Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 05:17
Static task
static1
Behavioral task
behavioral1
Sample
27163309.exe
Resource
win7-20230220-en
General
-
Target
27163309.exe
-
Size
964KB
-
MD5
6808aea60d1be28a1d7e24570a03b206
-
SHA1
5f7485e994a024e0bb13ef9c5dc316bd2f55d06e
-
SHA256
c9a4baae5adc1ce17e2c27a7aa04a9880cbc7ea0f347a3450edabca7f2494721
-
SHA512
ec65184c184f74d834ce54be5981f59abbf0656755db72e18fa20bd15b003d163ab36fa09f22bbb97836c33ba7f990d5a1f7afaf032d7f85f391c0bb746c5f84
-
SSDEEP
24576:PnsJ39LyjbJkQFMhmC+6GD91ztJFimsiPo:PnsHyjtk2MYC5GD3zzFzHQ
Malware Config
Signatures
-
Detect Blackmoon payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/4076-242-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/memory/4076-324-0x0000000002B50000-0x0000000002B88000-memory.dmp family_blackmoon behavioral2/memory/4076-338-0x0000000002F90000-0x0000000002FF6000-memory.dmp family_blackmoon behavioral2/memory/4076-339-0x0000000002F90000-0x0000000002FF6000-memory.dmp family_blackmoon behavioral2/memory/3524-341-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/memory/3524-342-0x00000000023C0000-0x00000000023F8000-memory.dmp family_blackmoon behavioral2/memory/4076-343-0x0000000002F90000-0x0000000002FF6000-memory.dmp family_blackmoon behavioral2/memory/3524-352-0x0000000002E70000-0x0000000002ED6000-memory.dmp family_blackmoon behavioral2/memory/3524-353-0x0000000002E70000-0x0000000002ED6000-memory.dmp family_blackmoon behavioral2/memory/3524-375-0x0000000002E70000-0x0000000002ED6000-memory.dmp family_blackmoon behavioral2/memory/4076-420-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/memory/4076-453-0x0000000002B50000-0x0000000002B88000-memory.dmp family_blackmoon behavioral2/memory/3524-454-0x00000000023C0000-0x00000000023F8000-memory.dmp family_blackmoon behavioral2/memory/3524-457-0x0000000002E70000-0x0000000002ED6000-memory.dmp family_blackmoon behavioral2/memory/4076-458-0x0000000002F90000-0x0000000002FF6000-memory.dmp family_blackmoon behavioral2/memory/4076-460-0x0000000002F90000-0x0000000002FF6000-memory.dmp family_blackmoon behavioral2/memory/4076-470-0x0000000002F90000-0x0000000002FF6000-memory.dmp family_blackmoon behavioral2/memory/4076-473-0x0000000002B50000-0x0000000002B88000-memory.dmp family_blackmoon -
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4076-429-0x0000000010001000-0x000000001000F000-memory.dmp family_gh0strat behavioral2/memory/4076-430-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat behavioral2/memory/3524-451-0x0000000010000000-0x0000000010003000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
._cache_Synaptics.exe27163309.exeSynaptics.exe._cache_27163309.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 27163309.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation ._cache_27163309.exe -
Executes dropped EXE 3 IoCs
Processes:
._cache_27163309.exeSynaptics.exe._cache_Synaptics.exepid process 4076 ._cache_27163309.exe 4760 Synaptics.exe 3524 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
Processes:
._cache_27163309.exe._cache_Synaptics.exepid process 4076 ._cache_27163309.exe 3524 ._cache_Synaptics.exe 4076 ._cache_27163309.exe 3524 ._cache_Synaptics.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exe upx C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exe upx C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exe upx behavioral2/memory/4076-242-0x0000000000400000-0x0000000000473000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe upx C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe upx behavioral2/memory/3524-341-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4076-420-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
._cache_27163309.exe._cache_Synaptics.exe27163309.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run ._cache_27163309.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qdate = "C:\\Users\\Public\\Documents\\Applicationhylkq.exe" ._cache_27163309.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run ._cache_Synaptics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qdate = "C:\\Users\\Public\\Documents\\Applicationtddzl.exe" ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 27163309.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
._cache_27163309.exedescription ioc process File opened (read-only) \??\O: ._cache_27163309.exe File opened (read-only) \??\P: ._cache_27163309.exe File opened (read-only) \??\R: ._cache_27163309.exe File opened (read-only) \??\N: ._cache_27163309.exe File opened (read-only) \??\V: ._cache_27163309.exe File opened (read-only) \??\E: ._cache_27163309.exe File opened (read-only) \??\G: ._cache_27163309.exe File opened (read-only) \??\H: ._cache_27163309.exe File opened (read-only) \??\J: ._cache_27163309.exe File opened (read-only) \??\K: ._cache_27163309.exe File opened (read-only) \??\L: ._cache_27163309.exe File opened (read-only) \??\B: ._cache_27163309.exe File opened (read-only) \??\Q: ._cache_27163309.exe File opened (read-only) \??\S: ._cache_27163309.exe File opened (read-only) \??\U: ._cache_27163309.exe File opened (read-only) \??\X: ._cache_27163309.exe File opened (read-only) \??\Z: ._cache_27163309.exe File opened (read-only) \??\F: ._cache_27163309.exe File opened (read-only) \??\I: ._cache_27163309.exe File opened (read-only) \??\M: ._cache_27163309.exe File opened (read-only) \??\T: ._cache_27163309.exe File opened (read-only) \??\W: ._cache_27163309.exe File opened (read-only) \??\Y: ._cache_27163309.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4496 4076 WerFault.exe ._cache_27163309.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXE._cache_27163309.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_27163309.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ._cache_27163309.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 4 IoCs
Processes:
27163309.exeSynaptics.exe._cache_27163309.exe._cache_Synaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 27163309.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings ._cache_27163309.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings ._cache_Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1568 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
._cache_27163309.exe._cache_Synaptics.exepid process 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
._cache_27163309.exe._cache_Synaptics.exeEXCEL.EXEpid process 4076 ._cache_27163309.exe 3524 ._cache_Synaptics.exe 1568 EXCEL.EXE 1568 EXCEL.EXE 1568 EXCEL.EXE 1568 EXCEL.EXE 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 4076 ._cache_27163309.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 3524 ._cache_Synaptics.exe 1568 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
27163309.exeSynaptics.exe._cache_27163309.exe._cache_Synaptics.exedescription pid process target process PID 4400 wrote to memory of 4076 4400 27163309.exe ._cache_27163309.exe PID 4400 wrote to memory of 4076 4400 27163309.exe ._cache_27163309.exe PID 4400 wrote to memory of 4076 4400 27163309.exe ._cache_27163309.exe PID 4400 wrote to memory of 4760 4400 27163309.exe Synaptics.exe PID 4400 wrote to memory of 4760 4400 27163309.exe Synaptics.exe PID 4400 wrote to memory of 4760 4400 27163309.exe Synaptics.exe PID 4760 wrote to memory of 3524 4760 Synaptics.exe ._cache_Synaptics.exe PID 4760 wrote to memory of 3524 4760 Synaptics.exe ._cache_Synaptics.exe PID 4760 wrote to memory of 3524 4760 Synaptics.exe ._cache_Synaptics.exe PID 4076 wrote to memory of 1836 4076 ._cache_27163309.exe NOTEPAD.EXE PID 4076 wrote to memory of 1836 4076 ._cache_27163309.exe NOTEPAD.EXE PID 4076 wrote to memory of 1836 4076 ._cache_27163309.exe NOTEPAD.EXE PID 3524 wrote to memory of 2564 3524 ._cache_Synaptics.exe NOTEPAD.EXE PID 3524 wrote to memory of 2564 3524 ._cache_Synaptics.exe NOTEPAD.EXE PID 3524 wrote to memory of 2564 3524 ._cache_Synaptics.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\27163309.exe"C:\Users\Admin\AppData\Local\Temp\27163309.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exe"C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\._cache_27163309.txt3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 21843⤵
- Program crash
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.txt4⤵
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4076 -ip 40761⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
964KB
MD56808aea60d1be28a1d7e24570a03b206
SHA15f7485e994a024e0bb13ef9c5dc316bd2f55d06e
SHA256c9a4baae5adc1ce17e2c27a7aa04a9880cbc7ea0f347a3450edabca7f2494721
SHA512ec65184c184f74d834ce54be5981f59abbf0656755db72e18fa20bd15b003d163ab36fa09f22bbb97836c33ba7f990d5a1f7afaf032d7f85f391c0bb746c5f84
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
964KB
MD56808aea60d1be28a1d7e24570a03b206
SHA15f7485e994a024e0bb13ef9c5dc316bd2f55d06e
SHA256c9a4baae5adc1ce17e2c27a7aa04a9880cbc7ea0f347a3450edabca7f2494721
SHA512ec65184c184f74d834ce54be5981f59abbf0656755db72e18fa20bd15b003d163ab36fa09f22bbb97836c33ba7f990d5a1f7afaf032d7f85f391c0bb746c5f84
-
C:\ProgramData\Synaptics\Synaptics.exeFilesize
964KB
MD56808aea60d1be28a1d7e24570a03b206
SHA15f7485e994a024e0bb13ef9c5dc316bd2f55d06e
SHA256c9a4baae5adc1ce17e2c27a7aa04a9880cbc7ea0f347a3450edabca7f2494721
SHA512ec65184c184f74d834ce54be5981f59abbf0656755db72e18fa20bd15b003d163ab36fa09f22bbb97836c33ba7f990d5a1f7afaf032d7f85f391c0bb746c5f84
-
C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exeFilesize
210KB
MD53c2241f0c7d29032d0130a2ddbc9c2fa
SHA10fdc6879b4e8d617827b7568ffacfec750945fbd
SHA25682ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
SHA51221e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exeFilesize
210KB
MD53c2241f0c7d29032d0130a2ddbc9c2fa
SHA10fdc6879b4e8d617827b7568ffacfec750945fbd
SHA25682ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
SHA51221e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
C:\Users\Admin\AppData\Local\Temp\._cache_27163309.exeFilesize
210KB
MD53c2241f0c7d29032d0130a2ddbc9c2fa
SHA10fdc6879b4e8d617827b7568ffacfec750945fbd
SHA25682ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
SHA51221e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
C:\Users\Admin\AppData\Local\Temp\._cache_27163309.txtFilesize
120KB
MD53aea5b78bac5359a799c2714fecccd1a
SHA15d3203b328ecfc7a55c0ded1032d209e9f273367
SHA256c05e763cab67cf9daf5be7a6a6cff2650223987a9693eaa119f69b2bbb6df6c3
SHA5129513cc84a7ed3dd709d4affb03f6e286dcd43e82f33441c00a9d74d2b45449f2ee20baa8db46218d7a59d9e62fb7f95050ea305166e70f3e71dde39ccf07b6d3
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exeFilesize
210KB
MD53c2241f0c7d29032d0130a2ddbc9c2fa
SHA10fdc6879b4e8d617827b7568ffacfec750945fbd
SHA25682ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
SHA51221e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exeFilesize
210KB
MD53c2241f0c7d29032d0130a2ddbc9c2fa
SHA10fdc6879b4e8d617827b7568ffacfec750945fbd
SHA25682ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
SHA51221e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.txtFilesize
120KB
MD53aea5b78bac5359a799c2714fecccd1a
SHA15d3203b328ecfc7a55c0ded1032d209e9f273367
SHA256c05e763cab67cf9daf5be7a6a6cff2650223987a9693eaa119f69b2bbb6df6c3
SHA5129513cc84a7ed3dd709d4affb03f6e286dcd43e82f33441c00a9d74d2b45449f2ee20baa8db46218d7a59d9e62fb7f95050ea305166e70f3e71dde39ccf07b6d3
-
C:\Users\Admin\AppData\Local\Temp\aaaty.dllFilesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
C:\Users\Admin\AppData\Local\Temp\aaaty.dllFilesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
C:\Users\Admin\AppData\Local\Temp\aaaty.dllFilesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
C:\Users\Admin\AppData\Local\Temp\u4taQeL3.xlsmFilesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Users\Public\Documents\hters.dllFilesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
C:\Users\Public\Documents\hters.dllFilesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
C:\Users\Public\Documents\hters.dllFilesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
C:\Users\Public\Documents\hters.dllFilesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
C:\Users\Public\Documents\sjsw.logFilesize
209B
MD59aa8843dc08ee15ae64c55d96457ddc5
SHA11a378d1e99d028a46b1503811c4f4587a7655dcd
SHA25603babba57720d41d73c385e1b3afe58f24e9c3718a76bf73df8a048779a91496
SHA512e885d57ebcd91a6d81fba2fa376986d64530ace434f0bad02f44c2eac8ce070fa39a248d9e353f124bf13616d214ec3e7dada7bc8f11914e79a3525416794658
-
C:\Users\Public\Documents\sjsw.logFilesize
212B
MD5fd9b6fb863fb5833b203c268f4da337f
SHA19721de4f50eb3eef69aeeb789bc2cc06e98b9b31
SHA256450242b17f6b73f6067c0b3de59d2397cc72e45368200ed699f14f7bd363ef78
SHA512506eea7a3489144e24905065fa9df38b94665f156df36ecb824b20c14e3994ee013c539af10bc82562c47df22a2767752bac48a6d3b1f9fdfc842632372c3f78
-
C:\Users\Public\Documents\sjsw.logFilesize
212B
MD5fd9b6fb863fb5833b203c268f4da337f
SHA19721de4f50eb3eef69aeeb789bc2cc06e98b9b31
SHA256450242b17f6b73f6067c0b3de59d2397cc72e45368200ed699f14f7bd363ef78
SHA512506eea7a3489144e24905065fa9df38b94665f156df36ecb824b20c14e3994ee013c539af10bc82562c47df22a2767752bac48a6d3b1f9fdfc842632372c3f78
-
C:\Users\Public\Documents\sjwback.datFilesize
189B
MD5942998bb8e787b7225cdb553198ded92
SHA1e27067e9fbd6d5bf7bc7cf4c413fc5b288c663d6
SHA2560803dc3741aaff2888dd74ccad66de68f564d7cad44667e1b57edb1d639d4c69
SHA51274a8dc51dd30fa8b030086ace232091bf553cdf3123c1203bbd1e1806ba0c4a27e3e77cbcf21f840394c3c5a8ee0bbdbc98c37e1df1c35f51b14879ee10c1300
-
memory/1568-378-0x00007FFA306F0000-0x00007FFA30700000-memory.dmpFilesize
64KB
-
memory/1568-374-0x00007FFA306F0000-0x00007FFA30700000-memory.dmpFilesize
64KB
-
memory/1568-401-0x00007FFA2E3C0000-0x00007FFA2E3D0000-memory.dmpFilesize
64KB
-
memory/1568-399-0x00007FFA2E3C0000-0x00007FFA2E3D0000-memory.dmpFilesize
64KB
-
memory/1568-379-0x00007FFA306F0000-0x00007FFA30700000-memory.dmpFilesize
64KB
-
memory/1568-380-0x00007FFA306F0000-0x00007FFA30700000-memory.dmpFilesize
64KB
-
memory/1568-377-0x00007FFA306F0000-0x00007FFA30700000-memory.dmpFilesize
64KB
-
memory/3524-436-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/3524-425-0x0000000003C10000-0x0000000003D02000-memory.dmpFilesize
968KB
-
memory/3524-457-0x0000000002E70000-0x0000000002ED6000-memory.dmpFilesize
408KB
-
memory/3524-375-0x0000000002E70000-0x0000000002ED6000-memory.dmpFilesize
408KB
-
memory/3524-376-0x0000000002400000-0x0000000002403000-memory.dmpFilesize
12KB
-
memory/3524-341-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/3524-454-0x00000000023C0000-0x00000000023F8000-memory.dmpFilesize
224KB
-
memory/3524-451-0x0000000010000000-0x0000000010003000-memory.dmpFilesize
12KB
-
memory/3524-442-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/3524-428-0x0000000003C10000-0x0000000003D02000-memory.dmpFilesize
968KB
-
memory/3524-353-0x0000000002E70000-0x0000000002ED6000-memory.dmpFilesize
408KB
-
memory/3524-352-0x0000000002E70000-0x0000000002ED6000-memory.dmpFilesize
408KB
-
memory/3524-342-0x00000000023C0000-0x00000000023F8000-memory.dmpFilesize
224KB
-
memory/3524-426-0x0000000003C10000-0x0000000003D02000-memory.dmpFilesize
968KB
-
memory/4076-432-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4076-430-0x0000000010000000-0x0000000010017000-memory.dmpFilesize
92KB
-
memory/4076-458-0x0000000002F90000-0x0000000002FF6000-memory.dmpFilesize
408KB
-
memory/4076-421-0x0000000003AD0000-0x0000000003BC2000-memory.dmpFilesize
968KB
-
memory/4076-422-0x0000000003AD0000-0x0000000003BC2000-memory.dmpFilesize
968KB
-
memory/4076-423-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4076-424-0x0000000003AD0000-0x0000000003BC2000-memory.dmpFilesize
968KB
-
memory/4076-338-0x0000000002F90000-0x0000000002FF6000-memory.dmpFilesize
408KB
-
memory/4076-345-0x0000000002B90000-0x0000000002B93000-memory.dmpFilesize
12KB
-
memory/4076-242-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4076-429-0x0000000010001000-0x000000001000F000-memory.dmpFilesize
56KB
-
memory/4076-470-0x0000000002F90000-0x0000000002FF6000-memory.dmpFilesize
408KB
-
memory/4076-420-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4076-343-0x0000000002F90000-0x0000000002FF6000-memory.dmpFilesize
408KB
-
memory/4076-460-0x0000000002F90000-0x0000000002FF6000-memory.dmpFilesize
408KB
-
memory/4076-324-0x0000000002B50000-0x0000000002B88000-memory.dmpFilesize
224KB
-
memory/4076-453-0x0000000002B50000-0x0000000002B88000-memory.dmpFilesize
224KB
-
memory/4076-473-0x0000000002B50000-0x0000000002B88000-memory.dmpFilesize
224KB
-
memory/4076-339-0x0000000002F90000-0x0000000002FF6000-memory.dmpFilesize
408KB
-
memory/4076-466-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/4400-183-0x0000000002380000-0x0000000002381000-memory.dmpFilesize
4KB
-
memory/4400-262-0x0000000000400000-0x00000000004F7000-memory.dmpFilesize
988KB
-
memory/4760-496-0x0000000000400000-0x00000000004F7000-memory.dmpFilesize
988KB
-
memory/4760-456-0x0000000002240000-0x0000000002241000-memory.dmpFilesize
4KB
-
memory/4760-325-0x0000000002240000-0x0000000002241000-memory.dmpFilesize
4KB
-
memory/4760-474-0x0000000000400000-0x00000000004F7000-memory.dmpFilesize
988KB
-
memory/4760-419-0x0000000000400000-0x00000000004F7000-memory.dmpFilesize
988KB