Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2023, 04:33

General

  • Target

    NEAS.1e5e57747f3223647eed93baedcd4e70_JC.exe

  • Size

    3.0MB

  • MD5

    1e5e57747f3223647eed93baedcd4e70

  • SHA1

    41d021b36272d89bf3f5a51a5c42600ceab5a2d9

  • SHA256

    d3450195f893d7df66bfa051ef9bfea1859a7360749bbedd59567016d9abbe9f

  • SHA512

    2bb4349321c19f5edfb1a86c941df1294c75152191ed18ce64c170e3a66c9395d48aee44faf45d3cd2e311b3944738ae5278b4c26746c080f9cb5369a02e8ff8

  • SSDEEP

    49152:gUmJN8WOSElD+ff+PruHlHEIj9YX+BFBrzbIzmCFoqxmMONz0WuhzEYLXCGLcv7H:YJN8WOSE9+fMclH1YqBnbIzPKqjWoocw

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 17 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1e5e57747f3223647eed93baedcd4e70_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1e5e57747f3223647eed93baedcd4e70_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ].exe
      C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ].exe -t 2788 C:\Users\Admin\AppData\Local\Temp\NEAS.1e5e57747f3223647eed93baedcd4e70_JC.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe
        C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1968
      • C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\Ú¤¡ïÍõV3.74.exe
        C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\Ú¤¡ïÍõV3.74.exe
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del "C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\*ïÍõV3.74.exe"
          4⤵
            PID:2392
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c del "C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\*.dll"
            4⤵
              PID:636
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x514
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2668

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B70478C503EFF9D849F66D2FFA74BEB

        Filesize

        471B

        MD5

        00fea4a918e89eb400adb152f9b406d0

        SHA1

        17653a5dcaf8c90f968fac45a360df45ea1fdcdb

        SHA256

        92697424b79a8c5ec1cbd62fb473bc9e85ae803c3b8f2238d577b1815db66892

        SHA512

        8bb6ad95de15b391fe29dd892b0ccd8bedf9b8d675c2719ba9093258f8c99de37eb45fecd6c44f366cbbadd195e5a7bdf2c3537c4c3348e2ef868e08a58b861d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

        Filesize

        471B

        MD5

        5cdd5b77bdee93b62b47bbdc6188c037

        SHA1

        510816f1f173a0cb20d179b3adef79b976d4acae

        SHA256

        412117a2bff34f6ee6e44934473ce3b1363adcb42d80ed32581e1e6cb51160fe

        SHA512

        90d33526750d3543d27635f275023af0b4264fd9e13a1969b6412c56170aad53e28a7d88467f62375cdeba6eefdc121f3eae889f4b76e571dd66e6072b22725f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B70478C503EFF9D849F66D2FFA74BEB

        Filesize

        404B

        MD5

        36f64b973a85ff582cf6611c5fdc4ddf

        SHA1

        52b64fe72722264f91ae221e551b9ba15f0f1267

        SHA256

        db624b8af3f8d923fd3c41e9daacb476cf8f47f87c343b00397b398f8e802a3a

        SHA512

        4380c2fb1d17ea53ed0ef4a21ac03eed65df0936e172d2becf8c80ed68bd63aa907dd1c9b308623844e23772b13274d3a55d106f96ddd50e5690bd6ed37efc44

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        310fed957ae217b5e9ec256190c9b53e

        SHA1

        d66c32535373c83cb64743f5115cc3e2d13a9d6d

        SHA256

        d3993a263fff420fdbf1fd7dc5a17acf98fadbb035f13a7b3860453c3f561829

        SHA512

        5a7213546a09eed21f71452f34c7907d089329eb62dcaf6751974a00ef08fb961a429e0d6311301952a88b1df76f1f011ff8e721ad993af522fa3ed273e208db

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        85345e8750cb6b13a70ad78f8e1a678e

        SHA1

        e2148e44dbb84a645896e34cbfaff782ff2f9679

        SHA256

        f618a0975a4d39822e1fc28b5c9aed3995b62e1e42113d309bcae73ed812ad2b

        SHA512

        478e72e3533e4d8539feb385c2f28fcf3de8825b5d5213a86fc08f124ed0f42fd0e5fabd5e1b36e4c520db5809a72a928985a1c10ffb47453f2c870bce275403

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        0fa1e7160f14e9251fc2c7fac5fda8c3

        SHA1

        c8c2967696d9706296fdb2ea30373c6fc4b2896d

        SHA256

        509c7e0b4621d75e4ec86dcae822dcbca656864ce23cb05154a5c326e7228bc7

        SHA512

        b70d6b71dfe49af0e50cfd0150fc57d0cdac2a44803749ace241a449c5d39e4c87c18d968e64902f2c493ddc8a2aa47664d976925dc3cf9e6202488cf13dc317

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        3704bf104f663dd8844aec80d1a9b368

        SHA1

        4f980897672460c489d5565a6c741ccb2a48bc89

        SHA256

        dc80f982ab5c6e3ce6c3fc9b8a82f33dbeadd843d4217ec729d4938f5dc07adf

        SHA512

        8389e410cec451490b9e312015e4cbfb4ba7b5875a8c37fc2d986415b8a55c347ca8ef9cfd15e83abe376efdea6a2a17a2c582b9877ac8b08fab041c427aca7c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        c7bf2f5e0e4fd328f91e5132e2e884c4

        SHA1

        7a53af458ef57cb752c4b2214ca68ce37e34ec45

        SHA256

        553fc03dfaa880938be3d914aa3b35f664f18cf7bad1a8ca36f73140a9699c58

        SHA512

        5da78d460e0d99e6c06c75c60e69df5f88ebf399450bcd9c1df786d180ba9ca83293e1b643b5796f22c9aef63720f097268760d0c1fd9f63c83ed4e9c451e9fc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        3610de0b97f17ef4be30f316c629f223

        SHA1

        9ee5de5bf38c28d8ad73d033eb3a005cc9b7074e

        SHA256

        177a0d669ea8006acb6992d6547ea214ac5433037f9838e4baa6c4dfc3933933

        SHA512

        e557463c11202bdfa6728a526aaa4557d3faeab8f00c7008528d2f2f4ca88b09e40f146f7f31aadc5ad3e747fc8529b09ef0aaa09435fdac295f469b70decdc8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D

        Filesize

        404B

        MD5

        a821949b49b136a8c4b0584005433369

        SHA1

        9bf593f776d078bfb0eb2c77678fa269ceac29b4

        SHA256

        a6073808706b525084961837c64e7f4fc4be51579a044b047b615a6af1963541

        SHA512

        f7993a455584b2b3ee79873f3251c37f6824950f962bd9cebfd9b3911dd93ee042bba654c234ed124f7cfe06936567ab11d77e448cc70e8e32b65bfbe8d269de

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IS2BN16O\common[1].css

        Filesize

        5KB

        MD5

        ed02fc9e7222dace7f8ed55a07e728a7

        SHA1

        19e41e36256a5310e378e929da7d51197290e6ca

        SHA256

        96f90290cd200a853317b80eb1f760cfc5f5e714db5015d53000007e24fdc0a8

        SHA512

        07ef360bd9e56f559df10f3e4d93b4b3ce0272bce47d5103e657ffbe6012109ac301983db956bcea21354cda9b9d5ef803dabe85d0a52dc6b76a960044014450

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QJT1WABK\layui.min[1].css

        Filesize

        116KB

        MD5

        cd6954c37a536fe610c524eef89fcbea

        SHA1

        2cca68057e20f44c34a93fabcba0ca671d092a0f

        SHA256

        04d0e78d4284e46f8be793e6c9d8cff7552440df4386192f521b3b1c23a31bf7

        SHA512

        4780c74b06b6bfdd41f003c869a5c08fa4e496597eec954548bfff25c04318f83a8dfe75fa109d3cd2eb19e2b826860fb19b8187bea2a2d7fdea6226649c76fc

      • C:\Users\Admin\AppData\Local\Temp\CabBE21.tmp

        Filesize

        61KB

        MD5

        f3441b8572aae8801c04f3060b550443

        SHA1

        4ef0a35436125d6821831ef36c28ffaf196cda15

        SHA256

        6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

        SHA512

        5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

      • C:\Users\Admin\AppData\Local\Temp\Tar35B1.tmp

        Filesize

        163KB

        MD5

        9441737383d21192400eca82fda910ec

        SHA1

        725e0d606a4fc9ba44aa8ffde65bed15e65367e4

        SHA256

        bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

        SHA512

        7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

      • C:\Users\Admin\AppData\Local\Temp\bakdel.dat

        Filesize

        78B

        MD5

        34258013e7466e3bbc0b4a2f556f437c

        SHA1

        c878040a40abad6692369ed3501457e08b7d99ad

        SHA256

        cae2a624f09cc188598291d01971fc1c9dc2dd994cd133ca2d8095abc3460b59

        SHA512

        372e151d99ee4892098b241aabf3e2a7640ab9faf9920fe118d440984e779981592b66d1b8a87ce3ec6ca96bb032bb0a377412425bfa3f482e2044a54f5322b4

      • C:\Users\Admin\AppData\Local\Temp\efb0f5170ebb92128579b7839ae02008.ini

        Filesize

        1KB

        MD5

        aebbe6290ea628196e1b0e8f7136d67c

        SHA1

        a6e993acd7ccd10d64ec9da00b25cf14521ebe3b

        SHA256

        acf52e483ab405e20ba132b551a99f882bfa48ec11aa7ec1e1dddf331322a171

        SHA512

        89083b12e0eecb4ac8828e686c9f0096e58462eaff9d8ca103fac8946def87602d46720506915a4093a248a88599905ab3fb69d7f850abcec5573cbd0b413403

      • C:\Users\Admin\AppData\Local\Temp\efb0f5170ebb92128579b7839ae02008A.ini

        Filesize

        1KB

        MD5

        b607f30d96202658ef480ad89dc692b0

        SHA1

        fb4d05f179b7ebfe6628366e913424ddf69b112f

        SHA256

        c038b78b08f96a98fc07fea81fdec895454194e02ea98c98bd4b9cef461fc0a4

        SHA512

        99f8786f8f98ffb756cd5b52fdb62c6161f984be3c953808d6af11be855b0eedfc9762aff05b15d58441abc65d3ac5b1afdb9433d8595b93eae496b667e15ea2

      • C:\Users\Admin\AppData\Local\Temp\Ú¤¡ïÍõV3.74.exepack.tmp

        Filesize

        2KB

        MD5

        deafe10bd1153b180f90badbedb00f36

        SHA1

        8334bade65ca861c3eddde6241651f5126d8b538

        SHA256

        a3e2aca95dc6366ff31e5c34ce10d99a3c85495401f0ca7257ffbcf67a728984

        SHA512

        8aa569baa4311d906317ad91a5f67ada177148dd3d45b7309f93f979fbf0c59010fefe1e3ad6352b07157c2effda5e7d44e4958e874771ca9f84462654c70de3

      • C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ].exe

        Filesize

        3.0MB

        MD5

        1e5e57747f3223647eed93baedcd4e70

        SHA1

        41d021b36272d89bf3f5a51a5c42600ceab5a2d9

        SHA256

        d3450195f893d7df66bfa051ef9bfea1859a7360749bbedd59567016d9abbe9f

        SHA512

        2bb4349321c19f5edfb1a86c941df1294c75152191ed18ce64c170e3a66c9395d48aee44faf45d3cd2e311b3944738ae5278b4c26746c080f9cb5369a02e8ff8

      • C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ].exe

        Filesize

        3.0MB

        MD5

        1e5e57747f3223647eed93baedcd4e70

        SHA1

        41d021b36272d89bf3f5a51a5c42600ceab5a2d9

        SHA256

        d3450195f893d7df66bfa051ef9bfea1859a7360749bbedd59567016d9abbe9f

        SHA512

        2bb4349321c19f5edfb1a86c941df1294c75152191ed18ce64c170e3a66c9395d48aee44faf45d3cd2e311b3944738ae5278b4c26746c080f9cb5369a02e8ff8

      • C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\Ú¤¡ïÍõV3.74.exe

        Filesize

        78.0MB

        MD5

        d12f48ca710cb2d78f0611da663a4572

        SHA1

        99ad068a214b430537b5ad4a2ed70abbf690f161

        SHA256

        89c61e050540b98c005a237270589a8f3129d7a07f9984c5b1c13c2bcaf7f51c

        SHA512

        773628e386cbdeb9b3e10939d7be52fe17c392c4e8312e9dafd49f1ce349ec3f42d492077e8c46f705f32f4b9724ebf5762000faab2165d04b9d873d029de9f9

      • C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\Ú¤¡ïÍõV3.74.exe

        Filesize

        78.0MB

        MD5

        d12f48ca710cb2d78f0611da663a4572

        SHA1

        99ad068a214b430537b5ad4a2ed70abbf690f161

        SHA256

        89c61e050540b98c005a237270589a8f3129d7a07f9984c5b1c13c2bcaf7f51c

        SHA512

        773628e386cbdeb9b3e10939d7be52fe17c392c4e8312e9dafd49f1ce349ec3f42d492077e8c46f705f32f4b9724ebf5762000faab2165d04b9d873d029de9f9

      • C:\Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\Ú¤¡ïÍõV3.74.exe

        Filesize

        78.0MB

        MD5

        d12f48ca710cb2d78f0611da663a4572

        SHA1

        99ad068a214b430537b5ad4a2ed70abbf690f161

        SHA256

        89c61e050540b98c005a237270589a8f3129d7a07f9984c5b1c13c2bcaf7f51c

        SHA512

        773628e386cbdeb9b3e10939d7be52fe17c392c4e8312e9dafd49f1ce349ec3f42d492077e8c46f705f32f4b9724ebf5762000faab2165d04b9d873d029de9f9

      • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\ExuiKrnln_Win32.lib

        Filesize

        1.6MB

        MD5

        031ad1ecd93701d39265771942ec716c

        SHA1

        cb3ef507bf0e848894fbb96a29bfc94a0c302152

        SHA256

        9a7fde2ea7883701bf858e0daef74d787a31c3cbd9f1171cec0a3a382ee9e6ba

        SHA512

        374dab32b6304834c7acd8b5e6701ece016bf57d3abdd416ef2b63f7cbda24c9e59f9dfc27b6823ac6256bbab38aace74334dec7d57f1ef6cb9b80c239003bae

      • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\rule.ini

        Filesize

        100B

        MD5

        d20c4b47240c355f995f44688b3eba6b

        SHA1

        0817c8a25da4ee89f365209a4125c49b3c709835

        SHA256

        e1835d21535d8c97ee8a95c98733aa991b35bebeb8790824879cce7b34d768eb

        SHA512

        a861fbaafb57e9e0c4a94c7a03b1d9480b01d8336a00d73d17681908c6d722eb8bf887fa4aaf5eb922d85fca49b4f9777717f838c0d6d2bbf8f697b3c86f7c63

      • C:\Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe

        Filesize

        4.1MB

        MD5

        5ec0331e4fa08ab2ee9897812861a2dc

        SHA1

        814da663266dde484fcdfba5154a414cc8672bc0

        SHA256

        bdbf6c411df4c0db58d42b747ad78baf03b5e122a68e067d311456ff83f38f9d

        SHA512

        192a6bcafc329527d59351a0b37b5c67c860932a676942abf382915542637c301d0195bcf099151d9be5305a371cb36b4219951c699ff1b1f24779170988ce9f

      • \Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ].exe

        Filesize

        3.0MB

        MD5

        1e5e57747f3223647eed93baedcd4e70

        SHA1

        41d021b36272d89bf3f5a51a5c42600ceab5a2d9

        SHA256

        d3450195f893d7df66bfa051ef9bfea1859a7360749bbedd59567016d9abbe9f

        SHA512

        2bb4349321c19f5edfb1a86c941df1294c75152191ed18ce64c170e3a66c9395d48aee44faf45d3cd2e311b3944738ae5278b4c26746c080f9cb5369a02e8ff8

      • \Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ].exe

        Filesize

        3.0MB

        MD5

        1e5e57747f3223647eed93baedcd4e70

        SHA1

        41d021b36272d89bf3f5a51a5c42600ceab5a2d9

        SHA256

        d3450195f893d7df66bfa051ef9bfea1859a7360749bbedd59567016d9abbe9f

        SHA512

        2bb4349321c19f5edfb1a86c941df1294c75152191ed18ce64c170e3a66c9395d48aee44faf45d3cd2e311b3944738ae5278b4c26746c080f9cb5369a02e8ff8

      • \Users\Admin\AppData\Roaming\genwangame\NEAS.1e5e57747f3223647eed93baedcd4e70_JC[ʵ]\Ú¤¡ïÍõV3.74.exe

        Filesize

        78.0MB

        MD5

        d12f48ca710cb2d78f0611da663a4572

        SHA1

        99ad068a214b430537b5ad4a2ed70abbf690f161

        SHA256

        89c61e050540b98c005a237270589a8f3129d7a07f9984c5b1c13c2bcaf7f51c

        SHA512

        773628e386cbdeb9b3e10939d7be52fe17c392c4e8312e9dafd49f1ce349ec3f42d492077e8c46f705f32f4b9724ebf5762000faab2165d04b9d873d029de9f9

      • \Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\ExuiKrnln_Win32.lib

        Filesize

        1.6MB

        MD5

        031ad1ecd93701d39265771942ec716c

        SHA1

        cb3ef507bf0e848894fbb96a29bfc94a0c302152

        SHA256

        9a7fde2ea7883701bf858e0daef74d787a31c3cbd9f1171cec0a3a382ee9e6ba

        SHA512

        374dab32b6304834c7acd8b5e6701ece016bf57d3abdd416ef2b63f7cbda24c9e59f9dfc27b6823ac6256bbab38aace74334dec7d57f1ef6cb9b80c239003bae

      • \Users\Admin\AppData\Roaming\genwangame\cqzj_sevice\Õ½¼ÇÊÚȨ¹«Ê¾Óë·À³ÁÃÔÈÏÖ¤.exe

        Filesize

        4.1MB

        MD5

        5ec0331e4fa08ab2ee9897812861a2dc

        SHA1

        814da663266dde484fcdfba5154a414cc8672bc0

        SHA256

        bdbf6c411df4c0db58d42b747ad78baf03b5e122a68e067d311456ff83f38f9d

        SHA512

        192a6bcafc329527d59351a0b37b5c67c860932a676942abf382915542637c301d0195bcf099151d9be5305a371cb36b4219951c699ff1b1f24779170988ce9f

      • memory/1968-89-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-647-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-842-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-126-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-840-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-844-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-450-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-802-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1968-88-0x00000000001C0000-0x00000000001C3000-memory.dmp

        Filesize

        12KB

      • memory/1968-93-0x0000000010000000-0x0000000010059000-memory.dmp

        Filesize

        356KB

      • memory/2324-839-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2324-843-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2324-123-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2324-548-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2324-512-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/2324-760-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2324-448-0x00000000003D0000-0x00000000003D3000-memory.dmp

        Filesize

        12KB

      • memory/2324-446-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2324-130-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/2324-841-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2324-120-0x00000000003D0000-0x00000000003D3000-memory.dmp

        Filesize

        12KB

      • memory/2324-122-0x0000000000400000-0x0000000001CAF000-memory.dmp

        Filesize

        24.7MB

      • memory/2616-127-0x0000000010000000-0x0000000010059000-memory.dmp

        Filesize

        356KB

      • memory/2616-37-0x0000000010000000-0x0000000010059000-memory.dmp

        Filesize

        356KB

      • memory/2616-69-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-119-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-128-0x0000000002DC0000-0x0000000002F61000-memory.dmp

        Filesize

        1.6MB

      • memory/2616-118-0x0000000005CF0000-0x000000000759F000-memory.dmp

        Filesize

        24.7MB

      • memory/2616-36-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-33-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-70-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-32-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-35-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-87-0x0000000006320000-0x0000000006DFA000-memory.dmp

        Filesize

        10.9MB

      • memory/2616-38-0x0000000002DC0000-0x0000000002F61000-memory.dmp

        Filesize

        1.6MB

      • memory/2616-64-0x00000000040D0000-0x00000000040E0000-memory.dmp

        Filesize

        64KB

      • memory/2616-71-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-124-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-102-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-72-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-73-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-75-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2616-67-0x0000000002DC0000-0x0000000002F61000-memory.dmp

        Filesize

        1.6MB

      • memory/2616-66-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2788-30-0x0000000008030000-0x000000000855F000-memory.dmp

        Filesize

        5.2MB

      • memory/2788-3-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2788-2-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2788-1-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2788-4-0x0000000010000000-0x0000000010059000-memory.dmp

        Filesize

        356KB

      • memory/2788-5-0x0000000002EE0000-0x0000000003081000-memory.dmp

        Filesize

        1.6MB

      • memory/2788-0-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2788-28-0x0000000000400000-0x000000000092F000-memory.dmp

        Filesize

        5.2MB

      • memory/2788-31-0x0000000010000000-0x0000000010059000-memory.dmp

        Filesize

        356KB

      • memory/2788-34-0x0000000002EE0000-0x0000000003081000-memory.dmp

        Filesize

        1.6MB