Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-06-2024 18:09

General

  • Target

    file_fdp..scr

  • Size

    4.4MB

  • MD5

    4bc83684b8e2a9050d44374b2fc1e45d

  • SHA1

    00d390f567516249c0487d2eabd826dafa7a7b50

  • SHA256

    81603495e06315bfb9fc1b8dadbeccad47524ac15084a9a3f25274f76fff7adf

  • SHA512

    d914ca67a6fa7ebf66bd64ad088b59a6299e19c38aa3560076b6b91aa481d644dee4b652c0d7580c0f3c8c698f41f28531a0d8d2d11552d3edb7b5a407ea3569

  • SSDEEP

    98304:gDQ3MPvsFGblKNIknSb7tFTGN5nxPVRaxxVoPHj3cs593:wwMPvs4gNDnyyZxPFHwM3

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6948010821:AAEJfl5iNgu_Z6rr2SH3SeV22wpex-Pltwo/sendMessage?chat_id=6841140670

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file_fdp..scr
    "C:\Users\Admin\AppData\Local\Temp\file_fdp..scr" /S
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3416
    • C:\Users\Admin\AppData\LocalekjYkphYHG.exe
      "C:\Users\Admin\AppData\LocalekjYkphYHG.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\app.exe
        "C:\Users\Admin\AppData\Local\Temp\app.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2372
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\LocalOzXjiQvZaU..pdf"
      2⤵
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C58907668F2FFB1FD4E598E3F9FC573A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C58907668F2FFB1FD4E598E3F9FC573A --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:1
          4⤵
            PID:3868
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DCFEBC16CDE949545CE9B7DEAE08B184 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
            4⤵
              PID:3780
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=53D899D29E76A36EEC207F2406E24FEC --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              4⤵
                PID:4144
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=986FF8FA5241C75FE5220843477CB757 --mojo-platform-channel-handle=2524 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                4⤵
                  PID:3844
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=39D0F132A8A106787F1B2417B67382FE --mojo-platform-channel-handle=2096 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  4⤵
                    PID:484
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8F772B293848365E9A28036B0948B9AE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8F772B293848365E9A28036B0948B9AE --renderer-client-id=7 --mojo-platform-channel-handle=2532 --allow-no-sandbox-job /prefetch:1
                    4⤵
                      PID:5028
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:232

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  36KB

                  MD5

                  b30d3becc8731792523d599d949e63f5

                  SHA1

                  19350257e42d7aee17fb3bf139a9d3adb330fad4

                  SHA256

                  b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                  SHA512

                  523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  56KB

                  MD5

                  752a1f26b18748311b691c7d8fc20633

                  SHA1

                  c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                  SHA256

                  111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                  SHA512

                  a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  64KB

                  MD5

                  873603e5a42d249afb5964d871ed029b

                  SHA1

                  74f0d4a02070ce4aaccf5390cc3eb1c7a8c6fe47

                  SHA256

                  0d1982192fa5439e1dd741cc0c806f8d6bb56bec833cec6bfb402d71c78b8096

                  SHA512

                  2fdb2b8a96d7b457b3b607dbf67aa1f9a8f557be40a22785e38acb1cb540163a1bbf78e552b89c1705f7a299d53602e2fef712dd38c9b715ef0f589d5ba19d77

                • C:\Users\Admin\AppData\LocalOzXjiQvZaU..pdf

                  Filesize

                  261KB

                  MD5

                  16ac4ae6ce937d1261f80c845f0c1cc2

                  SHA1

                  677aa508f2a759b77154d58fcd82e6cf1baf922a

                  SHA256

                  32d27f85aabb6a7a5d4a46455f5d235fd87919ce835dcd50231cf0db3b7b7d31

                  SHA512

                  d1d09974ab3827c006261bb4bfa8c477c02f73d7d43d2270ff654ef617c57e651e0591b143d1ef37d20295ee8a064a114389bf6cd6d982a7db53033e0994e75e

                • C:\Users\Admin\AppData\Local\Temp\BouncyCastle.Crypto.dll

                  Filesize

                  3.2MB

                  MD5

                  0cf454b6ed4d9e46bc40306421e4b800

                  SHA1

                  9611aa929d35cbd86b87e40b628f60d5177d2411

                  SHA256

                  e51721dc0647f4838b1abc592bd95fd8cb924716e8a64f83d4b947821fa1fa42

                  SHA512

                  85262f1bc67a89911640f59a759b476b30ca644bd1a1d9cd3213cc8aae16d7cc6ea689815f19b146db1d26f7a75772ceb48e71e27940e3686a83eb2cf7e46048

                • C:\Users\Admin\AppData\Local\Temp\Newtonsoft.Json.dll

                  Filesize

                  695KB

                  MD5

                  195ffb7167db3219b217c4fd439eedd6

                  SHA1

                  1e76e6099570ede620b76ed47cf8d03a936d49f8

                  SHA256

                  e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                  SHA512

                  56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

                  Filesize

                  1.7MB

                  MD5

                  a73fdfb6815b151848257eca042a42ef

                  SHA1

                  73f18e6b4d1f638e7ce2a7ad36635018482f2c55

                  SHA256

                  10c9ccec863ed80850c7b7080e4f2e34b133ce259d1ae3ea7a305cebf6e2940d

                  SHA512

                  111f5a7bd916ab317fc127cbf49a2a81c2a614ce3a655a0446f2ebf3c2e61509db5633a391bef06c4ba0b58a71c752262ec2467a09abc56827263c647b08a09d

                • C:\Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll

                  Filesize

                  402KB

                  MD5

                  b0911d27918a1e20088b4e6b6ec29ad3

                  SHA1

                  93a285c96a4d391ea4fe6655caaa0bbf2ee52683

                  SHA256

                  24043ef4472d9d035cd1a8294f68d2bbfdf76f5455af80c09c89e64f6ed15917

                  SHA512

                  518da2e73b849be38570d7db218adeb47f85fde89c15dac577eb1446a9a55bb4cfaf31d371428b9c4f0c69c0be3e2cb10fafcadbec24e8ab793b639392e3f029

                • C:\Users\Admin\AppData\Local\Temp\app.exe

                  Filesize

                  396KB

                  MD5

                  973dba1dfa08bb81d5f89ba8592a185c

                  SHA1

                  b21df83ed13ad30f6c6267ce9794edb20ac2089a

                  SHA256

                  4234e4ca07e6611ebc499ef096333b33c7197292d25691751d29d3bfdb82d1a1

                  SHA512

                  90cc8481b63ae066acd6d27351b9b5bd10f74f8b9d02ad11a97e8200d8d9556d8cd7206974133debd0b29a3a0b6d37183813f8539dca46246fa4d4bea686272b

                • C:\Users\Admin\AppData\Local\Temp\d16216cc-3c51-43e2-819d-6936b4711544

                  Filesize

                  46KB

                  MD5

                  14ccc9293153deacbb9a20ee8f6ff1b7

                  SHA1

                  46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3

                  SHA256

                  3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511

                  SHA512

                  916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

                • C:\Users\Admin\AppData\Local\Temp\tmp7FEB.tmp.dat

                  Filesize

                  112KB

                  MD5

                  87210e9e528a4ddb09c6b671937c79c6

                  SHA1

                  3c75314714619f5b55e25769e0985d497f0062f2

                  SHA256

                  eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                  SHA512

                  f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                • C:\Users\Admin\AppData\Local\Temp\tmp7FEF.tmp.dat

                  Filesize

                  116KB

                  MD5

                  4e2922249bf476fb3067795f2fa5e794

                  SHA1

                  d2db6b2759d9e650ae031eb62247d457ccaa57d2

                  SHA256

                  c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1

                  SHA512

                  8e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da

                • C:\Users\Admin\AppData\LocalekjYkphYHG.exe

                  Filesize

                  4.1MB

                  MD5

                  b81900439f449dc2d636deb6ec8e4ff6

                  SHA1

                  03d454e2c4d2176c260b024eee6f4e2fc6a58e5f

                  SHA256

                  416be1f0ec73024b75695553bc8554037166f7442cc6fa554de5b30c2d05e5e7

                  SHA512

                  4c5c0f18b2a2972724f42c4b81cfc86a772f5f4d365d8e77749ce688254b3873bff0a0971fb4a54bbdbec1c6508d18e06b0b3d7b7394acd2ce3cfb432ee3bb8f

                • C:\Новая папка\Process.txt

                  Filesize

                  1KB

                  MD5

                  3365b7f296b0cd92787c3d677cb68897

                  SHA1

                  90d2773b814e7bb42f2372e863fdd70431e701ec

                  SHA256

                  7aefc911b13f840875858bda83c3ba4189128df2843082b2acc0aac116ae1d2b

                  SHA512

                  b5c1d5f2d647c8fa1b1ee1577b17027ae3c89f8ea848fce91775301e91033c719bf0df7c4b82352b6411e9be2eb2aa80063630f350dd5f1e0a0b3ab24c504484

                • memory/2372-36-0x000001E38EBD0000-0x000001E38EC3A000-memory.dmp

                  Filesize

                  424KB

                • memory/2372-108-0x000001E3A98C0000-0x000001E3A98FA000-memory.dmp

                  Filesize

                  232KB

                • memory/2372-101-0x000001E3A9930000-0x000001E3A9996000-memory.dmp

                  Filesize

                  408KB

                • memory/2372-98-0x000001E3A95E0000-0x000001E3A9630000-memory.dmp

                  Filesize

                  320KB

                • memory/2372-105-0x000001E3AA650000-0x000001E3AA97E000-memory.dmp

                  Filesize

                  3.2MB

                • memory/2372-97-0x000001E3A9630000-0x000001E3A96A6000-memory.dmp

                  Filesize

                  472KB

                • memory/2372-109-0x000001E3A95B0000-0x000001E3A95D6000-memory.dmp

                  Filesize

                  152KB

                • memory/2372-99-0x000001E3A9580000-0x000001E3A95A2000-memory.dmp

                  Filesize

                  136KB

                • memory/2372-96-0x000001E3A9700000-0x000001E3A97B2000-memory.dmp

                  Filesize

                  712KB

                • memory/2372-112-0x000001E3AB580000-0x000001E3AB742000-memory.dmp

                  Filesize

                  1.8MB

                • memory/2372-207-0x000001E3AA320000-0x000001E3AA33E000-memory.dmp

                  Filesize

                  120KB

                • memory/3416-0-0x00007FFB1EDC5000-0x00007FFB1EDC6000-memory.dmp

                  Filesize

                  4KB

                • memory/3416-16-0x00007FFB1EB10000-0x00007FFB1F4B1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/3416-3-0x00007FFB1EB10000-0x00007FFB1F4B1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/3416-1-0x00007FFB1EB10000-0x00007FFB1F4B1000-memory.dmp

                  Filesize

                  9.6MB