Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 16:22
Static task
static1
Behavioral task
behavioral1
Sample
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe
Resource
win7-20220812-en
General
-
Target
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe
-
Size
878KB
-
MD5
72d1a18668b9c354bec0c1f4bb282503
-
SHA1
940cb647752ed13c34ea021f7617312960a61e35
-
SHA256
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3
-
SHA512
91f1dfccb4b12ac2a46876da7422ec20865fd00c91ca06a2288cfe85787794b3b81bdd6bfc0f6a78ef70dfe1e2cf8112c94efc4f7b78d4318f99762d3f6a49a1
-
SSDEEP
768:UfQf38+WbFafW237K6DpM38IDq+R6qc1CUMXfptSX5ItFaOT8MOrhI:Ub8MOy
Malware Config
Extracted
asyncrat
0.5.7B
Default
asdfdsg.duckdns.org:8050
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe\"" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe = "0" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe = "0" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1276-79-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1276-80-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1276-81-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1276-82-0x000000000040C73E-mapping.dmp asyncrat behavioral1/memory/1276-84-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1276-86-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Drops startup file 2 IoCs
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe = "0" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe = "0" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe" 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exepid process 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription pid process target process PID 1752 set thread context of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1616 1752 WerFault.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 976 timeout.exe -
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exe97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exepid process 520 powershell.exe 1708 powershell.exe 1972 powershell.exe 1380 powershell.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exe97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exepowershell.exedescription pid process Token: SeDebugPrivilege 520 powershell.exe Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe Token: SeDebugPrivilege 1380 powershell.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.execmd.exedescription pid process target process PID 1752 wrote to memory of 520 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 520 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 520 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 520 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1708 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1708 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1708 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1708 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1972 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1972 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1972 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1972 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1380 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1380 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1380 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 1380 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe powershell.exe PID 1752 wrote to memory of 432 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe cmd.exe PID 1752 wrote to memory of 432 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe cmd.exe PID 1752 wrote to memory of 432 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe cmd.exe PID 1752 wrote to memory of 432 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe cmd.exe PID 432 wrote to memory of 976 432 cmd.exe timeout.exe PID 432 wrote to memory of 976 432 cmd.exe timeout.exe PID 432 wrote to memory of 976 432 cmd.exe timeout.exe PID 432 wrote to memory of 976 432 cmd.exe timeout.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1276 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe PID 1752 wrote to memory of 1616 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe WerFault.exe PID 1752 wrote to memory of 1616 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe WerFault.exe PID 1752 wrote to memory of 1616 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe WerFault.exe PID 1752 wrote to memory of 1616 1752 97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe"C:\Users\Admin\AppData\Local\Temp\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe"1⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe"C:\Users\Admin\AppData\Local\Temp\97de910f99c0d563605040f89beb13ca559618e7a3572d57ec430cdc861761c3.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 19122⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5e8930ac329dc85a69d9fe3ebb63f0fc2
SHA16e758a818a12f2761c10698e897f5e4c52af87eb
SHA256225d7dde585f899932779bd4dabf2c002a0e0d5f76e4f24a2520e8144845da28
SHA51200bececc1d6b7c6ddaeb2f654c0dde7691cb13fcce8ff0f2c20dbbb7239dfe19ffa8a65e03ce6df37e18a26773b5ecf8907db41622336871e43b87dea674c9ef
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5e8930ac329dc85a69d9fe3ebb63f0fc2
SHA16e758a818a12f2761c10698e897f5e4c52af87eb
SHA256225d7dde585f899932779bd4dabf2c002a0e0d5f76e4f24a2520e8144845da28
SHA51200bececc1d6b7c6ddaeb2f654c0dde7691cb13fcce8ff0f2c20dbbb7239dfe19ffa8a65e03ce6df37e18a26773b5ecf8907db41622336871e43b87dea674c9ef
-
memory/432-74-0x0000000000000000-mapping.dmp
-
memory/520-57-0x0000000000000000-mapping.dmp
-
memory/520-73-0x000000006F8F0000-0x000000006FE9B000-memory.dmpFilesize
5.7MB
-
memory/520-68-0x000000006F8F0000-0x000000006FE9B000-memory.dmpFilesize
5.7MB
-
memory/976-75-0x0000000000000000-mapping.dmp
-
memory/1276-76-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1276-82-0x000000000040C73E-mapping.dmp
-
memory/1276-79-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1276-77-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1276-86-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1276-84-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1276-81-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1276-80-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1380-64-0x0000000000000000-mapping.dmp
-
memory/1380-72-0x000000006F8F0000-0x000000006FE9B000-memory.dmpFilesize
5.7MB
-
memory/1616-87-0x0000000000000000-mapping.dmp
-
memory/1708-58-0x0000000000000000-mapping.dmp
-
memory/1708-71-0x000000006F8F0000-0x000000006FE9B000-memory.dmpFilesize
5.7MB
-
memory/1708-69-0x000000006F8F0000-0x000000006FE9B000-memory.dmpFilesize
5.7MB
-
memory/1752-56-0x00000000002E0000-0x0000000000308000-memory.dmpFilesize
160KB
-
memory/1752-54-0x0000000000DD0000-0x0000000000EB0000-memory.dmpFilesize
896KB
-
memory/1752-55-0x0000000076261000-0x0000000076263000-memory.dmpFilesize
8KB
-
memory/1972-70-0x000000006F8F0000-0x000000006FE9B000-memory.dmpFilesize
5.7MB
-
memory/1972-59-0x0000000000000000-mapping.dmp
-
memory/1972-67-0x000000006F8F0000-0x000000006FE9B000-memory.dmpFilesize
5.7MB