf8dfa022143544ea2b38ca41c6e506ea21
SHA5121c0fa5062dccf716baa9ea3d84be60029a7985bd183ee302095bcf533f9745e3364852dce566c067fd3ac02cefb243558a7cf353cffa1c0528c00701c47f875d
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00007#PlacingFilesize
99KB
MD5055856c7f7226fe771420003504e17df
SHA197c63783438858506c09e0c2a970dade78ce3e3b
SHA256326bb3ac0eab85a22ff6a44605a90981677de22ebe17e91ba4040a53dc3477b9
SHA5122b14994236ae3d150ef1901354f5cad326faec15158d9b54a4eb137a1be6f7d1d0cb388508a230318c2c29886a1370a90767a24e9b1148c5d0b69ebd337a43ad
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00008#QatarFilesize
142KB
MD542a92fad3aa782c144303db85e9b6160
SHA193478cb63986524c2dbd41fcede84da181bac4fd
SHA25695e4a393a2ce9a18b1fbb23e4c5a07b357b508fb3c31179cc419cdbb7ed75535
SHA512b2b76f91f578cea2aa5df6673bc5183b5ae99cafb654d660c6dcc0987d0d11558e6d32fbfc559de143979577bf1f80be7b2f4b9fa9e397a0e71b66d46ce49d99
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00009#QueueFilesize
43KB
MD5840d3174c45bcc69db130dbc34d3498d
SHA176c644e82095263e26c2190cd90c15875824a315
SHA256e6e611a76be9a29768c8f33e6bdb1e70d5ce5a61146e129413e4679ff9e8f97b
SHA512adb7e724b8acf30a8da90a93e4916703a57f3a77aa2471f50b430b5d41b20e82ceece4fb122421a27811b1b955e73c4087b88ebe5b7168a69b46a743bef6c473
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00010#SolutionsFilesize
154KB
MD514895da525fc0a0d06ecf2bcb92dbc1f
SHA1f163aaa6c2e31a0e3d98812991896e6aa7bd2008
SHA256313af3d2356141806da23dc7039e7ea2d03234db3e308146f2eed1b731a29a87
SHA5123ae4f2d2e4c93e5000e7148bf63a0b209a9fcc53b1006be20fc6067a0de1656504323a1d9e4bba4fbd1cb3d41f4b3fd477eb0c2def634d74de89c4d11416842b
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\00011#SoxFilesize
114KB
MD5aafe487839ee160aa8ee5a2da5f1e0f0
SHA11e403c7a922a44f032d1e080f5601d43ee669eba
SHA2563708f149999be9e4ead2209ba82259ae2b8b45fd29edcd878343e312f9b48dc1
SHA512c9884c782ccb69745680c877d5ad9177084af1ac01fa7ac0ce690372856cb763839cba5e38ed989a26074c79bccf7cb10f19689ba44643bb27baece8bd52cd3e
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\Engine.exeFilesize
429KB
MD57b596c0cbb9056107ed4783184805501
SHA1a6397b178a3c51dbc987eca124f0f8a64a5c2115
SHA256ce5ccd3d4effb9c453d8847bfb4d056f874d92593d816bcd39ba5ad15be738c9
SHA5121d20386dbbf4cc7effa449fcfe5d9880d712a1678cb5f3c10ac5789cf29034a998a23802f5694c8d6eaf5d9b1f8d703fad179d7dacad2cf5f8d16c30792fc248
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\Engine.exeFilesize
429KB
MD57b596c0cbb9056107ed4783184805501
SHA1a6397b178a3c51dbc987eca124f0f8a64a5c2115
SHA256ce5ccd3d4effb9c453d8847bfb4d056f874d92593d816bcd39ba5ad15be738c9
SHA5121d20386dbbf4cc7effa449fcfe5d9880d712a1678cb5f3c10ac5789cf29034a998a23802f5694c8d6eaf5d9b1f8d703fad179d7dacad2cf5f8d16c30792fc248
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\Modern_Icon.bmpFilesize
7KB
MD51dd88f67f029710d5c5858a6293a93f1
SHA13e5ef66613415fe9467b2a24ccc27d8f997e7df6
SHA256b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532
SHA5127071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94
-
C:\Users\Admin\AppData\Local\Temp\SETUP_29934\Setup.txtFilesize
2KB
MD545168af3c3c98607fbb30dbc1092a9d2
SHA195b16f76585e4f2be132dcef3157ce6bd8f98d07
SHA256693ddfd2143b7b238ee2b0a7a75a11dcb269d9555e5da9c43c71fb1b1809c845
SHA512c2e70115924d8153ceab6c3f4b707f9b43fc9a17f2a630c1c4ff0c46df1b359c76b997f25ecef1f842dc768e538274b2c01530af3797d7dd67376f2c84f57050
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bopmg1lg.om5.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\qgkk2rvj.bgz\28728\Patrol.exe.pifFilesize
925KB
MD50162a97ed477353bc35776a7addffd5c
SHA110db8fe20bbce0f10517c510ec73532cf6feb227
SHA25615600ccdef5a64b40d206d89234a51be1e11bd878dcefc5986590bcf40d9d571
SHA5129638cab1aabe78c22a3d3528a391544f697d792640d831516b63fa52c393ee96bb588223e70163d059208cc5a14481c5ff7ef6ba9ac572322798a823d67f01f5
-
C:\Users\Admin\AppData\Local\Temp\qgkk2rvj.bgz\FailingFilesize
925KB
MD5b31f34ca7a70e8793dbe4657341a99d2
SHA1cbc483b20a0f2541e87af96a067325ad52c1d59e
SHA256c2738e1e043bee5bf68c0f6975de3e6ca1a6b0c0d862c7004a41328ccf8ca17c
SHA512eff0402705f0de0cf8b4dd4640a46afb3dcdc509eecaacf9a1e98e2833094aa800183e58c9e18d41a9828d0558b97f3dab74f09cebe1029abd6e9960c9424e31
-
C:\Users\Admin\Videos\Captures\desktop.iniFilesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c
-
memory/1480-218-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/1480-219-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/1864-239-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/1864-238-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/1864-237-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/1864-236-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/1864-234-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/1864-235-0x0000000000350000-0x0000000000351000-memory.dmpFilesize
4KB
-
memory/1864-233-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/1864-232-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/1864-231-0x0000000001440000-0x00000000014A4000-memory.dmpFilesize
400KB
-
memory/2472-200-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4104-154-0x0000000000400000-0x0000000000557000-memory.dmpFilesize
1.3MB
-
memory/4104-227-0x0000000000400000-0x0000000000557000-memory.dmpFilesize
1.3MB
-
memory/4104-230-0x0000000000400000-0x0000000000557000-memory.dmpFilesize
1.3MB
-
memory/4104-228-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/4104-155-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/4464-204-0x0000000007EF0000-0x0000000008494000-memory.dmpFilesize
5.6MB
-
memory/4464-192-0x00000000062F0000-0x0000000006356000-memory.dmpFilesize
408KB
-
memory/4464-184-0x0000000005C50000-0x0000000006278000-memory.dmpFilesize
6.2MB
-
memory/4464-185-0x00000000059B0000-0x00000000059D2000-memory.dmpFilesize
136KB
-
memory/4464-183-0x0000000003030000-0x0000000003066000-memory.dmpFilesize
216KB
-
memory/4464-203-0x0000000006E80000-0x0000000006EA2000-memory.dmpFilesize
136KB
-
memory/4464-202-0x0000000006E30000-0x0000000006E4A000-memory.dmpFilesize
104KB
-
memory/4464-201-0x0000000006EB0000-0x0000000006F46000-memory.dmpFilesize
600KB
-
memory/4464-199-0x0000000006950000-0x000000000696E000-memory.dmpFilesize
120KB
-
memory/4464-198-0x0000000005610000-0x0000000005620000-memory.dmpFilesize
64KB
-
memory/4464-197-0x0000000005610000-0x0000000005620000-memory.dmpFilesize
64KB
-
memory/4464-186-0x0000000006280000-0x00000000062E6000-memory.dmpFilesize
408KB