Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 12:53
Static task
static1
Behavioral task
behavioral1
Sample
10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe
Resource
win10v2004-20220812-en
General
-
Target
10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe
-
Size
1.0MB
-
MD5
5b65b00894b6bdf79de272360d268604
-
SHA1
ba437d3e5f376f1d655632a52bf1e05af8a7e7a9
-
SHA256
10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80
-
SHA512
4ff69fd3473ffc39e938009e1983de50c90a55996a51fc4d3dae09767dd0fd3bec87aced33dd71b7b0d32314161ceb15899e4fb68264928a0d9a717b6a330d12
-
SSDEEP
24576:xVm0yFkkRztCxlvTJe9XJaCubcnoxtjZZHh65:rmvFvRav1eVdeQ8FZN6
Malware Config
Extracted
C:\Users\Admin\Documents\Decrypt-All-Files-ntjtjrd.txt
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion/
Extracted
C:\ProgramData\ggrrhsj.html
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
xlobkpb.exexlobkpb.exexlobkpb.exexlobkpb.exexlobkpb.exepid process 380 xlobkpb.exe 1520 xlobkpb.exe 3620 xlobkpb.exe 4868 xlobkpb.exe 3228 xlobkpb.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
svchost.exedescription ioc process File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\CloseOpen.CRW.ntjtjrd svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\OptimizeExpand.CRW.ntjtjrd svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\ConvertFromApprove.CRW.ntjtjrd svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xlobkpb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation xlobkpb.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Drops file in System32 directory 6 IoCs
Processes:
xlobkpb.exexlobkpb.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\xlobkpb.exe.log xlobkpb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 xlobkpb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE xlobkpb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies xlobkpb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 xlobkpb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\desktop.ini xlobkpb.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\Decrypt-All-Files-ntjtjrd.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
Processes:
10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exexlobkpb.exexlobkpb.exedescription pid process target process PID 5072 set thread context of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 380 set thread context of 1520 380 xlobkpb.exe xlobkpb.exe PID 3620 set thread context of 3228 3620 xlobkpb.exe xlobkpb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
xlobkpb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch xlobkpb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" xlobkpb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\GPU xlobkpb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" xlobkpb.exe -
Modifies data under HKEY_USERS 20 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000}\MaxCapacity = "15140" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000}\NukeOnDelete = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00320066006200340063006300640063002d0030003000300030002d0030003000300030002d0030003000300030002d006400300031003200300030003000300030003000300030007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2fb4ccdc-0000-0000-0000-d01200000000} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe -
Modifies registry class 6 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133048073616297681" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exexlobkpb.exepid process 4976 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 4976 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe 1520 xlobkpb.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
xlobkpb.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1520 xlobkpb.exe Token: SeDebugPrivilege 1520 xlobkpb.exe Token: SeShutdownPrivilege 760 Explorer.EXE Token: SeCreatePagefilePrivilege 760 Explorer.EXE Token: SeShutdownPrivilege 760 Explorer.EXE Token: SeCreatePagefilePrivilege 760 Explorer.EXE Token: SeShutdownPrivilege 760 Explorer.EXE Token: SeCreatePagefilePrivilege 760 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
xlobkpb.exepid process 3228 xlobkpb.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
xlobkpb.exepid process 3228 xlobkpb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
xlobkpb.exepid process 3228 xlobkpb.exe 3228 xlobkpb.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exexlobkpb.exexlobkpb.exesvchost.exexlobkpb.exedescription pid process target process PID 5072 wrote to memory of 3132 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 3132 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 3132 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 5072 wrote to memory of 4976 5072 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe 10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe PID 380 wrote to memory of 1520 380 xlobkpb.exe xlobkpb.exe PID 380 wrote to memory of 1520 380 xlobkpb.exe xlobkpb.exe PID 380 wrote to memory of 1520 380 xlobkpb.exe xlobkpb.exe PID 380 wrote to memory of 1520 380 xlobkpb.exe xlobkpb.exe PID 380 wrote to memory of 1520 380 xlobkpb.exe xlobkpb.exe PID 380 wrote to memory of 1520 380 xlobkpb.exe xlobkpb.exe PID 380 wrote to memory of 1520 380 xlobkpb.exe xlobkpb.exe PID 1520 wrote to memory of 780 1520 xlobkpb.exe svchost.exe PID 780 wrote to memory of 2352 780 svchost.exe wmiprvse.exe PID 780 wrote to memory of 2352 780 svchost.exe wmiprvse.exe PID 780 wrote to memory of 4500 780 svchost.exe DllHost.exe PID 780 wrote to memory of 4500 780 svchost.exe DllHost.exe PID 1520 wrote to memory of 760 1520 xlobkpb.exe Explorer.EXE PID 1520 wrote to memory of 3620 1520 xlobkpb.exe xlobkpb.exe PID 1520 wrote to memory of 3620 1520 xlobkpb.exe xlobkpb.exe PID 1520 wrote to memory of 3620 1520 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 4868 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 4868 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 4868 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 3228 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 3228 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 3228 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 3228 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 3228 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 3228 3620 xlobkpb.exe xlobkpb.exe PID 3620 wrote to memory of 3228 3620 xlobkpb.exe xlobkpb.exe PID 780 wrote to memory of 2208 780 svchost.exe mousocoreworker.exe PID 780 wrote to memory of 2208 780 svchost.exe mousocoreworker.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe"C:\Users\Admin\AppData\Local\Temp\10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe"C:\Users\Admin\AppData\Local\Temp\10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe"C:\Users\Admin\AppData\Local\Temp\10aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeC:\Users\Admin\AppData\Local\Temp\xlobkpb.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeC:\Users\Admin\AppData\Local\Temp\xlobkpb.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe" -u3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe" -u4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe"C:\Users\Admin\AppData\Local\Temp\xlobkpb.exe" -u4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft OneDrive\xkefqneFilesize
654B
MD59c740ebfc2c006410bd8169141d467a7
SHA1f08cf9c2d7d1fabd95dc27891a4105941c362614
SHA25608608980e0d5465fa7763d6e283dcebef59573657a04572ac5609a6d5c27db11
SHA5128e3927ca89f77f9f061e33be75bed3f87540186889ed2f49e6362f99acd5882e231b85e71ea3a90c888e10b6ab5a4219bb07a95b5fb81b523f2f4c5057404c21
-
C:\ProgramData\Microsoft OneDrive\xkefqneFilesize
654B
MD59c740ebfc2c006410bd8169141d467a7
SHA1f08cf9c2d7d1fabd95dc27891a4105941c362614
SHA25608608980e0d5465fa7763d6e283dcebef59573657a04572ac5609a6d5c27db11
SHA5128e3927ca89f77f9f061e33be75bed3f87540186889ed2f49e6362f99acd5882e231b85e71ea3a90c888e10b6ab5a4219bb07a95b5fb81b523f2f4c5057404c21
-
C:\ProgramData\Microsoft OneDrive\xkefqneFilesize
654B
MD55b520ec3ace2eccc71bcdf8d52fbcc50
SHA16cc1e712c64c07140d94f8bce226160554a86506
SHA2566af56ccbed4aa253d3db8b40dacec9a9da88f9cdd09f74845a82d3a103c24da2
SHA512dd40d6c87f87f00488a06411489f9307d554fa4a0b9029090b0654caa98b78566f5943874be9f9cfd160893a04ddf1b31554a86e7412bfab3781f9b5dd636546
-
C:\ProgramData\Microsoft OneDrive\xkefqneFilesize
654B
MD5b8fb50c8a43d86013133da4864e45362
SHA1a8a81d17073c6ed3f3f1fcc40d910c383b802446
SHA2562764f27ae71027de973fe976709419279e60729b1d97bbba23a9a0a021b54ac4
SHA512445b2fc440b267300eb9dc268fca010b4f55a65f06d9c9dd75f181095fdd5d44cbbe9c141029f24aa2f0f9793af8c06bb63a33762ab7e56f1e595e7b721a6b78
-
C:\ProgramData\Microsoft OneDrive\xkefqneFilesize
654B
MD5d5a42877f8416071453f026752b57184
SHA1c2b90d75f9859ac5911b906e2664c1f9e7875424
SHA256ff22e70b75fe42bf3e43bdc95a5c5b45d3bb40b80e2101c547643a336a5e2309
SHA51276e25450ebe0a323145f14d2631e16b0e1bd591a3c4785eb8d683c7c5fd9144904beddb73f36e6c8d58fe53c03db4cbcd7d6737ddaae483a0fee2775525ecd23
-
C:\ProgramData\ggrrhsj.htmlFilesize
226KB
MD54ec5647cbe788ec60c8dfbc57e8f6d28
SHA1327b1dd812b69630836383d60708a4848b8ec70f
SHA2568a4b127ad7e0adf36157e904a75cd28afcce07a91421034eb30fbfa9147ab9be
SHA512f8ea125a06381e767e75b1a8e4c6e642daea790b2ff6d471abd0a86bf4ee827d6f64c81dfc9feeca027bd46ebd2b7c99ecd4cf27ac027e4cbab72de26c174bf9
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeFilesize
1.0MB
MD55b65b00894b6bdf79de272360d268604
SHA1ba437d3e5f376f1d655632a52bf1e05af8a7e7a9
SHA25610aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80
SHA5124ff69fd3473ffc39e938009e1983de50c90a55996a51fc4d3dae09767dd0fd3bec87aced33dd71b7b0d32314161ceb15899e4fb68264928a0d9a717b6a330d12
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeFilesize
1.0MB
MD55b65b00894b6bdf79de272360d268604
SHA1ba437d3e5f376f1d655632a52bf1e05af8a7e7a9
SHA25610aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80
SHA5124ff69fd3473ffc39e938009e1983de50c90a55996a51fc4d3dae09767dd0fd3bec87aced33dd71b7b0d32314161ceb15899e4fb68264928a0d9a717b6a330d12
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeFilesize
1.0MB
MD55b65b00894b6bdf79de272360d268604
SHA1ba437d3e5f376f1d655632a52bf1e05af8a7e7a9
SHA25610aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80
SHA5124ff69fd3473ffc39e938009e1983de50c90a55996a51fc4d3dae09767dd0fd3bec87aced33dd71b7b0d32314161ceb15899e4fb68264928a0d9a717b6a330d12
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeFilesize
1.0MB
MD55b65b00894b6bdf79de272360d268604
SHA1ba437d3e5f376f1d655632a52bf1e05af8a7e7a9
SHA25610aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80
SHA5124ff69fd3473ffc39e938009e1983de50c90a55996a51fc4d3dae09767dd0fd3bec87aced33dd71b7b0d32314161ceb15899e4fb68264928a0d9a717b6a330d12
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeFilesize
1.0MB
MD55b65b00894b6bdf79de272360d268604
SHA1ba437d3e5f376f1d655632a52bf1e05af8a7e7a9
SHA25610aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80
SHA5124ff69fd3473ffc39e938009e1983de50c90a55996a51fc4d3dae09767dd0fd3bec87aced33dd71b7b0d32314161ceb15899e4fb68264928a0d9a717b6a330d12
-
C:\Users\Admin\AppData\Local\Temp\xlobkpb.exeFilesize
1.0MB
MD55b65b00894b6bdf79de272360d268604
SHA1ba437d3e5f376f1d655632a52bf1e05af8a7e7a9
SHA25610aab818e3c30218d462f1782678581633823325dbdfb9ff41c054af351a1f80
SHA5124ff69fd3473ffc39e938009e1983de50c90a55996a51fc4d3dae09767dd0fd3bec87aced33dd71b7b0d32314161ceb15899e4fb68264928a0d9a717b6a330d12
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\xlobkpb.exe.logFilesize
497B
MD52719e834ff73fd4cbb1aacc4af15bc19
SHA1c845f2eaa7416e6701c3539473581519005e550c
SHA256b34025593554f8ef43b2a9467bab0af928606e6335e7ce0c3090d3952fbba119
SHA5128eb1fb59ee040f3381cb0ffd50c8bdc3b6f4c25ebae91bd7ee71f853f15269338db1551a7f2c28bf80a068c9aee3402d11b041728a9b264cc160c67377f1abcb
-
memory/380-146-0x0000000074290000-0x0000000074841000-memory.dmpFilesize
5.7MB
-
memory/780-148-0x0000000026CC0000-0x0000000026D34000-memory.dmpFilesize
464KB
-
memory/1520-141-0x0000000000000000-mapping.dmp
-
memory/1520-147-0x0000000000EB0000-0x00000000010F0000-memory.dmpFilesize
2.2MB
-
memory/2208-169-0x0000000000000000-mapping.dmp
-
memory/2352-151-0x0000000000000000-mapping.dmp
-
memory/3228-167-0x00000000012F0000-0x0000000001530000-memory.dmpFilesize
2.2MB
-
memory/3228-161-0x0000000000000000-mapping.dmp
-
memory/3620-157-0x0000000000000000-mapping.dmp
-
memory/3620-166-0x0000000074320000-0x00000000748D1000-memory.dmpFilesize
5.7MB
-
memory/4500-153-0x0000000000000000-mapping.dmp
-
memory/4976-138-0x0000000000F80000-0x00000000011C0000-memory.dmpFilesize
2.2MB
-
memory/4976-133-0x0000000000000000-mapping.dmp
-
memory/4976-134-0x0000000000400000-0x00000000004A4000-memory.dmpFilesize
656KB
-
memory/4976-135-0x0000000000400000-0x00000000004A4000-memory.dmpFilesize
656KB
-
memory/4976-137-0x0000000000D70000-0x0000000000F7F000-memory.dmpFilesize
2.1MB
-
memory/5072-136-0x0000000074EC0000-0x0000000075471000-memory.dmpFilesize
5.7MB
-
memory/5072-132-0x0000000074EC0000-0x0000000075471000-memory.dmpFilesize
5.7MB