Malware Analysis Report

2024-11-30 13:29

Sample ID 241120-zngc7atepl
Target 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.exe
SHA256 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2
Tags
qakbot biden54 1634810637 banker discovery stealer trojan evasion
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2

Threat Level: Known bad

The file 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.exe was found to be: Known bad.

Malicious Activity Summary

qakbot biden54 1634810637 banker discovery stealer trojan evasion

Windows security bypass

Qakbot family

Qakbot/Qbot

Loads dropped DLL

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: MapViewOfSection

Modifies data under HKEY_USERS

Scheduled Task/Job: Scheduled Task

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-20 20:51

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-20 20:51

Reported

2024-11-20 20:54

Platform

win7-20241010-en

Max time kernel

135s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1

Signatures

Qakbot family

qakbot

Qakbot/Qbot

trojan banker stealer qakbot

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\explorer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2796 wrote to memory of 2824 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2796 wrote to memory of 2824 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2796 wrote to memory of 2824 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2796 wrote to memory of 2824 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2796 wrote to memory of 2824 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2796 wrote to memory of 2824 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2796 wrote to memory of 2824 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2824 wrote to memory of 2904 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 2824 wrote to memory of 2904 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 2824 wrote to memory of 2904 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 2824 wrote to memory of 2904 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 2824 wrote to memory of 2904 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 2824 wrote to memory of 2904 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 2904 wrote to memory of 1860 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\schtasks.exe
PID 2904 wrote to memory of 1860 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\schtasks.exe
PID 2904 wrote to memory of 1860 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\schtasks.exe
PID 2904 wrote to memory of 1860 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\schtasks.exe
PID 1776 wrote to memory of 1188 N/A C:\Windows\system32\taskeng.exe C:\Windows\system32\regsvr32.exe
PID 1776 wrote to memory of 1188 N/A C:\Windows\system32\taskeng.exe C:\Windows\system32\regsvr32.exe
PID 1776 wrote to memory of 1188 N/A C:\Windows\system32\taskeng.exe C:\Windows\system32\regsvr32.exe
PID 1776 wrote to memory of 1188 N/A C:\Windows\system32\taskeng.exe C:\Windows\system32\regsvr32.exe
PID 1776 wrote to memory of 1188 N/A C:\Windows\system32\taskeng.exe C:\Windows\system32\regsvr32.exe
PID 1188 wrote to memory of 1748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1188 wrote to memory of 1748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1188 wrote to memory of 1748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1188 wrote to memory of 1748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1188 wrote to memory of 1748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1188 wrote to memory of 1748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1188 wrote to memory of 1748 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn ugzvofkn /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll\"" /SC ONCE /Z /ST 20:54 /ET 21:06

C:\Windows\system32\taskeng.exe

taskeng.exe {17E1B37C-3F25-4120-B338-19591A0C0FA0} S-1-5-18:NT AUTHORITY\System:Service:

C:\Windows\system32\regsvr32.exe

regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"

C:\Windows\SysWOW64\regsvr32.exe

-s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"

Network

N/A

Files

memory/2824-0-0x00000000750B0000-0x00000000751A3000-memory.dmp

memory/2824-1-0x00000000750B0000-0x00000000751A3000-memory.dmp

memory/2824-4-0x00000000750B0000-0x00000000751A3000-memory.dmp

memory/2824-3-0x000000007518F000-0x0000000075195000-memory.dmp

memory/2904-5-0x00000000000B0000-0x00000000000B2000-memory.dmp

memory/2904-6-0x0000000000080000-0x00000000000A1000-memory.dmp

memory/2824-7-0x00000000750B0000-0x00000000751A3000-memory.dmp

memory/2904-10-0x0000000000080000-0x00000000000A1000-memory.dmp

memory/2904-12-0x0000000000080000-0x00000000000A1000-memory.dmp

memory/2904-11-0x0000000000080000-0x00000000000A1000-memory.dmp

memory/2904-14-0x0000000000080000-0x00000000000A1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll

MD5 44e60ee86b4cb4188bdd08e3b49c0bf5
SHA1 c271311550ce154650896787afef4a3f8ae86620
SHA256 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2
SHA512 193619bda32192c7ac61a8ed427cde79ca8aa2d77775bc714cfcb564915b3d7967cfc338877a27e633030aff30f1ce35c3056979e56941dafb9dc85e015e1e03

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-20 20:51

Reported

2024-11-20 20:54

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

150s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1

Signatures

Qakbot family

qakbot

Qakbot/Qbot

trojan banker stealer qakbot

Windows security bypass

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\Windows\system32\reg.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Ioinsohjles = "0" C:\Windows\system32\reg.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\Windows\system32\reg.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\Microsoft\Refyhlbuuy = "0" C:\Windows\system32\reg.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\explorer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\explorer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\edf48a9b = e12627a0980d4d779b978ebb4ba608ab8d5cfd594c47eaae548ed04c01563649e77ac36082123aaed79d4f4a1935687dd1705cde C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\d86b5ad5 = dc4af10d0f72ff0efd069ed56cd3e5205caffe518c290845b4919b6476998bfcdd0c88346afe7f473161fdf4f91fa3efcc5b15ad9a013d21d08ced97d66267c60cced6d34709b541ebd7dd6052046a1e34491aef93032dead0951efb54118208142245c59388364a83a47982f89947c3456a563ad7db110296303703de2024 C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\60d73db0 = 383867ee039fc7a4ff4a641a1acd6d9e0981eea5c8933960b77470128f0547ccf5bb6302a45f C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\92bde56d = dd9676ee75529d60ba331cb4f5cb10e198f9973cee950ace80c9c0222e19cc890464dd9386adb251dd283d C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\edf48a9b = e12630a0980d78fe9fbc998fab0be67549f67644376240472524a222f8a5d55c9e4704f47d58bd7d5a1403f77a6b802b3ac7942b3d6d6d195f4e2b4fbd01cb052d3cb501a4b9503050 C:\Windows\SysWOW64\explorer.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\da2a7aa9 = 67d230b99684b08b5bace36fc2b2bc0b4069c0417d007149959c49c9f6fd79fb8c6d752624251702a4269b9447547f489ac2bfae50a58fce7d93ee671a4e23d4 C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\62961dcc = 90b4d418b91e0a9d43f7385ec64c5beac2118ec7fc3e9407b640dea34576443844e6129b90c4368c7be55dd03e2da1e3d0e4061c4677137706104dea90a9849f342647b32c0873c53b77890ed477c41b139a C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\1f9e5246 = 67105d9c1fb3ff0e019529407bb6f54a6f3aba14c61b03055ee323 C:\Windows\SysWOW64\explorer.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Tdfhmeoe\a7223523 = 9026bc7995a5027b0bed5148070bf38f656b6e8de1e14294d383f7b966b56134fffa C:\Windows\SysWOW64\explorer.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2036 wrote to memory of 4668 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2036 wrote to memory of 4668 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2036 wrote to memory of 4668 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4668 wrote to memory of 1592 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 4668 wrote to memory of 1592 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 4668 wrote to memory of 1592 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 4668 wrote to memory of 1592 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 4668 wrote to memory of 1592 N/A C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\explorer.exe
PID 1592 wrote to memory of 1356 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\schtasks.exe
PID 1592 wrote to memory of 1356 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\schtasks.exe
PID 1592 wrote to memory of 1356 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\schtasks.exe
PID 756 wrote to memory of 4656 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 756 wrote to memory of 4656 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 756 wrote to memory of 4656 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4656 wrote to memory of 3936 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\explorer.exe
PID 4656 wrote to memory of 3936 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\explorer.exe
PID 4656 wrote to memory of 3936 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\explorer.exe
PID 4656 wrote to memory of 3936 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\explorer.exe
PID 4656 wrote to memory of 3936 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\explorer.exe
PID 3936 wrote to memory of 3592 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\reg.exe
PID 3936 wrote to memory of 3592 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\reg.exe
PID 3936 wrote to memory of 2716 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\reg.exe
PID 3936 wrote to memory of 2716 N/A C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\reg.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll,#1

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn nrlmprt /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll\"" /SC ONCE /Z /ST 20:53 /ET 21:05

C:\Windows\system32\regsvr32.exe

regsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"

C:\Windows\SysWOW64\regsvr32.exe

-s "C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll"

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Refyhlbuuy" /d "0"

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ioinsohjles" /d "0"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

memory/4668-1-0x0000000074D1F000-0x0000000074D25000-memory.dmp

memory/4668-0-0x0000000074C40000-0x0000000074D33000-memory.dmp

memory/4668-2-0x0000000074C40000-0x0000000074D33000-memory.dmp

memory/4668-3-0x0000000074C40000-0x0000000074D33000-memory.dmp

memory/1592-5-0x0000000001250000-0x0000000001271000-memory.dmp

memory/4668-6-0x0000000074C40000-0x0000000074D33000-memory.dmp

memory/1592-9-0x0000000001250000-0x0000000001271000-memory.dmp

memory/1592-11-0x0000000001250000-0x0000000001271000-memory.dmp

memory/1592-10-0x0000000001250000-0x0000000001271000-memory.dmp

memory/1592-13-0x0000000001250000-0x0000000001271000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2.dll

MD5 44e60ee86b4cb4188bdd08e3b49c0bf5
SHA1 c271311550ce154650896787afef4a3f8ae86620
SHA256 0bc79d1993e95c1c112bde2e26ba54f2132e74c3e3b143ee2c7b101c57b6f5b2
SHA512 193619bda32192c7ac61a8ed427cde79ca8aa2d77775bc714cfcb564915b3d7967cfc338877a27e633030aff30f1ce35c3056979e56941dafb9dc85e015e1e03

memory/4656-17-0x0000000074BB0000-0x0000000074CA3000-memory.dmp

memory/4656-19-0x0000000074BB0000-0x0000000074CA3000-memory.dmp

\??\PIPE\wkssvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4656-21-0x0000000074BB0000-0x0000000074CA3000-memory.dmp

memory/3936-23-0x0000000000EB0000-0x0000000000ED1000-memory.dmp

memory/3936-24-0x0000000000EB0000-0x0000000000ED1000-memory.dmp

memory/3936-25-0x0000000000EB0000-0x0000000000ED1000-memory.dmp