Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 19:27
Static task
static1
Behavioral task
behavioral1
Sample
vzlom-kamer-by-neit_wcEYk7hQ.exe
Resource
win7-20230220-en
General
-
Target
vzlom-kamer-by-neit_wcEYk7hQ.exe
-
Size
4.5MB
-
MD5
fe0f3853a9f25f71af7a13b313d8521b
-
SHA1
d868f1263393e0440605abe012e6a7626b12bca9
-
SHA256
b89f3ebe1ac94726b821a3c23464236586364d2756881a32bef853e7183739ab
-
SHA512
ea878fd94bee5aa1bc77e64fa6350e6ddcb2d88c32e341ab320701af1feefd424167a46f863c5d1c5226448fe8539f4c8f76e76b6ec49ee2674438ac0bea7a76
-
SSDEEP
98304:nP4tWsF8pOX+Q9WZps5699OChBZ/MrbmY2NTeM6T/Mn:P4tWsFNX+9I61hBZ8bm9TW/Mn
Malware Config
Extracted
gcleaner
85.31.45.39
85.31.45.250
85.31.45.251
85.31.45.88
Signatures
-
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bMMbCBotYS3.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bMMbCBotYS3.exe -
Executes dropped EXE 12 IoCs
Processes:
is-73AOG.tmpIC329.exeIC329.exeW7bciU.exeZftqBzFC3xcBmh.exeis-BV9KF.tmpis-BD4U5.tmpSyncBackupShell.exeFileDate329.exebMMbCBotYS3.exevzlom_kamer_by_neit.rar_id25861706.exeNsOgiSY.exepid process 912 is-73AOG.tmp 1356 IC329.exe 812 IC329.exe 968 W7bciU.exe 1772 ZftqBzFC3xcBmh.exe 964 is-BV9KF.tmp 1632 is-BD4U5.tmp 1684 SyncBackupShell.exe 668 FileDate329.exe 1748 bMMbCBotYS3.exe 1636 vzlom_kamer_by_neit.rar_id25861706.exe 1984 NsOgiSY.exe -
Loads dropped DLL 21 IoCs
Processes:
vzlom-kamer-by-neit_wcEYk7hQ.exeis-73AOG.tmpIC329.exeW7bciU.exeis-BV9KF.tmpZftqBzFC3xcBmh.exeis-BD4U5.tmppid process 780 vzlom-kamer-by-neit_wcEYk7hQ.exe 912 is-73AOG.tmp 912 is-73AOG.tmp 912 is-73AOG.tmp 912 is-73AOG.tmp 812 IC329.exe 812 IC329.exe 968 W7bciU.exe 964 is-BV9KF.tmp 964 is-BV9KF.tmp 964 is-BV9KF.tmp 964 is-BV9KF.tmp 1772 ZftqBzFC3xcBmh.exe 1632 is-BD4U5.tmp 1632 is-BD4U5.tmp 1632 is-BD4U5.tmp 1632 is-BD4U5.tmp 964 is-BV9KF.tmp 1632 is-BD4U5.tmp 812 IC329.exe 812 IC329.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 4 IoCs
Processes:
IC329.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop\Build IC329.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira\AntiVir Desktop\Build IC329.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop IC329.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira\AntiVir Desktop IC329.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
vzlom_kamer_by_neit.rar_id25861706.exedescription ioc process File opened for modification \??\PhysicalDrive0 vzlom_kamer_by_neit.rar_id25861706.exe -
Drops file in System32 directory 7 IoCs
Processes:
bMMbCBotYS3.exepowershell.EXENsOgiSY.exepowershell.EXEpowershell.EXEdescription ioc process File created C:\Windows\system32\GroupPolicy\gpt.ini bMMbCBotYS3.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol NsOgiSY.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini NsOgiSY.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol NsOgiSY.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Drops file in Program Files directory 56 IoCs
Processes:
is-BV9KF.tmpis-73AOG.tmpSyncBackupShell.exedescription ioc process File created C:\Program Files (x86)\BKngBackup\is-J9E89.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-PC9JK.tmp is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\is-G4N2Q.tmp is-BV9KF.tmp File created C:\Program Files (x86)\BKngBackup\Help\images\is-J5S5B.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-KVDEG.tmp is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\unins000.dat is-BV9KF.tmp File created C:\Program Files (x86)\BKngBackup\Help\is-SBQJE.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\unins000.dat is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-N4U0L.tmp is-73AOG.tmp File opened for modification C:\Program Files (x86)\BKngBackup\unins000.dat is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\is-VP78H.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\is-0DT0H.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\is-P795M.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-7F2SA.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-HTQPN.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-95SMA.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-TBBV5.tmp is-73AOG.tmp File opened for modification C:\Program Files (x86)\ImageComparer\ImageComparer.url is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\is-OVF8L.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\is-LRGCU.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-MP4CP.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-062S9.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\is-N13P6.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-A2NI4.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-8D586.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-L5L1L.tmp is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\Help\images\is-7EV6R.tmp is-BV9KF.tmp File created C:\Program Files (x86)\BKngBackup\is-2VU9I.tmp is-BV9KF.tmp File created C:\Program Files (x86)\BKngBackup\is-9I6LD.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\is-G6NGT.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-Q5K2P.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-7K3D0.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-26T08.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-6TAVT.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-NSS2I.tmp is-73AOG.tmp File opened for modification C:\Program Files (x86)\ImageComparer\IC329.exe is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\Help\images\is-LKF9S.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-6NOJ6.tmp is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\Help\images\is-EN47M.tmp is-BV9KF.tmp File opened for modification C:\Program Files (x86)\BKngBackup\SyncBackupShell.exe is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\is-TBPDH.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-A0RLM.tmp is-73AOG.tmp File created C:\Program Files (x86)\clFlow SyncBackupShell.exe File created C:\Program Files (x86)\ImageComparer\is-RGG95.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\is-5R1S0.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-JFL1D.tmp is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\is-293GN.tmp is-BV9KF.tmp File created C:\Program Files (x86)\BKngBackup\Languages\is-V6IA3.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-A13CQ.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-0I3C6.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-3VOTQ.tmp is-73AOG.tmp File created C:\Program Files (x86)\ImageComparer\languages\is-69PKN.tmp is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\is-8HR60.tmp is-BV9KF.tmp File created C:\Program Files (x86)\ImageComparer\is-GU41D.tmp is-73AOG.tmp File opened for modification C:\Program Files (x86)\ImageComparer\unins000.dat is-73AOG.tmp File created C:\Program Files (x86)\BKngBackup\Help\is-08L2J.tmp is-BV9KF.tmp -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\bIIVPNBwJtQvPFWhKj.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1016 schtasks.exe 520 schtasks.exe 1368 schtasks.exe 1760 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
bMMbCBotYS3.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName bMMbCBotYS3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS bMMbCBotYS3.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1856 taskkill.exe -
Processes:
vzlom_kamer_by_neit.rar_id25861706.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main vzlom_kamer_by_neit.rar_id25861706.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
IC329.exevzlom_kamer_by_neit.rar_id25861706.exepowershell.EXEpowershell.EXEpowershell.EXEpid process 812 IC329.exe 812 IC329.exe 812 IC329.exe 1636 vzlom_kamer_by_neit.rar_id25861706.exe 848 powershell.EXE 848 powershell.EXE 848 powershell.EXE 812 IC329.exe 812 IC329.exe 1684 powershell.EXE 1684 powershell.EXE 1684 powershell.EXE 812 IC329.exe 300 powershell.EXE 300 powershell.EXE 300 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
taskkill.exepowershell.EXEpowershell.EXEpowershell.EXEdescription pid process Token: SeDebugPrivilege 1856 taskkill.exe Token: SeDebugPrivilege 848 powershell.EXE Token: SeDebugPrivilege 1684 powershell.EXE Token: SeDebugPrivilege 300 powershell.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vzlom_kamer_by_neit.rar_id25861706.exepid process 1636 vzlom_kamer_by_neit.rar_id25861706.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
vzlom_kamer_by_neit.rar_id25861706.exepid process 1636 vzlom_kamer_by_neit.rar_id25861706.exe 1636 vzlom_kamer_by_neit.rar_id25861706.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
vzlom-kamer-by-neit_wcEYk7hQ.exeis-73AOG.tmpnet.exenet.exeIC329.exeW7bciU.exeZftqBzFC3xcBmh.exeis-BV9KF.tmpis-BD4U5.tmpdescription pid process target process PID 780 wrote to memory of 912 780 vzlom-kamer-by-neit_wcEYk7hQ.exe is-73AOG.tmp PID 780 wrote to memory of 912 780 vzlom-kamer-by-neit_wcEYk7hQ.exe is-73AOG.tmp PID 780 wrote to memory of 912 780 vzlom-kamer-by-neit_wcEYk7hQ.exe is-73AOG.tmp PID 780 wrote to memory of 912 780 vzlom-kamer-by-neit_wcEYk7hQ.exe is-73AOG.tmp PID 780 wrote to memory of 912 780 vzlom-kamer-by-neit_wcEYk7hQ.exe is-73AOG.tmp PID 780 wrote to memory of 912 780 vzlom-kamer-by-neit_wcEYk7hQ.exe is-73AOG.tmp PID 780 wrote to memory of 912 780 vzlom-kamer-by-neit_wcEYk7hQ.exe is-73AOG.tmp PID 912 wrote to memory of 300 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 300 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 300 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 300 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 1356 912 is-73AOG.tmp IC329.exe PID 912 wrote to memory of 1356 912 is-73AOG.tmp IC329.exe PID 912 wrote to memory of 1356 912 is-73AOG.tmp IC329.exe PID 912 wrote to memory of 1356 912 is-73AOG.tmp IC329.exe PID 300 wrote to memory of 920 300 net.exe net1.exe PID 300 wrote to memory of 920 300 net.exe net1.exe PID 300 wrote to memory of 920 300 net.exe net1.exe PID 300 wrote to memory of 920 300 net.exe net1.exe PID 912 wrote to memory of 292 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 292 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 292 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 292 912 is-73AOG.tmp net.exe PID 912 wrote to memory of 812 912 is-73AOG.tmp IC329.exe PID 912 wrote to memory of 812 912 is-73AOG.tmp IC329.exe PID 912 wrote to memory of 812 912 is-73AOG.tmp IC329.exe PID 912 wrote to memory of 812 912 is-73AOG.tmp IC329.exe PID 292 wrote to memory of 1384 292 net.exe net1.exe PID 292 wrote to memory of 1384 292 net.exe net1.exe PID 292 wrote to memory of 1384 292 net.exe net1.exe PID 292 wrote to memory of 1384 292 net.exe net1.exe PID 812 wrote to memory of 968 812 IC329.exe W7bciU.exe PID 812 wrote to memory of 968 812 IC329.exe W7bciU.exe PID 812 wrote to memory of 968 812 IC329.exe W7bciU.exe PID 812 wrote to memory of 968 812 IC329.exe W7bciU.exe PID 812 wrote to memory of 968 812 IC329.exe W7bciU.exe PID 812 wrote to memory of 968 812 IC329.exe W7bciU.exe PID 812 wrote to memory of 968 812 IC329.exe W7bciU.exe PID 812 wrote to memory of 1772 812 IC329.exe ZftqBzFC3xcBmh.exe PID 812 wrote to memory of 1772 812 IC329.exe ZftqBzFC3xcBmh.exe PID 812 wrote to memory of 1772 812 IC329.exe ZftqBzFC3xcBmh.exe PID 812 wrote to memory of 1772 812 IC329.exe ZftqBzFC3xcBmh.exe PID 812 wrote to memory of 1772 812 IC329.exe ZftqBzFC3xcBmh.exe PID 812 wrote to memory of 1772 812 IC329.exe ZftqBzFC3xcBmh.exe PID 812 wrote to memory of 1772 812 IC329.exe ZftqBzFC3xcBmh.exe PID 968 wrote to memory of 964 968 W7bciU.exe is-BV9KF.tmp PID 968 wrote to memory of 964 968 W7bciU.exe is-BV9KF.tmp PID 968 wrote to memory of 964 968 W7bciU.exe is-BV9KF.tmp PID 968 wrote to memory of 964 968 W7bciU.exe is-BV9KF.tmp PID 968 wrote to memory of 964 968 W7bciU.exe is-BV9KF.tmp PID 968 wrote to memory of 964 968 W7bciU.exe is-BV9KF.tmp PID 968 wrote to memory of 964 968 W7bciU.exe is-BV9KF.tmp PID 1772 wrote to memory of 1632 1772 ZftqBzFC3xcBmh.exe is-BD4U5.tmp PID 1772 wrote to memory of 1632 1772 ZftqBzFC3xcBmh.exe is-BD4U5.tmp PID 1772 wrote to memory of 1632 1772 ZftqBzFC3xcBmh.exe is-BD4U5.tmp PID 1772 wrote to memory of 1632 1772 ZftqBzFC3xcBmh.exe is-BD4U5.tmp PID 1772 wrote to memory of 1632 1772 ZftqBzFC3xcBmh.exe is-BD4U5.tmp PID 1772 wrote to memory of 1632 1772 ZftqBzFC3xcBmh.exe is-BD4U5.tmp PID 1772 wrote to memory of 1632 1772 ZftqBzFC3xcBmh.exe is-BD4U5.tmp PID 964 wrote to memory of 1684 964 is-BV9KF.tmp SyncBackupShell.exe PID 964 wrote to memory of 1684 964 is-BV9KF.tmp SyncBackupShell.exe PID 964 wrote to memory of 1684 964 is-BV9KF.tmp SyncBackupShell.exe PID 964 wrote to memory of 1684 964 is-BV9KF.tmp SyncBackupShell.exe PID 1632 wrote to memory of 1792 1632 is-BD4U5.tmp conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vzlom-kamer-by-neit_wcEYk7hQ.exe"C:\Users\Admin\AppData\Local\Temp\vzlom-kamer-by-neit_wcEYk7hQ.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-L96PC.tmp\is-73AOG.tmp"C:\Users\Admin\AppData\Local\Temp\is-L96PC.tmp\is-73AOG.tmp" /SL4 $70126 "C:\Users\Admin\AppData\Local\Temp\vzlom-kamer-by-neit_wcEYk7hQ.exe" 4446082 532482⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 233⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 234⤵
-
C:\Program Files (x86)\ImageComparer\IC329.exe"C:\Program Files (x86)\ImageComparer\IC329.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause ImageComparer3293⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause ImageComparer3294⤵
-
C:\Program Files (x86)\ImageComparer\IC329.exe"C:\Program Files (x86)\ImageComparer\IC329.exe" 72aafdade9cba069152144844a0d25e03⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1spd7n3o\W7bciU.exeC:\Users\Admin\AppData\Local\Temp\1spd7n3o\W7bciU.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-6IM9N.tmp\is-BV9KF.tmp"C:\Users\Admin\AppData\Local\Temp\is-6IM9N.tmp\is-BV9KF.tmp" /SL4 $1023E "C:\Users\Admin\AppData\Local\Temp\1spd7n3o\W7bciU.exe" 1906126 517125⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\BKngBackup\SyncBackupShell.exe"C:\Program Files (x86)\BKngBackup\SyncBackupShell.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\ndSMArUD\ZftqBzFC3xcBmh.exeC:\Users\Admin\AppData\Local\Temp\ndSMArUD\ZftqBzFC3xcBmh.exe /m SUB=72aafdade9cba069152144844a0d25e04⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-OE3E9.tmp\is-BD4U5.tmp"C:\Users\Admin\AppData\Local\Temp\is-OE3E9.tmp\is-BD4U5.tmp" /SL4 $1026A "C:\Users\Admin\AppData\Local\Temp\ndSMArUD\ZftqBzFC3xcBmh.exe" 1559217 52736 /m SUB=72aafdade9cba069152144844a0d25e05⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 206⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 207⤵
-
C:\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\FileDate329\FileDate329.exe"C:\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\FileDate329\FileDate329.exe" /m SUB=72aafdade9cba069152144844a0d25e06⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "FileDate329.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\FileDate329\FileDate329.exe" & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "FileDate329.exe" /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\W4aJi2GZ\bMMbCBotYS3.exeC:\Users\Admin\AppData\Local\Temp\W4aJi2GZ\bMMbCBotYS3.exe /S /site_id=6906894⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&6⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:327⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:647⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&6⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:327⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:647⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gdbRrVJES" /SC once /ST 07:01:41 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gdbRrVJES"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gdbRrVJES"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bIIVPNBwJtQvPFWhKj" /SC once /ST 21:29:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\iBJlqjuWMGEsSFWXw\mlDSIyJieHcCVqF\NsOgiSY.exe\" DF /site_id 690689 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\vzlom_kamer_by_neit.rar_id25861706.exe"C:\Users\Admin\Documents\vzlom_kamer_by_neit.rar_id25861706.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskeng.exetaskeng.exe {2F5182D0-38AB-4D86-97FF-E75A20820E15} S-1-5-21-3948302646-268491222-1934009652-1000:KXZDHPUW\Admin:Interactive:[1]1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1608208109-445275710-335704990-407078775-979895779-13817041851919587986476700156"1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {F4F2CD82-8FFD-4435-BED4-1396B77662BA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
-
C:\Users\Admin\AppData\Local\Temp\iBJlqjuWMGEsSFWXw\mlDSIyJieHcCVqF\NsOgiSY.exeC:\Users\Admin\AppData\Local\Temp\iBJlqjuWMGEsSFWXw\mlDSIyJieHcCVqF\NsOgiSY.exe DF /site_id 690689 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gkypHOCYB" /SC once /ST 08:44:31 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gkypHOCYB"3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gkypHOCYB"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gvdrZVepK" /SC once /ST 08:57:18 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gvdrZVepK"3⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\BKngBackup\SyncBackupShell.exeFilesize
2.5MB
MD5b2a22d65280abb89e601550434af57a1
SHA11f38d1c222b44ad78d7050f7454ee9289c32452b
SHA256bbf2f049ace040531f02f74be8a62838f46fdb83c94d5d2a1a675f3288d7cdc3
SHA512c17d83af8b31275f1783df55792c71e6f47dc5a8e80f4d78ab62379a5a32c0b4c8966e2807922577ec5211efcee3ecde40e40c9f59a9ff2d1b298fbacebdf669
-
C:\Program Files (x86)\BKngBackup\SyncBackupShell.exeFilesize
2.5MB
MD5b2a22d65280abb89e601550434af57a1
SHA11f38d1c222b44ad78d7050f7454ee9289c32452b
SHA256bbf2f049ace040531f02f74be8a62838f46fdb83c94d5d2a1a675f3288d7cdc3
SHA512c17d83af8b31275f1783df55792c71e6f47dc5a8e80f4d78ab62379a5a32c0b4c8966e2807922577ec5211efcee3ecde40e40c9f59a9ff2d1b298fbacebdf669
-
C:\Program Files (x86)\ImageComparer\IC329.exeFilesize
5.1MB
MD55a37ea79983033abd4da83a9c3b9d615
SHA1ea71b21a0afa2925b7afdc10921ee2dfe9e4bdcf
SHA2567115f59cfe36e2e6ce6f254110973ff72c054b8fdce560d4d6244afd47c90c74
SHA512eb2ce09697155434d659ed5e64738554d54039c903a08db61bc1a957168057b88c1e3662ecfce9fd8c1469ba394a817b442364856bc1877ca77a33200be32d48
-
C:\Program Files (x86)\ImageComparer\IC329.exeFilesize
5.1MB
MD55a37ea79983033abd4da83a9c3b9d615
SHA1ea71b21a0afa2925b7afdc10921ee2dfe9e4bdcf
SHA2567115f59cfe36e2e6ce6f254110973ff72c054b8fdce560d4d6244afd47c90c74
SHA512eb2ce09697155434d659ed5e64738554d54039c903a08db61bc1a957168057b88c1e3662ecfce9fd8c1469ba394a817b442364856bc1877ca77a33200be32d48
-
C:\Users\Admin\AppData\Local\Temp\1spd7n3o\W7bciU.exeFilesize
2.1MB
MD5b415a5a9c092bd6a447f22b31c57aed9
SHA17332a029199e5220ad33fba21e6378f9694691b0
SHA2567afea7d88699fb58522d63647b7fd269be1ca9f67ca1e84ca2c251f7cadd0c4c
SHA512753740a4d651850ef80ceee38b1f3839fd1888d308606d31f3f883bc6f16884cf3b6fc72e1834059e8aee547acac362cf74c939180c0c4ef0c74805e1a00ee81
-
C:\Users\Admin\AppData\Local\Temp\1spd7n3o\W7bciU.exeFilesize
2.1MB
MD5b415a5a9c092bd6a447f22b31c57aed9
SHA17332a029199e5220ad33fba21e6378f9694691b0
SHA2567afea7d88699fb58522d63647b7fd269be1ca9f67ca1e84ca2c251f7cadd0c4c
SHA512753740a4d651850ef80ceee38b1f3839fd1888d308606d31f3f883bc6f16884cf3b6fc72e1834059e8aee547acac362cf74c939180c0c4ef0c74805e1a00ee81
-
C:\Users\Admin\AppData\Local\Temp\W4aJi2GZ\bMMbCBotYS3.exeFilesize
6.8MB
MD5d5bbadf7eb608dbaeb7999385071d561
SHA1dddfe1f735c8c07831788f7e1ecfcca7b7bd61d4
SHA25677e7b35c5b347d17c238687e387b38ca5d2b26f40ed413d288d3ef177557295a
SHA512acd1afa271554625a01d83f6fbc83e7504c46a140a273b6b8eeefe56b023f5dcdc17fe354e1b296c83ac14769b63aeb4a29579a6189b2fd3b29fd7da264f72d9
-
C:\Users\Admin\AppData\Local\Temp\W4aJi2GZ\bMMbCBotYS3.exeFilesize
6.8MB
MD5d5bbadf7eb608dbaeb7999385071d561
SHA1dddfe1f735c8c07831788f7e1ecfcca7b7bd61d4
SHA25677e7b35c5b347d17c238687e387b38ca5d2b26f40ed413d288d3ef177557295a
SHA512acd1afa271554625a01d83f6fbc83e7504c46a140a273b6b8eeefe56b023f5dcdc17fe354e1b296c83ac14769b63aeb4a29579a6189b2fd3b29fd7da264f72d9
-
C:\Users\Admin\AppData\Local\Temp\W4aJi2GZ\bMMbCBotYS3.exeFilesize
6.8MB
MD5d5bbadf7eb608dbaeb7999385071d561
SHA1dddfe1f735c8c07831788f7e1ecfcca7b7bd61d4
SHA25677e7b35c5b347d17c238687e387b38ca5d2b26f40ed413d288d3ef177557295a
SHA512acd1afa271554625a01d83f6fbc83e7504c46a140a273b6b8eeefe56b023f5dcdc17fe354e1b296c83ac14769b63aeb4a29579a6189b2fd3b29fd7da264f72d9
-
C:\Users\Admin\AppData\Local\Temp\iBJlqjuWMGEsSFWXw\mlDSIyJieHcCVqF\NsOgiSY.exeFilesize
6.8MB
MD5d5bbadf7eb608dbaeb7999385071d561
SHA1dddfe1f735c8c07831788f7e1ecfcca7b7bd61d4
SHA25677e7b35c5b347d17c238687e387b38ca5d2b26f40ed413d288d3ef177557295a
SHA512acd1afa271554625a01d83f6fbc83e7504c46a140a273b6b8eeefe56b023f5dcdc17fe354e1b296c83ac14769b63aeb4a29579a6189b2fd3b29fd7da264f72d9
-
C:\Users\Admin\AppData\Local\Temp\iBJlqjuWMGEsSFWXw\mlDSIyJieHcCVqF\NsOgiSY.exeFilesize
6.8MB
MD5d5bbadf7eb608dbaeb7999385071d561
SHA1dddfe1f735c8c07831788f7e1ecfcca7b7bd61d4
SHA25677e7b35c5b347d17c238687e387b38ca5d2b26f40ed413d288d3ef177557295a
SHA512acd1afa271554625a01d83f6fbc83e7504c46a140a273b6b8eeefe56b023f5dcdc17fe354e1b296c83ac14769b63aeb4a29579a6189b2fd3b29fd7da264f72d9
-
C:\Users\Admin\AppData\Local\Temp\is-6IM9N.tmp\is-BV9KF.tmpFilesize
658KB
MD5f41b7e0820ac65586c014fe78e0d2e2b
SHA1c1f4514da16a703b7faadca27e966fe2001e9a87
SHA256059bbf7dccca1f2d49e144de237b6f7364bc72f3979f6a681374802feba25afd
SHA512c16ff3f423f94b040a30a41a41963a012e6dbd9a0b8c3b5aada2c0b409592699a98276cc165d1e8d421e1f5eda417132235a8235fe7aa97fac7374f7b45704b1
-
C:\Users\Admin\AppData\Local\Temp\is-6IM9N.tmp\is-BV9KF.tmpFilesize
658KB
MD5f41b7e0820ac65586c014fe78e0d2e2b
SHA1c1f4514da16a703b7faadca27e966fe2001e9a87
SHA256059bbf7dccca1f2d49e144de237b6f7364bc72f3979f6a681374802feba25afd
SHA512c16ff3f423f94b040a30a41a41963a012e6dbd9a0b8c3b5aada2c0b409592699a98276cc165d1e8d421e1f5eda417132235a8235fe7aa97fac7374f7b45704b1
-
C:\Users\Admin\AppData\Local\Temp\is-K6VL9.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
C:\Users\Admin\AppData\Local\Temp\is-L96PC.tmp\is-73AOG.tmpFilesize
656KB
MD57f9f5da24fa849ab560f986f1f38d6a0
SHA1b421f980946ca3b3acda363f8bbcb5f7db7466f2
SHA2565bbb7c9ab829e5c1c20674aeb7303dd88f7799568b632c18ebe0584cfbb27890
SHA51228b047f86bb5241d840cb84369b942e94c8bb85e72decb87c7237d43ca64a3d1c3a9a500576a7f5de872af3172154e844531deed667da3a4b4fbd7d34e90f196
-
C:\Users\Admin\AppData\Local\Temp\is-L96PC.tmp\is-73AOG.tmpFilesize
656KB
MD57f9f5da24fa849ab560f986f1f38d6a0
SHA1b421f980946ca3b3acda363f8bbcb5f7db7466f2
SHA2565bbb7c9ab829e5c1c20674aeb7303dd88f7799568b632c18ebe0584cfbb27890
SHA51228b047f86bb5241d840cb84369b942e94c8bb85e72decb87c7237d43ca64a3d1c3a9a500576a7f5de872af3172154e844531deed667da3a4b4fbd7d34e90f196
-
C:\Users\Admin\AppData\Local\Temp\is-OE3E9.tmp\is-BD4U5.tmpFilesize
659KB
MD563bdf487b26c0886dbced14bab4d4257
SHA1e3621d870aa54d552861f1c71dea1fb36d71def6
SHA256ca5e816fa95cbcd2a880f2c319d3ddf09686e96ee633af63a396969e5e62335a
SHA512b433e540c9da175efdd09d44be39c563176046d89aa03edcc43e3582aa1f180e40e283503d152a46e07d4e77f8fa18b76118e425961b507ad5ca3864c39a7c40
-
C:\Users\Admin\AppData\Local\Temp\is-OE3E9.tmp\is-BD4U5.tmpFilesize
659KB
MD563bdf487b26c0886dbced14bab4d4257
SHA1e3621d870aa54d552861f1c71dea1fb36d71def6
SHA256ca5e816fa95cbcd2a880f2c319d3ddf09686e96ee633af63a396969e5e62335a
SHA512b433e540c9da175efdd09d44be39c563176046d89aa03edcc43e3582aa1f180e40e283503d152a46e07d4e77f8fa18b76118e425961b507ad5ca3864c39a7c40
-
C:\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\FileDate329\FileDate329.exeFilesize
2.5MB
MD5eebebcfdd1a311a022c2fbc282a44dcd
SHA15635edc5ca1cc15439ea4a02f98d6618c5f882af
SHA256b58bc59a2c034c8fa064a3c9a9273caab105cee0c70235d3cb5ea74acaa7cc38
SHA51260665d3b9fa8043d3764eb5c5924ae4e3ac16a4a2a95aeed47bb75cc2dd03bcf7d70275f3c3a227203b66c5e80588007a16a9add9d8be5e766fa24144168e38b
-
C:\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\FileDate329\FileDate329.exeFilesize
2.5MB
MD5eebebcfdd1a311a022c2fbc282a44dcd
SHA15635edc5ca1cc15439ea4a02f98d6618c5f882af
SHA256b58bc59a2c034c8fa064a3c9a9273caab105cee0c70235d3cb5ea74acaa7cc38
SHA51260665d3b9fa8043d3764eb5c5924ae4e3ac16a4a2a95aeed47bb75cc2dd03bcf7d70275f3c3a227203b66c5e80588007a16a9add9d8be5e766fa24144168e38b
-
C:\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\ndSMArUD\ZftqBzFC3xcBmh.exeFilesize
1.7MB
MD5cd977fd8e4228b5910c6efd938d6d412
SHA17e226827103aa7bca9f2b63b1340ecb6422dfc6f
SHA256c18e5c8ffe6fa429bb88fdc3eca4b6e63304baf1c270b405eb6607ba7e7c8ab7
SHA5123f4db6a3d7cf6d78677a8f1da5b7e1c1c84b92e0880c9195046ea24961acd910ba24cbfaf0188420ff52ce7d7d7b53f833d917694807d12ab3d8f92702fa099a
-
C:\Users\Admin\AppData\Local\Temp\ndSMArUD\ZftqBzFC3xcBmh.exeFilesize
1.7MB
MD5cd977fd8e4228b5910c6efd938d6d412
SHA17e226827103aa7bca9f2b63b1340ecb6422dfc6f
SHA256c18e5c8ffe6fa429bb88fdc3eca4b6e63304baf1c270b405eb6607ba7e7c8ab7
SHA5123f4db6a3d7cf6d78677a8f1da5b7e1c1c84b92e0880c9195046ea24961acd910ba24cbfaf0188420ff52ce7d7d7b53f833d917694807d12ab3d8f92702fa099a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD571129a380e5e5db54a958af739eeded5
SHA1bd9026d9166c2dc57f0410e18bf3266ad16478fc
SHA2562391c53c7547f048192be8dd34280e0bf65dfbdc77469611718da08e1c718f5f
SHA5125ea159948f0837028c9aa5dfdcab70f72bcddcfe0305555a9447a4a0fbb81aa7cbc6ac6f70351a8a207dc0c503f1c4d7aa53050add1680c9f92b55394e547d30
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD59f32e96ea85974ed5fc7bb0a4cca7ba4
SHA16cd5fcb1e235a5d7d0bf403905c770b2be9a03a9
SHA25634ae9014fec4ea11c2764d13005f4e408db957dd5e4f8bcb6a5f676c53b25950
SHA512f052fb353bd4cf405be506c17c35fb91f4e54e462c0607af58b1e3928a7874afbbba73414447fbb498a8c062334af2a4ad59e3556124a09efd379b9b74efdcec
-
C:\Users\Admin\Documents\vzlom_kamer_by_neit.rar_id25861706.exeFilesize
1.3MB
MD5520b5aedc6da20023cfae3ff6b6998c3
SHA16c40cb2643acc1155937e48a5bdfc41d7309d629
SHA25621899e226502fe63b066c51d76869c4ec5dbd03570551cea657d1dd5c97e7070
SHA512714dedbb46f16ec64eb0883462635cfa8cbb870b8bc05a419ebe272f82997f71e9bdb1adcdedd62fda7a1032cffca2b8ec93d2fdf4b5f3fa8dedbe7274372c6d
-
C:\Users\Admin\Documents\vzlom_kamer_by_neit.rar_id25861706.exeFilesize
1.3MB
MD5520b5aedc6da20023cfae3ff6b6998c3
SHA16c40cb2643acc1155937e48a5bdfc41d7309d629
SHA25621899e226502fe63b066c51d76869c4ec5dbd03570551cea657d1dd5c97e7070
SHA512714dedbb46f16ec64eb0883462635cfa8cbb870b8bc05a419ebe272f82997f71e9bdb1adcdedd62fda7a1032cffca2b8ec93d2fdf4b5f3fa8dedbe7274372c6d
-
C:\Windows\system32\GroupPolicy\gpt.iniFilesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
\Program Files (x86)\BKngBackup\SyncBackupShell.exeFilesize
2.5MB
MD5b2a22d65280abb89e601550434af57a1
SHA11f38d1c222b44ad78d7050f7454ee9289c32452b
SHA256bbf2f049ace040531f02f74be8a62838f46fdb83c94d5d2a1a675f3288d7cdc3
SHA512c17d83af8b31275f1783df55792c71e6f47dc5a8e80f4d78ab62379a5a32c0b4c8966e2807922577ec5211efcee3ecde40e40c9f59a9ff2d1b298fbacebdf669
-
\Program Files (x86)\ImageComparer\IC329.exeFilesize
5.1MB
MD55a37ea79983033abd4da83a9c3b9d615
SHA1ea71b21a0afa2925b7afdc10921ee2dfe9e4bdcf
SHA2567115f59cfe36e2e6ce6f254110973ff72c054b8fdce560d4d6244afd47c90c74
SHA512eb2ce09697155434d659ed5e64738554d54039c903a08db61bc1a957168057b88c1e3662ecfce9fd8c1469ba394a817b442364856bc1877ca77a33200be32d48
-
\Users\Admin\AppData\Local\Temp\1spd7n3o\W7bciU.exeFilesize
2.1MB
MD5b415a5a9c092bd6a447f22b31c57aed9
SHA17332a029199e5220ad33fba21e6378f9694691b0
SHA2567afea7d88699fb58522d63647b7fd269be1ca9f67ca1e84ca2c251f7cadd0c4c
SHA512753740a4d651850ef80ceee38b1f3839fd1888d308606d31f3f883bc6f16884cf3b6fc72e1834059e8aee547acac362cf74c939180c0c4ef0c74805e1a00ee81
-
\Users\Admin\AppData\Local\Temp\W4aJi2GZ\bMMbCBotYS3.exeFilesize
6.8MB
MD5d5bbadf7eb608dbaeb7999385071d561
SHA1dddfe1f735c8c07831788f7e1ecfcca7b7bd61d4
SHA25677e7b35c5b347d17c238687e387b38ca5d2b26f40ed413d288d3ef177557295a
SHA512acd1afa271554625a01d83f6fbc83e7504c46a140a273b6b8eeefe56b023f5dcdc17fe354e1b296c83ac14769b63aeb4a29579a6189b2fd3b29fd7da264f72d9
-
\Users\Admin\AppData\Local\Temp\W4aJi2GZ\bMMbCBotYS3.exeFilesize
6.8MB
MD5d5bbadf7eb608dbaeb7999385071d561
SHA1dddfe1f735c8c07831788f7e1ecfcca7b7bd61d4
SHA25677e7b35c5b347d17c238687e387b38ca5d2b26f40ed413d288d3ef177557295a
SHA512acd1afa271554625a01d83f6fbc83e7504c46a140a273b6b8eeefe56b023f5dcdc17fe354e1b296c83ac14769b63aeb4a29579a6189b2fd3b29fd7da264f72d9
-
\Users\Admin\AppData\Local\Temp\is-48S55.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Local\Temp\is-48S55.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-48S55.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-6IM9N.tmp\is-BV9KF.tmpFilesize
658KB
MD5f41b7e0820ac65586c014fe78e0d2e2b
SHA1c1f4514da16a703b7faadca27e966fe2001e9a87
SHA256059bbf7dccca1f2d49e144de237b6f7364bc72f3979f6a681374802feba25afd
SHA512c16ff3f423f94b040a30a41a41963a012e6dbd9a0b8c3b5aada2c0b409592699a98276cc165d1e8d421e1f5eda417132235a8235fe7aa97fac7374f7b45704b1
-
\Users\Admin\AppData\Local\Temp\is-K6VL9.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Local\Temp\is-K6VL9.tmp\_isetup\_isdecmp.dllFilesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
\Users\Admin\AppData\Local\Temp\is-K6VL9.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-K6VL9.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-L96PC.tmp\is-73AOG.tmpFilesize
656KB
MD57f9f5da24fa849ab560f986f1f38d6a0
SHA1b421f980946ca3b3acda363f8bbcb5f7db7466f2
SHA2565bbb7c9ab829e5c1c20674aeb7303dd88f7799568b632c18ebe0584cfbb27890
SHA51228b047f86bb5241d840cb84369b942e94c8bb85e72decb87c7237d43ca64a3d1c3a9a500576a7f5de872af3172154e844531deed667da3a4b4fbd7d34e90f196
-
\Users\Admin\AppData\Local\Temp\is-OE3E9.tmp\is-BD4U5.tmpFilesize
659KB
MD563bdf487b26c0886dbced14bab4d4257
SHA1e3621d870aa54d552861f1c71dea1fb36d71def6
SHA256ca5e816fa95cbcd2a880f2c319d3ddf09686e96ee633af63a396969e5e62335a
SHA512b433e540c9da175efdd09d44be39c563176046d89aa03edcc43e3582aa1f180e40e283503d152a46e07d4e77f8fa18b76118e425961b507ad5ca3864c39a7c40
-
\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\FileDate329\FileDate329.exeFilesize
2.5MB
MD5eebebcfdd1a311a022c2fbc282a44dcd
SHA15635edc5ca1cc15439ea4a02f98d6618c5f882af
SHA256b58bc59a2c034c8fa064a3c9a9273caab105cee0c70235d3cb5ea74acaa7cc38
SHA51260665d3b9fa8043d3764eb5c5924ae4e3ac16a4a2a95aeed47bb75cc2dd03bcf7d70275f3c3a227203b66c5e80588007a16a9add9d8be5e766fa24144168e38b
-
\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\_isetup\_isdecmp.dllFilesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-UA7VR.tmp\_isetup\_shfoldr.dllFilesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\ndSMArUD\ZftqBzFC3xcBmh.exeFilesize
1.7MB
MD5cd977fd8e4228b5910c6efd938d6d412
SHA17e226827103aa7bca9f2b63b1340ecb6422dfc6f
SHA256c18e5c8ffe6fa429bb88fdc3eca4b6e63304baf1c270b405eb6607ba7e7c8ab7
SHA5123f4db6a3d7cf6d78677a8f1da5b7e1c1c84b92e0880c9195046ea24961acd910ba24cbfaf0188420ff52ce7d7d7b53f833d917694807d12ab3d8f92702fa099a
-
memory/300-393-0x000000000296B000-0x00000000029A2000-memory.dmpFilesize
220KB
-
memory/300-392-0x0000000002964000-0x0000000002967000-memory.dmpFilesize
12KB
-
memory/300-391-0x0000000001D60000-0x0000000001D68000-memory.dmpFilesize
32KB
-
memory/668-316-0x0000000000400000-0x0000000001477000-memory.dmpFilesize
16.5MB
-
memory/668-307-0x0000000000400000-0x0000000001477000-memory.dmpFilesize
16.5MB
-
memory/668-289-0x0000000000400000-0x0000000001477000-memory.dmpFilesize
16.5MB
-
memory/668-305-0x0000000000400000-0x0000000001477000-memory.dmpFilesize
16.5MB
-
memory/668-318-0x0000000000400000-0x0000000001477000-memory.dmpFilesize
16.5MB
-
memory/780-156-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/780-54-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/812-281-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-160-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-155-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-159-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/812-290-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-353-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-349-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-345-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-341-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-309-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/812-311-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-329-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/812-163-0x0000000005820000-0x0000000005822000-memory.dmpFilesize
8KB
-
memory/848-331-0x0000000002600000-0x0000000002680000-memory.dmpFilesize
512KB
-
memory/848-332-0x0000000002600000-0x0000000002680000-memory.dmpFilesize
512KB
-
memory/848-328-0x0000000002270000-0x0000000002278000-memory.dmpFilesize
32KB
-
memory/848-327-0x000000001B310000-0x000000001B5F2000-memory.dmpFilesize
2.9MB
-
memory/848-330-0x0000000002600000-0x0000000002680000-memory.dmpFilesize
512KB
-
memory/848-334-0x000000000260B000-0x0000000002642000-memory.dmpFilesize
220KB
-
memory/912-162-0x0000000003A60000-0x0000000004D72000-memory.dmpFilesize
19.1MB
-
memory/912-76-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/912-148-0x0000000003A60000-0x0000000004D72000-memory.dmpFilesize
19.1MB
-
memory/912-157-0x0000000000400000-0x00000000004B3000-memory.dmpFilesize
716KB
-
memory/912-343-0x0000000000400000-0x00000000004B3000-memory.dmpFilesize
716KB
-
memory/964-303-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/964-203-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/964-285-0x0000000003070000-0x0000000003EFF000-memory.dmpFilesize
14.6MB
-
memory/964-299-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/968-304-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/968-172-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/968-296-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/1356-152-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/1356-149-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/1356-150-0x0000000000400000-0x0000000001712000-memory.dmpFilesize
19.1MB
-
memory/1632-283-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1632-302-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/1632-288-0x0000000003010000-0x0000000004087000-memory.dmpFilesize
16.5MB
-
memory/1632-319-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/1636-308-0x0000000000D00000-0x0000000001195000-memory.dmpFilesize
4.6MB
-
memory/1636-321-0x0000000000D00000-0x0000000001195000-memory.dmpFilesize
4.6MB
-
memory/1636-292-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/1636-352-0x0000000000D00000-0x0000000001195000-memory.dmpFilesize
4.6MB
-
memory/1636-291-0x0000000000D00000-0x0000000001195000-memory.dmpFilesize
4.6MB
-
memory/1636-333-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/1684-371-0x000000001B210000-0x000000001B4F2000-memory.dmpFilesize
2.9MB
-
memory/1684-294-0x0000000000400000-0x000000000128F000-memory.dmpFilesize
14.6MB
-
memory/1684-372-0x0000000002290000-0x0000000002298000-memory.dmpFilesize
32KB
-
memory/1684-374-0x0000000002710000-0x0000000002790000-memory.dmpFilesize
512KB
-
memory/1684-375-0x0000000002710000-0x0000000002790000-memory.dmpFilesize
512KB
-
memory/1684-376-0x000000000271B000-0x0000000002752000-memory.dmpFilesize
220KB
-
memory/1684-287-0x0000000000400000-0x000000000128F000-memory.dmpFilesize
14.6MB
-
memory/1684-301-0x0000000000400000-0x000000000128F000-memory.dmpFilesize
14.6MB
-
memory/1748-282-0x0000000010000000-0x000000001111A000-memory.dmpFilesize
17.1MB
-
memory/1772-320-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/1772-181-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/1772-297-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB