Analysis

  • max time kernel
    207s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 06:53

General

  • Target

    e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe

  • Size

    1.2MB

  • MD5

    6ed29f629da1a85b7b854aafda1e369a

  • SHA1

    25cdd05e00d1900aabca3e8a7d11f1a9e4547e3a

  • SHA256

    e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441

  • SHA512

    75833a06204dc1d763105ccd427d667cfab5f060e310ab329d243e71f00ae0aa65ecc322ff35291a6ddfcea912a84506d6a99c62d4c38dc4a1958d0b31bd176b

  • SSDEEP

    24576:0tb20pkaCqT5TBWgNQ7ar3YKEBCd1s31LgABGkoyXtkcnO16A:dVg5tQ7ar3GB+1eLFtvnG5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

A0AYFJ0PJtXGl9PaJat

C2

193.0.200.131:35689

Mutex

0dcfc9e55379c2e16a422bb33c97d277

Attributes
  • reg_key

    0dcfc9e55379c2e16a422bb33c97d277

  • splitter

    |'|'|

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Blocks application from running via registry modification 64 IoCs

    Adds application to list of disallowed applications.

  • Drops file in Drivers directory 13 IoCs
  • Executes dropped EXE 7 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 16 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe
    "C:\Users\Admin\AppData\Local\Temp\e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe
      C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe
      2⤵
      • Modifies WinLogon for persistence
      • Blocks application from running via registry modification
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IyQoe.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\system32\cacls.exe
          cacls C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE /E /P everyone:n
          4⤵
            PID:2504
          • C:\Windows\system32\cacls.exe
            cacls C:\Users\Admin\AppData\Local\Temp\WINDOWS /E /P everyone:n
            4⤵
              PID:812
            • C:\Windows\system32\cacls.exe
              cacls C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime /E /P everyone:n
              4⤵
                PID:4428
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Windows\System32\drivers\etc\*.*"
                4⤵
                • Drops file in Drivers directory
                • Sets file to hidden
                • Views/modifies file attributes
                PID:3436
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Windows\System32\drivers\etc"
                4⤵
                • Drops file in Drivers directory
                • Sets file to hidden
                • Views/modifies file attributes
                PID:1832
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\*.*"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:3732
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:3008
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\*.*"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:640
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:2224
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\*.*"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:972
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:2960
          • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exe
            C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exe
            2⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Checks computer location settings
            • Drops desktop.ini file(s)
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3328
            • C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exe
              "C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exe"
              3⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Checks computer location settings
              • Adds Run key to start application
              • Modifies Internet Explorer settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3384
              • C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe
                "C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4184
                • C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe
                  C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe
                  5⤵
                  • Executes dropped EXE
                  PID:4572
              • C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe
                "C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:1868
                • C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe
                  C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:884
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe" "wksprt.exe" ENABLE
                    6⤵
                    • Modifies Windows Firewall
                    PID:876
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v.bat" "
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1756
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Windows\System32\drivers\etc\*.*"
                4⤵
                • Drops file in Drivers directory
                • Sets file to hidden
                • Views/modifies file attributes
                PID:2352
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Windows\System32\drivers\etc"
                4⤵
                • Drops file in Drivers directory
                • Sets file to hidden
                • Views/modifies file attributes
                PID:1156
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\*.*"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:4576
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:3472
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\*.*"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:1236
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:1032
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\*.*"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:1844
              • C:\Windows\system32\attrib.exe
                attrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime"
                4⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:2588
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c %temp%\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbs
            2⤵
            • Checks computer location settings
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3376
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbs"
              3⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:3692
              • C:\Windows\SysWOW64\regini.exe
                "C:\Windows\System32\regini.exe" rad1B6EA.tmp
                4⤵
                  PID:484
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4572 -ip 4572
            1⤵
              PID:2496

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Winlogon Helper DLL

            1
            T1004

            Hidden Files and Directories

            3
            T1158

            Modify Existing Service

            1
            T1031

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Modify Registry

            4
            T1112

            Hidden Files and Directories

            3
            T1158

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\wksprt.exe.log
              Filesize

              224B

              MD5

              c19eb8c8e7a40e6b987f9d2ee952996e

              SHA1

              6fc3049855bc9100643e162511673c6df0f28bfb

              SHA256

              677e9e30350df17e2bc20fa9f7d730e9f7cc6e870d6520a345f5f7dc5b31f58a

              SHA512

              860713b4a787c2189ed12a47d4b68b60ac00c7a253cae52dd4eb9276dacafeae3a81906b6d0742c8ecfdfaa255777c445beb7c2a532f3c677a9903237ac97596

            • C:\Users\Admin\AppData\Local\Temp\IyQoe.bat
              Filesize

              522B

              MD5

              254160d9b9287bff589b6246f99d8eec

              SHA1

              876310cdd302898f5c8f4041037f18bacf07bcbe

              SHA256

              16e99344bda2b1338204f4e89c3c6b6a8efbb168a76ed624cba9f4d1ad3fd9a4

              SHA512

              002d0415387e60b9ef11a6e95787f03ec34c571676d7e5cafd54b6352855ca24e9099d1faa970a5cabdaa1f26620676cbb56e028cfdc54045119e0535a70444a

            • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbs
              Filesize

              348B

              MD5

              a0926bc919989b99c9e0a6b4ce4aa30e

              SHA1

              92d4f4352f8779b9b3d027ecaa3bbfc1a3490714

              SHA256

              fe2cb98959883d7523f401652fe2e60b691fb4d79cd14d7e02602df0eda8edc0

              SHA512

              2fc1533fa9a77e80f266e88ecafd9de501705f3b8ae50d4994517c0aececb8d7609fb644772e4d9b9e5fa2b6f23ccf3a9181c03217a59b90d94f002b4cf8415f

            • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exe
              Filesize

              59KB

              MD5

              3aa31ccc52e5f05188e5ac84f55fb06f

              SHA1

              b334aeff292fec54909810e44cfdf6d9fa6c4fb6

              SHA256

              155e963480151497924d5220e5a373e37a4298d9399e551e0694a5f2be930282

              SHA512

              4f294a1c76ad0b720791ee93c0e91ce3acc7128a30c521e106adbffe5ee9ce679533d887a2437478c2f51bafde9e2e15658165440fa4fa590d6b14ed14c3ab11

            • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exe
              Filesize

              59KB

              MD5

              3aa31ccc52e5f05188e5ac84f55fb06f

              SHA1

              b334aeff292fec54909810e44cfdf6d9fa6c4fb6

              SHA256

              155e963480151497924d5220e5a373e37a4298d9399e551e0694a5f2be930282

              SHA512

              4f294a1c76ad0b720791ee93c0e91ce3acc7128a30c521e106adbffe5ee9ce679533d887a2437478c2f51bafde9e2e15658165440fa4fa590d6b14ed14c3ab11

            • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\ucsvc.exe
              Filesize

              70KB

              MD5

              6b4f12869c822faff28fe9377531655b

              SHA1

              784fb31f33a92695e4dc6eefeaccc13086ae277f

              SHA256

              06688797d34750928fc847a12db9d2c747d97ea514b1f7d077d6620b160ac958

              SHA512

              5a65c6e30903790ed4c557ffa3ccae0c1a177b0a3b7cacade93faf84c8e7f20f410b5a710ebfd58e0e23e57addf9dc96391254db660f74618f7057204baafae3

            • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe
              Filesize

              126KB

              MD5

              aedddd810b0fbb4b5346be5a71d6b8dc

              SHA1

              91e567a984004e467c8067eb334b010531354681

              SHA256

              0fa8e108788bc2b65e9b524de5b198261f5cd1503d53f390cdb5c75a83e524ff

              SHA512

              a67786b66aab1b2ccbd19269349e5b5ca82858936b1f5ba970f851ddb750e1f87041eae5b7a014fbba516984061022726a897e28ab1b489381bc0223d4b9495a

            • C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe
              Filesize

              126KB

              MD5

              aedddd810b0fbb4b5346be5a71d6b8dc

              SHA1

              91e567a984004e467c8067eb334b010531354681

              SHA256

              0fa8e108788bc2b65e9b524de5b198261f5cd1503d53f390cdb5c75a83e524ff

              SHA512

              a67786b66aab1b2ccbd19269349e5b5ca82858936b1f5ba970f851ddb750e1f87041eae5b7a014fbba516984061022726a897e28ab1b489381bc0223d4b9495a

            • C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exe
              Filesize

              173KB

              MD5

              c3e0b61d64ccdb38323478d58beee899

              SHA1

              60a31e51017f6e1a860b0144562662672765fcee

              SHA256

              c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c

              SHA512

              79530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc

            • C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exe
              Filesize

              173KB

              MD5

              c3e0b61d64ccdb38323478d58beee899

              SHA1

              60a31e51017f6e1a860b0144562662672765fcee

              SHA256

              c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c

              SHA512

              79530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc

            • C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exe
              Filesize

              173KB

              MD5

              c3e0b61d64ccdb38323478d58beee899

              SHA1

              60a31e51017f6e1a860b0144562662672765fcee

              SHA256

              c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c

              SHA512

              79530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc

            • C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exe
              Filesize

              173KB

              MD5

              c3e0b61d64ccdb38323478d58beee899

              SHA1

              60a31e51017f6e1a860b0144562662672765fcee

              SHA256

              c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c

              SHA512

              79530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc

            • C:\Users\Admin\AppData\Local\Temp\rad1B6EA.tmp
              Filesize

              68B

              MD5

              036fe9e90e1573c91f9f99bcf8170df0

              SHA1

              71009f2ea2955bd48c602d9c76c35b93ba141565

              SHA256

              562c327100cf8ebbe415fa3aff9ff7c7ec8ce8c3bb680cfc0315e7d677469648

              SHA512

              ddb09e217f812527568a959695976b3c1812b0015a3600cf1bec87bd6e9a20bea50c44b72e76702e75af340bfdaa88eee386c7081952372ffab16ac2bc03a820

            • C:\Users\Admin\AppData\Local\Temp\v.bat
              Filesize

              384B

              MD5

              2ec56e11d99afad1e6fba39be82df172

              SHA1

              8ace61da9bf03dfa3f05e4a2eee2311ade93040f

              SHA256

              fe08f1f73ef0636a84ff7b757a04f2f99c417b4c0d63d9da8952c4154830b929

              SHA512

              5fb85766c7ae10f5839fcdb02518caabb9cc44012ea8cc108c0c4ee78f0a04549cf4a2e0d33ce03a00748baa79f25f63e288513d869d967658fa222fbd11cc21

            • C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exe
              Filesize

              70KB

              MD5

              6b4f12869c822faff28fe9377531655b

              SHA1

              784fb31f33a92695e4dc6eefeaccc13086ae277f

              SHA256

              06688797d34750928fc847a12db9d2c747d97ea514b1f7d077d6620b160ac958

              SHA512

              5a65c6e30903790ed4c557ffa3ccae0c1a177b0a3b7cacade93faf84c8e7f20f410b5a710ebfd58e0e23e57addf9dc96391254db660f74618f7057204baafae3

            • C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe
              Filesize

              173KB

              MD5

              c3e0b61d64ccdb38323478d58beee899

              SHA1

              60a31e51017f6e1a860b0144562662672765fcee

              SHA256

              c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c

              SHA512

              79530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc

            • C:\Windows\System32\drivers\etc\hosts
              Filesize

              1KB

              MD5

              01ae587c73cd331fd2da4caeca584612

              SHA1

              ee2f06eba879af91442b137c36861c131f9fbc26

              SHA256

              464da2c16792622be63fb6e5795853c24d84473080d7090948147dc1c1c27e68

              SHA512

              650e69fa28985a4fd79a530f4fd5f08ae0590160e9db25872f0d3ea50a612674c076090e9d1f8ec7335a2473fa51088577436a2ec8e702e9402f16d467fbb1e5

            • C:\Windows\assembly\Desktop.ini
              Filesize

              227B

              MD5

              f7f759a5cd40bc52172e83486b6de404

              SHA1

              d74930f354a56cfd03dc91aa96d8ae9657b1ee54

              SHA256

              a709c2551b8818d7849d31a65446dc2f8c4cca2dcbbc5385604286f49cfdaf1c

              SHA512

              a50b7826bfe72506019e4b1148a214c71c6f4743c09e809ef15cd0e0223f3078b683d203200910b07b5e1e34b94f0fe516ac53527311e2943654bfceade53298

            • memory/484-144-0x0000000000000000-mapping.dmp
            • memory/640-167-0x0000000000000000-mapping.dmp
            • memory/812-156-0x0000000000000000-mapping.dmp
            • memory/876-191-0x0000000000000000-mapping.dmp
            • memory/884-186-0x0000000000400000-0x000000000040C000-memory.dmp
              Filesize

              48KB

            • memory/884-189-0x0000000074C00000-0x00000000751B1000-memory.dmp
              Filesize

              5.7MB

            • memory/884-185-0x0000000000000000-mapping.dmp
            • memory/884-190-0x0000000074C00000-0x00000000751B1000-memory.dmp
              Filesize

              5.7MB

            • memory/972-171-0x0000000000000000-mapping.dmp
            • memory/1032-168-0x0000000000000000-mapping.dmp
            • memory/1156-161-0x0000000000000000-mapping.dmp
            • memory/1236-166-0x0000000000000000-mapping.dmp
            • memory/1756-150-0x0000000000000000-mapping.dmp
            • memory/1832-160-0x0000000000000000-mapping.dmp
            • memory/1844-170-0x0000000000000000-mapping.dmp
            • memory/1868-188-0x0000000074C00000-0x00000000751B1000-memory.dmp
              Filesize

              5.7MB

            • memory/1868-182-0x0000000000000000-mapping.dmp
            • memory/2072-141-0x00007FFC5BD60000-0x00007FFC5C796000-memory.dmp
              Filesize

              10.2MB

            • memory/2072-132-0x0000000000000000-mapping.dmp
            • memory/2224-169-0x0000000000000000-mapping.dmp
            • memory/2352-152-0x0000000000000000-mapping.dmp
            • memory/2504-155-0x0000000000000000-mapping.dmp
            • memory/2588-172-0x0000000000000000-mapping.dmp
            • memory/2960-173-0x0000000000000000-mapping.dmp
            • memory/2996-153-0x0000000000000000-mapping.dmp
            • memory/3008-165-0x0000000000000000-mapping.dmp
            • memory/3328-135-0x0000000000000000-mapping.dmp
            • memory/3328-140-0x00007FFC5BD60000-0x00007FFC5C796000-memory.dmp
              Filesize

              10.2MB

            • memory/3376-138-0x0000000000000000-mapping.dmp
            • memory/3384-147-0x0000000000000000-mapping.dmp
            • memory/3384-149-0x00007FFC5BD60000-0x00007FFC5C796000-memory.dmp
              Filesize

              10.2MB

            • memory/3436-158-0x0000000000000000-mapping.dmp
            • memory/3472-164-0x0000000000000000-mapping.dmp
            • memory/3692-142-0x0000000000000000-mapping.dmp
            • memory/3732-162-0x0000000000000000-mapping.dmp
            • memory/4184-181-0x0000000074B60000-0x0000000075111000-memory.dmp
              Filesize

              5.7MB

            • memory/4184-177-0x0000000074B60000-0x0000000075111000-memory.dmp
              Filesize

              5.7MB

            • memory/4184-175-0x0000000000000000-mapping.dmp
            • memory/4428-157-0x0000000000000000-mapping.dmp
            • memory/4572-178-0x0000000000000000-mapping.dmp
            • memory/4576-163-0x0000000000000000-mapping.dmp