Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 16:22
Static task
static1
Behavioral task
behavioral1
Sample
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
Resource
win10v2004-20220901-en
General
-
Target
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe
-
Size
815KB
-
MD5
51ed7e8e341c08280b7a0217f7c39a3f
-
SHA1
079ad2df4a1db02c4170b7d44aaa189f16194fa1
-
SHA256
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
-
SHA512
13c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
SSDEEP
24576:coZle5i/xmrxgxh6UAkNe7bBmGC5MN8XL:dg9yG4Gen
Malware Config
Extracted
C:\Users\Admin\Documents\!Decrypt-All-Files-brkqcsi.txt
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion/
Extracted
C:\ProgramData\yrnkowk.html
http://onja764ig6vah2jo.onion.cab
http://onja764ig6vah2jo.tor2web.org
http://onja764ig6vah2jo.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Executes dropped EXE 4 IoCs
Processes:
dajjvan.exedajjvan.exedajjvan.exedajjvan.exepid process 4860 dajjvan.exe 1192 dajjvan.exe 3876 dajjvan.exe 4840 dajjvan.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dajjvan.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dajjvan.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Drops file in System32 directory 6 IoCs
Processes:
dajjvan.exedajjvan.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\desktop.ini dajjvan.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dajjvan.exe.log dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE dajjvan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies dajjvan.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-brkqcsi.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exedajjvan.exedajjvan.exedescription pid process target process PID 1616 set thread context of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 4860 set thread context of 1192 4860 dajjvan.exe dajjvan.exe PID 3876 set thread context of 4840 3876 dajjvan.exe dajjvan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
dajjvan.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\GPU dajjvan.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" dajjvan.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch dajjvan.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" dajjvan.exe -
Modifies data under HKEY_USERS 20 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000}\MaxCapacity = "15140" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00320033003300390065003000340035002d0030003000300030002d0030003000300030002d0030003000300030002d006400300031003200300030003000300030003000300030007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2339e045-0000-0000-0000-d01200000000}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exedajjvan.exepid process 4812 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 4812 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe 1192 dajjvan.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2056 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
dajjvan.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1192 dajjvan.exe Token: SeDebugPrivilege 1192 dajjvan.exe Token: SeShutdownPrivilege 2056 Explorer.EXE Token: SeCreatePagefilePrivilege 2056 Explorer.EXE Token: SeShutdownPrivilege 2056 Explorer.EXE Token: SeCreatePagefilePrivilege 2056 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
dajjvan.exepid process 4840 dajjvan.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
dajjvan.exepid process 4840 dajjvan.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
dajjvan.exepid process 4840 dajjvan.exe 4840 dajjvan.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exedajjvan.exedajjvan.exesvchost.exedajjvan.exedescription pid process target process PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 1616 wrote to memory of 4812 1616 b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe PID 4860 wrote to memory of 1192 4860 dajjvan.exe dajjvan.exe PID 4860 wrote to memory of 1192 4860 dajjvan.exe dajjvan.exe PID 4860 wrote to memory of 1192 4860 dajjvan.exe dajjvan.exe PID 4860 wrote to memory of 1192 4860 dajjvan.exe dajjvan.exe PID 4860 wrote to memory of 1192 4860 dajjvan.exe dajjvan.exe PID 4860 wrote to memory of 1192 4860 dajjvan.exe dajjvan.exe PID 4860 wrote to memory of 1192 4860 dajjvan.exe dajjvan.exe PID 1192 wrote to memory of 780 1192 dajjvan.exe svchost.exe PID 780 wrote to memory of 2264 780 svchost.exe mousocoreworker.exe PID 780 wrote to memory of 2264 780 svchost.exe mousocoreworker.exe PID 780 wrote to memory of 3344 780 svchost.exe DllHost.exe PID 780 wrote to memory of 3344 780 svchost.exe DllHost.exe PID 1192 wrote to memory of 2056 1192 dajjvan.exe Explorer.EXE PID 1192 wrote to memory of 3876 1192 dajjvan.exe dajjvan.exe PID 1192 wrote to memory of 3876 1192 dajjvan.exe dajjvan.exe PID 1192 wrote to memory of 3876 1192 dajjvan.exe dajjvan.exe PID 3876 wrote to memory of 4840 3876 dajjvan.exe dajjvan.exe PID 3876 wrote to memory of 4840 3876 dajjvan.exe dajjvan.exe PID 3876 wrote to memory of 4840 3876 dajjvan.exe dajjvan.exe PID 3876 wrote to memory of 4840 3876 dajjvan.exe dajjvan.exe PID 3876 wrote to memory of 4840 3876 dajjvan.exe dajjvan.exe PID 3876 wrote to memory of 4840 3876 dajjvan.exe dajjvan.exe PID 3876 wrote to memory of 4840 3876 dajjvan.exe dajjvan.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Drops desktop.ini file(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"C:\Users\Admin\AppData\Local\Temp\b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeC:\Users\Admin\AppData\Local\Temp\dajjvan.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeC:\Users\Admin\AppData\Local\Temp\dajjvan.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exe"C:\Users\Admin\AppData\Local\Temp\dajjvan.exe" -u3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exe"C:\Users\Admin\AppData\Local\Temp\dajjvan.exe" -u4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft OneDrive\akatxdgFilesize
654B
MD5438fbd458985c7da8eb501b3162cd7b5
SHA18f2e29b99c2930ac1db67ed67c607342a025f11b
SHA256a653a6ecf1a8f6b669cc430fc229795e992ebdbf751e42f43d4cb04450ddb610
SHA512862f476e56bd813b0605e0ad1b824d2c1b37d10a35acadf01fc7efb8f0b0d40d4a8af4e05874d51798ae6b10cd50bea1afd37ee8c147b3c695518face382e5cd
-
C:\ProgramData\Microsoft OneDrive\akatxdgFilesize
654B
MD5438fbd458985c7da8eb501b3162cd7b5
SHA18f2e29b99c2930ac1db67ed67c607342a025f11b
SHA256a653a6ecf1a8f6b669cc430fc229795e992ebdbf751e42f43d4cb04450ddb610
SHA512862f476e56bd813b0605e0ad1b824d2c1b37d10a35acadf01fc7efb8f0b0d40d4a8af4e05874d51798ae6b10cd50bea1afd37ee8c147b3c695518face382e5cd
-
C:\ProgramData\Microsoft OneDrive\akatxdgFilesize
654B
MD5cc4ed838fa7a46c34428632e6f168f6d
SHA1f248113f2836767e86f56a0d21e592b592c91df7
SHA25666b5fc436be5ce913c21f3e0c4d50332b6e721299929748bf175cd266b0d6a1d
SHA5127d2986606d738c23d76462837383b87f51b137aa59606b9f6d7a8b3c62a45c7a24ed1eb8d97fad6e2a6aca0c6a4e90401d7b606dc9ea1c7378418137435ed013
-
C:\ProgramData\Microsoft OneDrive\akatxdgFilesize
654B
MD59900252d87369ad6c08696e01e383159
SHA1d875dc52da43ce5f31b84912d713da671bc7dda6
SHA256e67552b2fd42fae67d7de039c62d172e7411d219d7dc0b580c6b0b298b4ed43f
SHA512ebe20e92ca856b88781c6044c3c0650f18d9760a46d9c1a9e0a7cd6919fa3230b14f5e227e2c35d87cd7724e17aaccf06b0441e75201ae715fbd1f3281b27a03
-
C:\ProgramData\Microsoft OneDrive\akatxdgFilesize
654B
MD59900252d87369ad6c08696e01e383159
SHA1d875dc52da43ce5f31b84912d713da671bc7dda6
SHA256e67552b2fd42fae67d7de039c62d172e7411d219d7dc0b580c6b0b298b4ed43f
SHA512ebe20e92ca856b88781c6044c3c0650f18d9760a46d9c1a9e0a7cd6919fa3230b14f5e227e2c35d87cd7724e17aaccf06b0441e75201ae715fbd1f3281b27a03
-
C:\ProgramData\yrnkowk.htmlFilesize
225KB
MD5a3310c0288de46f755b3e07885327396
SHA108b2a92416fa452cf918211b3100023d07b88da4
SHA2565abde51ecb61a099a3209236f7c4ac505540cf4eb03cb7db20d2589aa2343cf4
SHA5123e48e4c3a36aa390871589fb983e58eac434e164cf930850d4a2b3184e55775f38d7a15e9de3217b40c47f5e99c7eb725367d7d3b5dd9f3fa7198b9f0cf45e28
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeFilesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeFilesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeFilesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeFilesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
C:\Users\Admin\AppData\Local\Temp\dajjvan.exeFilesize
815KB
MD551ed7e8e341c08280b7a0217f7c39a3f
SHA1079ad2df4a1db02c4170b7d44aaa189f16194fa1
SHA256b35793f0801b0e787507e04f25f49627b9b2068125df2614e2c98dc35dcb8f0a
SHA51213c810699ca58e17a8a5e2bf36e3eeb5d404d5f740ae833fc06f3bcef3aa3cb01da6d373be07a32e29cc613c09803132b8b1a28928a2ffd35abc60b1918168be
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.JPG.brkqcsiFilesize
36KB
MD5365ddada87d4ccf9456141b0e0cc9756
SHA1623875fbbb4c42d3a68d4cd5cd41a3712614139a
SHA2564db0418c14ae7712a28d60f0a5cdf0286e1b5110e1d32ffdda24a2f499c385ab
SHA5128ba92268bed8691fc86ff1506af8d672f1fa04d4be5f6db589b9d68a6f717bd05e97b70c3724d0eeb9943c51f357590e13a45b953abcfcba96b17d2b99c82e67
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dajjvan.exe.logFilesize
397B
MD5ce4eda6d244da60119efce9ff9131f1d
SHA1534bbbf5eb3096d685a46562793497f404b316cc
SHA2569e49b79135cf5b7c732e862973bb5fb37ddd68a8c7f7cd4c45d70a2e8de54c41
SHA5123e9de662a7d015a6e6651d1b8b40ab67b0ac34b15a7e7842590cf81a64edbc9ae64daecd8ff45096fe751ea7cf4d1f847ba11bf87484c66938e8b81f40dd2e95
-
memory/780-148-0x0000000024380000-0x00000000243F7000-memory.dmpFilesize
476KB
-
memory/1192-147-0x0000000001960000-0x0000000001BAB000-memory.dmpFilesize
2.3MB
-
memory/1192-141-0x0000000000000000-mapping.dmp
-
memory/1616-132-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/1616-137-0x0000000075310000-0x00000000758C1000-memory.dmpFilesize
5.7MB
-
memory/2264-151-0x0000000000000000-mapping.dmp
-
memory/3344-153-0x0000000000000000-mapping.dmp
-
memory/3876-163-0x0000000074770000-0x0000000074D21000-memory.dmpFilesize
5.7MB
-
memory/3876-158-0x0000000000000000-mapping.dmp
-
memory/4812-138-0x00000000017E0000-0x0000000001A2B000-memory.dmpFilesize
2.3MB
-
memory/4812-134-0x0000000000400000-0x00000000004A5000-memory.dmpFilesize
660KB
-
memory/4812-135-0x0000000000400000-0x00000000004A5000-memory.dmpFilesize
660KB
-
memory/4812-136-0x00000000015C0000-0x00000000017DA000-memory.dmpFilesize
2.1MB
-
memory/4812-133-0x0000000000000000-mapping.dmp
-
memory/4840-161-0x0000000000000000-mapping.dmp
-
memory/4840-167-0x0000000001180000-0x00000000013CB000-memory.dmpFilesize
2.3MB
-
memory/4860-146-0x0000000074780000-0x0000000074D31000-memory.dmpFilesize
5.7MB