Analysis
-
max time kernel
114s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 00:39
Behavioral task
behavioral1
Sample
DCRatBuild.exe
Resource
win11-20240508-en
General
-
Target
DCRatBuild.exe
-
Size
1.9MB
-
MD5
469d978118f1a8de4a1a5bb33bc81a93
-
SHA1
295ce921008c39f1f3f0ac1e1ccde97ad5c0f12e
-
SHA256
5b8f511ca8a386c382cd23b305d295ae406a9aae2392f7543de21d5d67c44ced
-
SHA512
7d71ac9b37d6ca74339e6a7b8b08a72ba72b8f7fedce1ed6d80703eafb31dd4d5e70de4118cf719292cb3de9cb5f84b27b79492b95e890df143e0c5c295cbc44
-
SSDEEP
49152:UbA307leyidFZE7vBekGuQ/kp129bxWEvd0:UbIyh70kF/p12A
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral1/memory/3424-13-0x0000000000790000-0x0000000000928000-memory.dmp dcrat C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
Processes:
WindowsUpdater.exeWindowsUpdater.exeWindowsUpdater.exeWindowsUpdater.exepid process 3424 WindowsUpdater.exe 3280 WindowsUpdater.exe 244 WindowsUpdater.exe 3696 WindowsUpdater.exe -
Drops file in System32 directory 14 IoCs
Processes:
DCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\__tmp_rar_sfx_access_check_240725078 DCRatBuild.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdater32 DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\__tmp_rar_sfx_access_check_240611578 DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe DCRatBuild.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\__tmp_rar_sfx_access_check_240723796 DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\__tmp_rar_sfx_access_check_240722843 DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\__tmp_rar_sfx_access_check_240724687 DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\__tmp_rar_sfx_access_check_240725625 DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat DCRatBuild.exe File opened for modification C:\Windows\SysWOW64\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat DCRatBuild.exe File created C:\Windows\SysWOW64\WindowsUpdater32\__tmp_rar_sfx_access_check_240724265 DCRatBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
Processes:
DCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exeDCRatBuild.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings DCRatBuild.exe Key created \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000_Classes\Local Settings DCRatBuild.exe -
Modifies registry key 1 TTPs 11 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1332 reg.exe 2772 reg.exe 1996 reg.exe 4200 reg.exe 472 reg.exe 2180 reg.exe 2240 reg.exe 4156 reg.exe 4804 reg.exe 2260 reg.exe 3440 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
WindowsUpdater.exeWindowsUpdater.exeWindowsUpdater.exeWindowsUpdater.exedescription pid process Token: SeDebugPrivilege 3424 WindowsUpdater.exe Token: SeDebugPrivilege 3280 WindowsUpdater.exe Token: SeDebugPrivilege 244 WindowsUpdater.exe Token: SeDebugPrivilege 3696 WindowsUpdater.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
DCRatBuild.exeWScript.execmd.exeDCRatBuild.exeDCRatBuild.exeWScript.execmd.exeDCRatBuild.exeDCRatBuild.exeWScript.execmd.exeDCRatBuild.exeWScript.execmd.exeDCRatBuild.exedescription pid process target process PID 3840 wrote to memory of 4664 3840 DCRatBuild.exe WScript.exe PID 3840 wrote to memory of 4664 3840 DCRatBuild.exe WScript.exe PID 3840 wrote to memory of 4664 3840 DCRatBuild.exe WScript.exe PID 4664 wrote to memory of 1608 4664 WScript.exe cmd.exe PID 4664 wrote to memory of 1608 4664 WScript.exe cmd.exe PID 4664 wrote to memory of 1608 4664 WScript.exe cmd.exe PID 1608 wrote to memory of 3424 1608 cmd.exe WindowsUpdater.exe PID 1608 wrote to memory of 3424 1608 cmd.exe WindowsUpdater.exe PID 1608 wrote to memory of 4156 1608 cmd.exe reg.exe PID 1608 wrote to memory of 4156 1608 cmd.exe reg.exe PID 1608 wrote to memory of 4156 1608 cmd.exe reg.exe PID 5024 wrote to memory of 492 5024 DCRatBuild.exe WScript.exe PID 5024 wrote to memory of 492 5024 DCRatBuild.exe WScript.exe PID 5024 wrote to memory of 492 5024 DCRatBuild.exe WScript.exe PID 2988 wrote to memory of 3520 2988 DCRatBuild.exe WScript.exe PID 2988 wrote to memory of 3520 2988 DCRatBuild.exe WScript.exe PID 2988 wrote to memory of 3520 2988 DCRatBuild.exe WScript.exe PID 492 wrote to memory of 2696 492 WScript.exe cmd.exe PID 492 wrote to memory of 2696 492 WScript.exe cmd.exe PID 492 wrote to memory of 2696 492 WScript.exe cmd.exe PID 2696 wrote to memory of 3280 2696 cmd.exe WindowsUpdater.exe PID 2696 wrote to memory of 3280 2696 cmd.exe WindowsUpdater.exe PID 2960 wrote to memory of 2972 2960 DCRatBuild.exe WScript.exe PID 2960 wrote to memory of 2972 2960 DCRatBuild.exe WScript.exe PID 2960 wrote to memory of 2972 2960 DCRatBuild.exe WScript.exe PID 3708 wrote to memory of 2992 3708 DCRatBuild.exe WScript.exe PID 3708 wrote to memory of 2992 3708 DCRatBuild.exe WScript.exe PID 3708 wrote to memory of 2992 3708 DCRatBuild.exe WScript.exe PID 2696 wrote to memory of 2772 2696 cmd.exe reg.exe PID 2696 wrote to memory of 2772 2696 cmd.exe reg.exe PID 2696 wrote to memory of 2772 2696 cmd.exe reg.exe PID 3520 wrote to memory of 2656 3520 WScript.exe cmd.exe PID 3520 wrote to memory of 2656 3520 WScript.exe cmd.exe PID 3520 wrote to memory of 2656 3520 WScript.exe cmd.exe PID 2656 wrote to memory of 244 2656 cmd.exe WindowsUpdater.exe PID 2656 wrote to memory of 244 2656 cmd.exe WindowsUpdater.exe PID 1564 wrote to memory of 1352 1564 DCRatBuild.exe WScript.exe PID 1564 wrote to memory of 1352 1564 DCRatBuild.exe WScript.exe PID 1564 wrote to memory of 1352 1564 DCRatBuild.exe WScript.exe PID 2972 wrote to memory of 1068 2972 WScript.exe cmd.exe PID 2972 wrote to memory of 1068 2972 WScript.exe cmd.exe PID 2972 wrote to memory of 1068 2972 WScript.exe cmd.exe PID 1068 wrote to memory of 3696 1068 cmd.exe WindowsUpdater.exe PID 1068 wrote to memory of 3696 1068 cmd.exe WindowsUpdater.exe PID 4624 wrote to memory of 1272 4624 DCRatBuild.exe WScript.exe PID 4624 wrote to memory of 1272 4624 DCRatBuild.exe WScript.exe PID 4624 wrote to memory of 1272 4624 DCRatBuild.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"1⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\System32\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbe"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\WindowsUpdater32\PaKX0sN2c4o6GpO5th.bat" "3⤵
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exe"C:\Windows\System32\WindowsUpdater32\WindowsUpdater.exe"4⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WindowsUpdater.exe.logFilesize
1KB
MD5ba188ab8514b037519a2ada3cdeb9a05
SHA1518b6ee233a773b20230ebc226d741961b9bfdb1
SHA25625effb7a46427c841cf727d6445ed5d8bcd128fdf767080ec1e10dbc8a40bee7
SHA512fa2ea4f92834e14c5e09ff81c286c1ae7da9de68748a4dcc68da1ee214632386a24b204f4bd6ea71f17ec30d1e0fe8cb456c0c95ee65a07b87c2bef89c6bff08
-
C:\Windows\SysWOW64\WindowsUpdater32\3iwoWLhCbD6ud1McRS6K1aYy.vbeFilesize
228B
MD563cb07f35d5f7618266afc925eb7de22
SHA1d9b1164485d02481d9e6c9a1929f44b23e84474f
SHA25622ae6afc678dfa9beda5327d65565ed745c3607869eb4a380ed6736e704b8b07
SHA512578134e2ac3bd2f8585e9e8f645c000fbea4d520141004062aa0b22004fa7dfbc1a2fbef52fcd2a4e1cdeca5e915fea17b9ea1440a320139472e8807ff8efd64
-
C:\Windows\SysWOW64\WindowsUpdater32\PaKX0sN2c4o6GpO5th.batFilesize
169B
MD5d754dcc09774b935efb8c95cefee906f
SHA1046d65d75216a74407496b906d7868dff07711cb
SHA2568304d11a02ab7a806781f072013febd8d3c5ceba45a94a68d4fd6a7a931d0242
SHA512e6ee6cf752bd09e97ddff2a238b01d78503e382f0e4d4eced8f1602657b248f1a3c52918bf7ff9c53bff84b2603092279b8e2eaa8e5ad13bac532baf075d11f6
-
C:\Windows\SysWOW64\WindowsUpdater32\WindowsUpdater.exeFilesize
1.6MB
MD5f8b13afa37f458b357656f428af4f3b5
SHA12ec5da9160babd67ea388f32c05968b3b749bd9b
SHA256752c9badfed2e60e84234932aa1eadb052d92217274ba51d306620031030cc58
SHA512748ddafba98cc65e36f2418ed99197f810903678b4450e5c98909bf067787cdfb02a6389595b0ddd36271ad13fbf97f78466ef7dd88deeec07e1716231e1ef83
-
memory/3424-13-0x0000000000790000-0x0000000000928000-memory.dmpFilesize
1.6MB
-
memory/3424-12-0x00007FFFF6303000-0x00007FFFF6305000-memory.dmpFilesize
8KB
-
memory/3424-14-0x0000000002BC0000-0x0000000002BCE000-memory.dmpFilesize
56KB