Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
dfa9a4c3f187e3c4a6204c2a6cb545e629864c2424ae106da9d0a9ada8eb5542.dll
Resource
win7-20240508-en
General
-
Target
dfa9a4c3f187e3c4a6204c2a6cb545e629864c2424ae106da9d0a9ada8eb5542.dll
-
Size
508KB
-
MD5
a710201fa3d7aaa02f4a8d1875a37db0
-
SHA1
38471a0d4072cc93d380484b5170f24845cc3575
-
SHA256
dfa9a4c3f187e3c4a6204c2a6cb545e629864c2424ae106da9d0a9ada8eb5542
-
SHA512
4ee6b0ef10ac77a2b5af657cdd975f5cc1c2f354dcb09d5c2d79b80d520104b4871063c044da70ca4339cbe2c6db2d85b27d369873cd90779c29b5580f5fad65
-
SSDEEP
12288:eehnaNPpSVZmNxRCwnwm3W3OHIIf5QcY6QtOTD:eeh0PpS6NxNnwYeOHXHQtQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
UPX dump on OEP (original entry point) 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2180-15-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral1/memory/2180-14-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral1/memory/2320-50-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral1/memory/2180-23-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral1/memory/2180-18-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral1/memory/2180-17-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral1/memory/2180-13-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral1/memory/2320-558-0x0000000000400000-0x0000000000421000-memory.dmp UPX -
Executes dropped EXE 2 IoCs
Processes:
rundll32mgr.exeWaterMark.exepid process 2180 rundll32mgr.exe 2320 WaterMark.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32mgr.exepid process 2024 rundll32.exe 2024 rundll32.exe 2180 rundll32mgr.exe 2180 rundll32mgr.exe -
Processes:
resource yara_rule behavioral1/memory/2180-15-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2180-14-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2320-50-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2180-23-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2180-18-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2180-17-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2180-13-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2180-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2320-558-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
Processes:
rundll32.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exerundll32mgr.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledb32.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\liboldrc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libavi_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libinvert_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Entity.Design.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libspatializer_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaes3_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaom_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcroppadd_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgaussianblur_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\MemoryAnalyzer.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\msvcr100.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_rtp_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfxmedia.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe svchost.exe File opened for modification C:\Program Files\Windows Mail\wabfind.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\icucnv36.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\InkObj.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jpeg.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmp4_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_ts_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libanaglyph_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\kcms.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.IdentityModel.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libvoc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\liblogo_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Photo Viewer\PhotoAcq.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\calendar.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\libEGL.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libasf_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmpgv_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mraut.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\PresentationFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Web.Entity.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_duplicate_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwinhibit_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\VGX.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_file_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_display_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\setup_wm.exe svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\settings.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEOLEDB.DLL svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACETXT.DLL svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwLatin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tipresx.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
WaterMark.exesvchost.exepid process 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2320 WaterMark.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe 2984 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WaterMark.exesvchost.exedescription pid process Token: SeDebugPrivilege 2320 WaterMark.exe Token: SeDebugPrivilege 2984 svchost.exe Token: SeDebugPrivilege 2320 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
rundll32mgr.exeWaterMark.exepid process 2180 rundll32mgr.exe 2320 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exerundll32.exerundll32mgr.exeWaterMark.exesvchost.exedescription pid process target process PID 1896 wrote to memory of 2024 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 2024 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 2024 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 2024 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 2024 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 2024 1896 rundll32.exe rundll32.exe PID 1896 wrote to memory of 2024 1896 rundll32.exe rundll32.exe PID 2024 wrote to memory of 2180 2024 rundll32.exe rundll32mgr.exe PID 2024 wrote to memory of 2180 2024 rundll32.exe rundll32mgr.exe PID 2024 wrote to memory of 2180 2024 rundll32.exe rundll32mgr.exe PID 2024 wrote to memory of 2180 2024 rundll32.exe rundll32mgr.exe PID 2180 wrote to memory of 2320 2180 rundll32mgr.exe WaterMark.exe PID 2180 wrote to memory of 2320 2180 rundll32mgr.exe WaterMark.exe PID 2180 wrote to memory of 2320 2180 rundll32mgr.exe WaterMark.exe PID 2180 wrote to memory of 2320 2180 rundll32mgr.exe WaterMark.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2660 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2320 wrote to memory of 2984 2320 WaterMark.exe svchost.exe PID 2984 wrote to memory of 256 2984 svchost.exe smss.exe PID 2984 wrote to memory of 256 2984 svchost.exe smss.exe PID 2984 wrote to memory of 256 2984 svchost.exe smss.exe PID 2984 wrote to memory of 256 2984 svchost.exe smss.exe PID 2984 wrote to memory of 256 2984 svchost.exe smss.exe PID 2984 wrote to memory of 332 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 332 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 332 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 332 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 332 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 380 2984 svchost.exe wininit.exe PID 2984 wrote to memory of 380 2984 svchost.exe wininit.exe PID 2984 wrote to memory of 380 2984 svchost.exe wininit.exe PID 2984 wrote to memory of 380 2984 svchost.exe wininit.exe PID 2984 wrote to memory of 380 2984 svchost.exe wininit.exe PID 2984 wrote to memory of 388 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 388 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 388 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 388 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 388 2984 svchost.exe csrss.exe PID 2984 wrote to memory of 428 2984 svchost.exe winlogon.exe PID 2984 wrote to memory of 428 2984 svchost.exe winlogon.exe PID 2984 wrote to memory of 428 2984 svchost.exe winlogon.exe PID 2984 wrote to memory of 428 2984 svchost.exe winlogon.exe PID 2984 wrote to memory of 428 2984 svchost.exe winlogon.exe PID 2984 wrote to memory of 472 2984 svchost.exe services.exe PID 2984 wrote to memory of 472 2984 svchost.exe services.exe PID 2984 wrote to memory of 472 2984 svchost.exe services.exe PID 2984 wrote to memory of 472 2984 svchost.exe services.exe
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfa9a4c3f187e3c4a6204c2a6cb545e629864c2424ae106da9d0a9ada8eb5542.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dfa9a4c3f187e3c4a6204c2a6cb545e629864c2424ae106da9d0a9ada8eb5542.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.htmlFilesize
260KB
MD574ec4d1d828a464258e64fcde52f9379
SHA118c40313f32174316fad0a58b36d6f5646da714b
SHA25662e03e83183b2d0ec14092ecfaa70961f7994bbec537b78a74c52c36e541f627
SHA512b2eba8abc192bac5fc64e5c9b21c95470172002843f23e2a34985a6896d2ca90908662c37de53b97db75f9758f8217fd415b70fe52b20c53cd2bc172fe5b8728
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.htmlFilesize
256KB
MD56e0f8151e92468ed019cac432bb6f421
SHA10d2cc2c08293a403f76fc667b96a80ce55c9609f
SHA2565d0b94b9b97160fb9fe42da2acdfae328ad3000f69360418f54191417ef02c73
SHA51286a33dbc39cb33ce61a441a8e861c6d4cf9ee004daa8ada545917d2cae1e3283b54dcb40c7f15f6b4e2eff3a3ae21ccd4724707630f3296d128baa5a48c9911f
-
\Windows\SysWOW64\rundll32mgr.exeFilesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
memory/2024-10-0x0000000000240000-0x000000000028A000-memory.dmpFilesize
296KB
-
memory/2024-3-0x0000000000240000-0x000000000028A000-memory.dmpFilesize
296KB
-
memory/2024-2-0x0000000010000000-0x0000000010081000-memory.dmpFilesize
516KB
-
memory/2180-29-0x00000000001A0000-0x00000000001EA000-memory.dmpFilesize
296KB
-
memory/2180-15-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2180-14-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2180-11-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/2180-12-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2180-13-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2180-16-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/2180-17-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2180-18-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2180-23-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2320-82-0x00000000776FF000-0x0000000077700000-memory.dmpFilesize
4KB
-
memory/2320-70-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/2320-39-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/2320-35-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/2320-50-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2320-51-0x00000000776FF000-0x0000000077700000-memory.dmpFilesize
4KB
-
memory/2320-558-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2320-40-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2320-71-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2660-58-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2660-65-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2660-61-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2660-41-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2660-60-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/2660-62-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/2660-43-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2660-999-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2660-53-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2984-91-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2984-90-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2984-89-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2984-88-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2984-302-0x0000000077700000-0x0000000077701000-memory.dmpFilesize
4KB
-
memory/2984-92-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2984-87-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2984-83-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2984-73-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB