Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe
-
Size
608KB
-
MD5
1e3b51ee48e2e008bc76134ca96afdb7
-
SHA1
62fecd92a8b328f23c5f6dbb74925208870d8092
-
SHA256
96ef9ae86c094b1176697a5d5945b4471a9f76b6b586a70a9cab88f9a3593a20
-
SHA512
f32a3097cc9d55b290b51898d3a75f503998af35ce32c532571f57c4355b00b97821a698ab32d6e6657dc0630e74faecb1fcb70c854607544002dd2fd45e7621
-
SSDEEP
12288:Y7yse1uS1O7vy9sU9lNz79wAx80rXtjQEeNIA:Y7yruS476zld9w/XNI
Malware Config
Extracted
darkcomet
Guest16
192.168.254.104:1604
DC_MUTEX-HEGGY71
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
7PdTJfZEBdbx
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" iexplore.exe -
Processes:
iexplore.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 3512 attrib.exe 1620 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exemsdcsc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation msdcsc.exe -
Executes dropped EXE 4 IoCs
Processes:
FUCK.EXEmsdcsc.exeFUCK.EXEFUCK.EXEpid process 1616 FUCK.EXE 3316 msdcsc.exe 4392 FUCK.EXE 4516 FUCK.EXE -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\FUCK.EXE upx behavioral2/memory/1616-15-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4392-29-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4516-34-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1616-35-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4392-36-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4392-37-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1616-38-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exemsdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" iexplore.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4392-29-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/4516-34-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/1616-35-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/4392-36-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/4392-37-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/1616-38-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 3316 set thread context of 3980 3316 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSecurityPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSystemtimePrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeBackupPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeRestorePrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeShutdownPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeDebugPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeUndockPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeManageVolumePrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeImpersonatePrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: 33 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: 34 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: 35 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: 36 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3316 msdcsc.exe Token: SeSecurityPrivilege 3316 msdcsc.exe Token: SeTakeOwnershipPrivilege 3316 msdcsc.exe Token: SeLoadDriverPrivilege 3316 msdcsc.exe Token: SeSystemProfilePrivilege 3316 msdcsc.exe Token: SeSystemtimePrivilege 3316 msdcsc.exe Token: SeProfSingleProcessPrivilege 3316 msdcsc.exe Token: SeIncBasePriorityPrivilege 3316 msdcsc.exe Token: SeCreatePagefilePrivilege 3316 msdcsc.exe Token: SeBackupPrivilege 3316 msdcsc.exe Token: SeRestorePrivilege 3316 msdcsc.exe Token: SeShutdownPrivilege 3316 msdcsc.exe Token: SeDebugPrivilege 3316 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3316 msdcsc.exe Token: SeChangeNotifyPrivilege 3316 msdcsc.exe Token: SeRemoteShutdownPrivilege 3316 msdcsc.exe Token: SeUndockPrivilege 3316 msdcsc.exe Token: SeManageVolumePrivilege 3316 msdcsc.exe Token: SeImpersonatePrivilege 3316 msdcsc.exe Token: SeCreateGlobalPrivilege 3316 msdcsc.exe Token: 33 3316 msdcsc.exe Token: 34 3316 msdcsc.exe Token: 35 3316 msdcsc.exe Token: 36 3316 msdcsc.exe Token: SeIncreaseQuotaPrivilege 3980 iexplore.exe Token: SeSecurityPrivilege 3980 iexplore.exe Token: SeTakeOwnershipPrivilege 3980 iexplore.exe Token: SeLoadDriverPrivilege 3980 iexplore.exe Token: SeSystemProfilePrivilege 3980 iexplore.exe Token: SeSystemtimePrivilege 3980 iexplore.exe Token: SeProfSingleProcessPrivilege 3980 iexplore.exe Token: SeIncBasePriorityPrivilege 3980 iexplore.exe Token: SeCreatePagefilePrivilege 3980 iexplore.exe Token: SeBackupPrivilege 3980 iexplore.exe Token: SeRestorePrivilege 3980 iexplore.exe Token: SeShutdownPrivilege 3980 iexplore.exe Token: SeDebugPrivilege 3980 iexplore.exe Token: SeSystemEnvironmentPrivilege 3980 iexplore.exe Token: SeChangeNotifyPrivilege 3980 iexplore.exe Token: SeRemoteShutdownPrivilege 3980 iexplore.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
Processes:
FUCK.EXEFUCK.EXEFUCK.EXEpid process 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4516 FUCK.EXE 4516 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 4516 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE -
Suspicious use of SendNotifyMessage 57 IoCs
Processes:
FUCK.EXEFUCK.EXEFUCK.EXEpid process 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4516 FUCK.EXE 4516 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4516 FUCK.EXE 4516 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 4392 FUCK.EXE 4392 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE 1616 FUCK.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 3980 iexplore.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.execmd.execmd.exemsdcsc.exeiexplore.exedescription pid process target process PID 4652 wrote to memory of 3240 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 4652 wrote to memory of 3240 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 4652 wrote to memory of 3240 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 4652 wrote to memory of 4404 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 4652 wrote to memory of 4404 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 4652 wrote to memory of 4404 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 4652 wrote to memory of 1616 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe FUCK.EXE PID 4652 wrote to memory of 1616 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe FUCK.EXE PID 4652 wrote to memory of 1616 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe FUCK.EXE PID 3240 wrote to memory of 1620 3240 cmd.exe attrib.exe PID 3240 wrote to memory of 1620 3240 cmd.exe attrib.exe PID 3240 wrote to memory of 1620 3240 cmd.exe attrib.exe PID 4404 wrote to memory of 3512 4404 cmd.exe attrib.exe PID 4404 wrote to memory of 3512 4404 cmd.exe attrib.exe PID 4404 wrote to memory of 3512 4404 cmd.exe attrib.exe PID 4652 wrote to memory of 3316 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe msdcsc.exe PID 4652 wrote to memory of 3316 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe msdcsc.exe PID 4652 wrote to memory of 3316 4652 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe msdcsc.exe PID 3316 wrote to memory of 4392 3316 msdcsc.exe FUCK.EXE PID 3316 wrote to memory of 4392 3316 msdcsc.exe FUCK.EXE PID 3316 wrote to memory of 4392 3316 msdcsc.exe FUCK.EXE PID 3316 wrote to memory of 3980 3316 msdcsc.exe iexplore.exe PID 3316 wrote to memory of 3980 3316 msdcsc.exe iexplore.exe PID 3316 wrote to memory of 3980 3316 msdcsc.exe iexplore.exe PID 3316 wrote to memory of 3980 3316 msdcsc.exe iexplore.exe PID 3316 wrote to memory of 3980 3316 msdcsc.exe iexplore.exe PID 3980 wrote to memory of 4516 3980 iexplore.exe FUCK.EXE PID 3980 wrote to memory of 4516 3980 iexplore.exe FUCK.EXE PID 3980 wrote to memory of 4516 3980 iexplore.exe FUCK.EXE -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1620 attrib.exe 3512 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"2⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies security service
- Windows security bypass
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\FUCK.EXEFilesize
294KB
MD56eb20cdb2c86eca34875b5595583a84b
SHA1c126d17216de9e4cda99588f0c36cb0dc57ec2c9
SHA25626fe95fb0564d2b0184c7f95bd8b0d6c7a31022d2a50a3798f62e3b7da1ab949
SHA512a1870f335970b00e251e00f5afd183653ac6d77a44369c679bdf939157a175ec87c3143b5b30e060032e36db7169d3c4e9b817a2d4fc22f4ee040b860bfec364
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
608KB
MD51e3b51ee48e2e008bc76134ca96afdb7
SHA162fecd92a8b328f23c5f6dbb74925208870d8092
SHA25696ef9ae86c094b1176697a5d5945b4471a9f76b6b586a70a9cab88f9a3593a20
SHA512f32a3097cc9d55b290b51898d3a75f503998af35ce32c532571f57c4355b00b97821a698ab32d6e6657dc0630e74faecb1fcb70c854607544002dd2fd45e7621
-
memory/1616-35-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/1616-38-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/1616-15-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/3316-27-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/3316-32-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/4392-29-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/4392-36-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/4392-37-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/4516-34-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/4652-0-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/4652-24-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/4652-1-0x0000000002280000-0x0000000002281000-memory.dmpFilesize
4KB