Analysis
-
max time kernel
169s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 05:57
Static task
static1
Behavioral task
behavioral1
Sample
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe
Resource
win10v2004-20220812-en
General
-
Target
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe
-
Size
1.2MB
-
MD5
1aad30f76693aa8ec2fd2a9314b02125
-
SHA1
a199494ac4f065578323c1058e0f0cd5df563bc2
-
SHA256
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1
-
SHA512
fa2d623b0b33c1f7506209980f4699aa8efb4dc18b25cf97f6871fee209d0de7a79f7b3c63458aa0e49d868446e03d2a0cf59ca47c2eee74c67eeac21d03b31c
-
SSDEEP
24576:ADqBNB/RLKAlkmrTgCQgoB/7nhYfxknKBCXzOvERcd8Gu7q:ADkpRkmvQgo9zS6nMv7+1u
Malware Config
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-ipiermb.txt
http://tmc2ybfqzgkaeilm.onion.cab
http://tmc2ybfqzgkaeilm.tor2web.org
http://tmc2ybfqzgkaeilm.onion/
Extracted
C:\ProgramData\borcfwe.html
http://tmc2ybfqzgkaeilm.onion.cab
http://tmc2ybfqzgkaeilm.tor2web.org
http://tmc2ybfqzgkaeilm.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 5 IoCs
Processes:
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exeovfgrqj.exeovfgrqj.exeovfgrqj.exeovfgrqj.exepid process 3716 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 2740 ovfgrqj.exe 1988 ovfgrqj.exe 548 ovfgrqj.exe 5036 ovfgrqj.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
svchost.exedescription ioc process File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\ExpandProtect.CRW.ipiermb svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\UnlockUnregister.CRW.ipiermb svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\GrantOut.RAW.ipiermb svchost.exe File renamed C:\Windows\Temp\laaaaaaa.tmp => C:\Users\Admin\Pictures\UseRename.RAW.ipiermb svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ovfgrqj.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ovfgrqj.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Drops file in System32 directory 6 IoCs
Processes:
ovfgrqj.exeovfgrqj.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ovfgrqj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\desktop.ini ovfgrqj.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\ovfgrqj.exe.log ovfgrqj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ovfgrqj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ovfgrqj.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ovfgrqj.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-ipiermb.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
Processes:
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exeovfgrqj.exeovfgrqj.exedescription pid process target process PID 4584 set thread context of 3716 4584 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe PID 2740 set thread context of 1988 2740 ovfgrqj.exe ovfgrqj.exe PID 548 set thread context of 5036 548 ovfgrqj.exe ovfgrqj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
ovfgrqj.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" ovfgrqj.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ovfgrqj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ovfgrqj.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\GPU ovfgrqj.exe -
Modifies data under HKEY_USERS 20 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000}\MaxCapacity = "15140" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{06969d78-0000-0000-0000-d01200000000} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00300036003900360039006400370038002d0030003000300030002d0030003000300030002d0030003000300030002d006400300031003200300030003000300030003000300030007d0000000000 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exeovfgrqj.exepid process 3716 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 3716 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe 1988 ovfgrqj.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2576 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
ovfgrqj.exeovfgrqj.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1988 ovfgrqj.exe Token: SeDebugPrivilege 1988 ovfgrqj.exe Token: SeDebugPrivilege 548 ovfgrqj.exe Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
ovfgrqj.exepid process 5036 ovfgrqj.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
ovfgrqj.exepid process 5036 ovfgrqj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ovfgrqj.exepid process 5036 ovfgrqj.exe 5036 ovfgrqj.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exeovfgrqj.exeovfgrqj.exesvchost.exeovfgrqj.exedescription pid process target process PID 4584 wrote to memory of 3716 4584 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe PID 4584 wrote to memory of 3716 4584 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe PID 4584 wrote to memory of 3716 4584 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe PID 4584 wrote to memory of 3716 4584 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe PID 4584 wrote to memory of 3716 4584 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe PID 4584 wrote to memory of 3716 4584 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe 8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe PID 2740 wrote to memory of 1988 2740 ovfgrqj.exe ovfgrqj.exe PID 2740 wrote to memory of 1988 2740 ovfgrqj.exe ovfgrqj.exe PID 2740 wrote to memory of 1988 2740 ovfgrqj.exe ovfgrqj.exe PID 2740 wrote to memory of 1988 2740 ovfgrqj.exe ovfgrqj.exe PID 2740 wrote to memory of 1988 2740 ovfgrqj.exe ovfgrqj.exe PID 2740 wrote to memory of 1988 2740 ovfgrqj.exe ovfgrqj.exe PID 1988 wrote to memory of 780 1988 ovfgrqj.exe svchost.exe PID 1988 wrote to memory of 2576 1988 ovfgrqj.exe Explorer.EXE PID 780 wrote to memory of 4404 780 svchost.exe mousocoreworker.exe PID 780 wrote to memory of 4404 780 svchost.exe mousocoreworker.exe PID 1988 wrote to memory of 548 1988 ovfgrqj.exe ovfgrqj.exe PID 1988 wrote to memory of 548 1988 ovfgrqj.exe ovfgrqj.exe PID 1988 wrote to memory of 548 1988 ovfgrqj.exe ovfgrqj.exe PID 548 wrote to memory of 5036 548 ovfgrqj.exe ovfgrqj.exe PID 548 wrote to memory of 5036 548 ovfgrqj.exe ovfgrqj.exe PID 548 wrote to memory of 5036 548 ovfgrqj.exe ovfgrqj.exe PID 548 wrote to memory of 5036 548 ovfgrqj.exe ovfgrqj.exe PID 548 wrote to memory of 5036 548 ovfgrqj.exe ovfgrqj.exe PID 548 wrote to memory of 5036 548 ovfgrqj.exe ovfgrqj.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe"C:\Users\Admin\AppData\Local\Temp\8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe"C:\Users\Admin\AppData\Local\Temp\8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exeC:\Users\Admin\AppData\Local\Temp\ovfgrqj.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exe"C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exe"C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exe" -u3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exe"C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Oracle\qzqqxbcFilesize
654B
MD5ae7ee19342179a365954cc3c557e3160
SHA13124aa333409806a05d263767c6f78646989f8c5
SHA25669f5dc2da788c748b62730dd20bff0e3dbda8d9fe9bdc05ad9043a39dbc45b84
SHA512ed81f4f93cd6df8a400ceee9356b91d99d1d2ea33890570f657435cd76d5f68c889d60be2c5805e0e284186f8bdba89e5b528bb9708ecec6b3625d4fd7e33c5f
-
C:\ProgramData\Oracle\qzqqxbcFilesize
654B
MD5ae7ee19342179a365954cc3c557e3160
SHA13124aa333409806a05d263767c6f78646989f8c5
SHA25669f5dc2da788c748b62730dd20bff0e3dbda8d9fe9bdc05ad9043a39dbc45b84
SHA512ed81f4f93cd6df8a400ceee9356b91d99d1d2ea33890570f657435cd76d5f68c889d60be2c5805e0e284186f8bdba89e5b528bb9708ecec6b3625d4fd7e33c5f
-
C:\ProgramData\Oracle\qzqqxbcFilesize
654B
MD5fda1fab97e467bfb010c9bafcbb08e9f
SHA10a0cd9ba8f035c7f91070d58927ce5bee6c39b0c
SHA256a310ba36367e973ec869cdfeabe075033eab58403a441f68e43d0a5ff59f98df
SHA5122a3d235f8784018a6dd8bd4b79de5cfd9714583fe4a1685f5e8bf47b7254851ab823af3ac335867586b2e26f5c9ed1f27884fb8e1f265b333632dcb6b1d36f13
-
C:\ProgramData\Oracle\qzqqxbcFilesize
654B
MD5a1b0b9b6f1cb091e54bc9d782e2736b0
SHA1ee2c1b2d5be52c5f35abc013f62010afde9cb971
SHA256bd994a4ca0c59943f8acacc4145295d80d1d3f5ba6b56556fe2c61257e631f31
SHA512736325c999c6ef9d3bd3d91a986c02f3fb6427e0376f1adc37de67d7886c20b2252dd96c15cbed0de50a3e3e3c7c0ce977392796e7ff56a8594a65d906537384
-
C:\ProgramData\Oracle\qzqqxbcFilesize
654B
MD513098299200feee6c8e3b2555df730b0
SHA1233b40aede62d1c9cb916a0d2dd891f5323aaee7
SHA256b1ee84efe6db4021061f0245d0c4a2cff6350c9f01474911fb8b9912fba42a7f
SHA512f1fd0bc5e297a92c22df176d6c717ba2b31bce8b995f54620e7f37e346595b746efc65b184ad7119d5325237ba670bd0ae701b144e65a921befefda6819479a9
-
C:\ProgramData\borcfwe.htmlFilesize
225KB
MD5eb61ed8cf32d2f8e50f79c3ac1c158c7
SHA1c939cc62a77a13b74cbfe649c16a4930cf5088ff
SHA256713cf81cc1da981ced8c72e9fca3f8d0a7f5a1e14d06a70d895b934ffd483281
SHA51264a76f7d574e7002519b859ebe3c6a1a35fef67d5a856b885c1e260ed0b4c40ca6ef496b585e74902bf354f39ba40243ae407a436cb9d843018168acca00eb2d
-
C:\Users\Admin\AppData\Local\Temp\8f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1.exeFilesize
1.2MB
MD51aad30f76693aa8ec2fd2a9314b02125
SHA1a199494ac4f065578323c1058e0f0cd5df563bc2
SHA2568f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1
SHA512fa2d623b0b33c1f7506209980f4699aa8efb4dc18b25cf97f6871fee209d0de7a79f7b3c63458aa0e49d868446e03d2a0cf59ca47c2eee74c67eeac21d03b31c
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exeFilesize
1.2MB
MD51aad30f76693aa8ec2fd2a9314b02125
SHA1a199494ac4f065578323c1058e0f0cd5df563bc2
SHA2568f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1
SHA512fa2d623b0b33c1f7506209980f4699aa8efb4dc18b25cf97f6871fee209d0de7a79f7b3c63458aa0e49d868446e03d2a0cf59ca47c2eee74c67eeac21d03b31c
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exeFilesize
1.2MB
MD51aad30f76693aa8ec2fd2a9314b02125
SHA1a199494ac4f065578323c1058e0f0cd5df563bc2
SHA2568f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1
SHA512fa2d623b0b33c1f7506209980f4699aa8efb4dc18b25cf97f6871fee209d0de7a79f7b3c63458aa0e49d868446e03d2a0cf59ca47c2eee74c67eeac21d03b31c
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exeFilesize
1.2MB
MD51aad30f76693aa8ec2fd2a9314b02125
SHA1a199494ac4f065578323c1058e0f0cd5df563bc2
SHA2568f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1
SHA512fa2d623b0b33c1f7506209980f4699aa8efb4dc18b25cf97f6871fee209d0de7a79f7b3c63458aa0e49d868446e03d2a0cf59ca47c2eee74c67eeac21d03b31c
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exeFilesize
1.2MB
MD51aad30f76693aa8ec2fd2a9314b02125
SHA1a199494ac4f065578323c1058e0f0cd5df563bc2
SHA2568f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1
SHA512fa2d623b0b33c1f7506209980f4699aa8efb4dc18b25cf97f6871fee209d0de7a79f7b3c63458aa0e49d868446e03d2a0cf59ca47c2eee74c67eeac21d03b31c
-
C:\Users\Admin\AppData\Local\Temp\ovfgrqj.exeFilesize
1.2MB
MD51aad30f76693aa8ec2fd2a9314b02125
SHA1a199494ac4f065578323c1058e0f0cd5df563bc2
SHA2568f9751146aa82a867fc19fdeade6a1c86f68c569b98ef177d4f712e46166f9d1
SHA512fa2d623b0b33c1f7506209980f4699aa8efb4dc18b25cf97f6871fee209d0de7a79f7b3c63458aa0e49d868446e03d2a0cf59ca47c2eee74c67eeac21d03b31c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.JPG.ipiermbFilesize
36KB
MD5f372d1203f81ab37f60353db03c08305
SHA1431a9ed984075d1080ef079b24599ddcb7794e18
SHA256d5edfdd4fc9e03a7089bd1fecd49bf4ca9063dd61fc78a654894cc2186707045
SHA512ae31956e5ad0db59bd2d7cfe5263e36f579d66123f989f361288833f11651400f93d52d1f03249ef5c63c9bcd1510a705532c8382657ca31a3dcf38dee8329dc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\ovfgrqj.exe.logFilesize
312B
MD5023e5d9d5fd0491df718ec4ad9bebd12
SHA13e9f29444256c26d683c0f3544bcb568084ab082
SHA2562c219f3587282c91af23370457b964104edb704f83fa547eb06cdb2f82049b74
SHA5127864f718ecfda36465868e6794ff813c7541071f1179d3c2dc35d4beac1ad86d66decdfe2ed2a9d02338ccf07a51ac9dcf530a4fcdc6db78e8b17084327b394d
-
memory/548-165-0x0000000074290000-0x0000000074841000-memory.dmpFilesize
5.7MB
-
memory/548-162-0x0000000000000000-mapping.dmp
-
memory/548-170-0x0000000074290000-0x0000000074841000-memory.dmpFilesize
5.7MB
-
memory/780-153-0x0000000038200000-0x0000000038277000-memory.dmpFilesize
476KB
-
memory/1988-152-0x0000000000FA0000-0x00000000011EB000-memory.dmpFilesize
2.3MB
-
memory/1988-144-0x0000000000000000-mapping.dmp
-
memory/2740-151-0x00000000742A0000-0x0000000074851000-memory.dmpFilesize
5.7MB
-
memory/3716-141-0x00000000015C0000-0x000000000180B000-memory.dmpFilesize
2.3MB
-
memory/3716-140-0x00000000013A0000-0x00000000015BA000-memory.dmpFilesize
2.1MB
-
memory/3716-139-0x0000000000400000-0x00000000004A5000-memory.dmpFilesize
660KB
-
memory/3716-134-0x0000000000400000-0x00000000004A5000-memory.dmpFilesize
660KB
-
memory/3716-133-0x0000000000000000-mapping.dmp
-
memory/4404-161-0x0000000000000000-mapping.dmp
-
memory/4584-132-0x0000000074E30000-0x00000000753E1000-memory.dmpFilesize
5.7MB
-
memory/4584-138-0x0000000074E30000-0x00000000753E1000-memory.dmpFilesize
5.7MB
-
memory/5036-166-0x0000000000000000-mapping.dmp
-
memory/5036-174-0x00000000019A0000-0x0000000001BEB000-memory.dmpFilesize
2.3MB