Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-12-2022 09:55
Static task
static1
Behavioral task
behavioral1
Sample
f54e72ec43ba9b6d7dcb039cc2ad48f6.exe
Resource
win7-20220901-en
General
-
Target
f54e72ec43ba9b6d7dcb039cc2ad48f6.exe
-
Size
1.1MB
-
MD5
f54e72ec43ba9b6d7dcb039cc2ad48f6
-
SHA1
4dd3e8194b67d5e594eee18101bee38a69d1343a
-
SHA256
106a8c05bd4fe5807019f19c99c66dd65166442148ab41a482944a06740dca2f
-
SHA512
50e425e51b2fe3a11e35499470c0cb9e571f82a1beff6acf21a061da53f278de362a7dd93b121408cf7a27421ff2a557e59c94943f9b3681dab7e023b64c7c3e
-
SSDEEP
24576:T8Wm0i8kSft6kipJYRYWvFZS1LVb1wkOGM9MiALQ2wFP:PGhSEvARYSZSxBBOxJAQhFP
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 2 1624 rundll32.exe 5 1624 rundll32.exe 9 1624 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ahclient\Parameters\ServiceDll = "C:\\Program Files (x86)\\Windows Sidebar\\Shared Gadgets\\ahclient.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ahclient\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService" rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exesvchost.exepid process 1624 rundll32.exe 1004 svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Desktop.ini rundll32.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini rundll32.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini rundll32.exe File created C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Desktop.ini rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1624 set thread context of 1948 1624 rundll32.exe rundll32.exe -
Drops file in Program Files directory 22 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\acro20.lng rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\acro20.lng rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\abcpy.ini rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\DW20.EXE rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\2d.x3d rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\2d.x3d rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\README.TXT rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\license.html rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\AdobePiStd.otf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGMGPUOptIn.ini rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.lng rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\AdobePiStd.otf rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\CP1250.TXT rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\AdobeUpdater.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\abcpy.ini rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\README.TXT rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeUpdater.dll rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\AGMGPUOptIn.ini rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\ahclient.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 39 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Signature svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform ID svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status svchost.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz svchost.exe -
Modifies registry class 24 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 4c003100000000000000000010004c6f63616c00380008000400efbe00000000000000002a000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 7e0074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbe00000000000000002a000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4a0031000000000000000000102054656d700000360008000400efbe00000000000000002a00000000000000000000000000000000000000000000000000540065006d007000000014000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 1624 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 1948 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f54e72ec43ba9b6d7dcb039cc2ad48f6.exerundll32.exedescription pid process target process PID 1672 wrote to memory of 1624 1672 f54e72ec43ba9b6d7dcb039cc2ad48f6.exe rundll32.exe PID 1672 wrote to memory of 1624 1672 f54e72ec43ba9b6d7dcb039cc2ad48f6.exe rundll32.exe PID 1672 wrote to memory of 1624 1672 f54e72ec43ba9b6d7dcb039cc2ad48f6.exe rundll32.exe PID 1672 wrote to memory of 1624 1672 f54e72ec43ba9b6d7dcb039cc2ad48f6.exe rundll32.exe PID 1672 wrote to memory of 1624 1672 f54e72ec43ba9b6d7dcb039cc2ad48f6.exe rundll32.exe PID 1672 wrote to memory of 1624 1672 f54e72ec43ba9b6d7dcb039cc2ad48f6.exe rundll32.exe PID 1672 wrote to memory of 1624 1672 f54e72ec43ba9b6d7dcb039cc2ad48f6.exe rundll32.exe PID 1624 wrote to memory of 1948 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1948 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1948 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1948 1624 rundll32.exe rundll32.exe PID 1624 wrote to memory of 1948 1624 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f54e72ec43ba9b6d7dcb039cc2ad48f6.exe"C:\Users\Admin\AppData\Local\Temp\f54e72ec43ba9b6d7dcb039cc2ad48f6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 141453⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1948 -
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:1784
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
- Loads dropped DLL
- Checks processor information in registry
PID:1004 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows sidebar\shared gadgets\ahclient.dll",YVoHTTU=2⤵PID:268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Desktop.iniFilesize
1KB
MD56ce9bf045d627596d601b3f3794c7fe0
SHA1c512e26a135a199e276c2a75cdb2651b55d61e8a
SHA256d9de8d9582912455294bd1f34618fde6b366e4d31b003078c85eb4401b99cfdd
SHA51208cc7b04e458144ee1b55a3c42b7a1d4f6eb4d9c68b22da2375247e03ed1e599203d27f9cf27e0fdc57f6e28b8eb307cccb2e2126ab7414c36355477089b81f6
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Fwroes.tmpFilesize
2.3MB
MD5d66ded71651908320cf9feb532b59417
SHA1a4d87bd466e28983aa084ef927a6547a2042717e
SHA25654e3dc0392608540b7ccd86e8d7ac52759c18e42f945dbcb19afad833aef7fcb
SHA51211791f82dd57729f2dc106e37f60a6493245972c565ab2b03513b8b937287e80e65d2a0d0291779b8c4bf95645ff9d2960afb55af8fbfc353d26ddae155f541c
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Fwroes.tmpFilesize
2.3MB
MD5d66ded71651908320cf9feb532b59417
SHA1a4d87bd466e28983aa084ef927a6547a2042717e
SHA25654e3dc0392608540b7ccd86e8d7ac52759c18e42f945dbcb19afad833aef7fcb
SHA51211791f82dd57729f2dc106e37f60a6493245972c565ab2b03513b8b937287e80e65d2a0d0291779b8c4bf95645ff9d2960afb55af8fbfc353d26ddae155f541c
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Help_CValidator.H1DFilesize
11KB
MD515df0c4efe61e89ac34133dffde48d75
SHA1be9773dbefb06cf48b46ec76831c0680f5375cc7
SHA25688f9c30ea167b52d97189e8dc344bc0640f2ad8cac5d63c1434b4c3df4053c07
SHA5124e3f1e3876b4618616a3a98e322ba5abf4304d505790e2231abb78adadc25aa3367da6b8cd64f79b71eb2517f5853736506ea5a3652a0fdee5015352e0799175
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\SGRES.DLL.trx_dllFilesize
12KB
MD5159f81894621fe1eb87ccdc6b30d4b8f
SHA1cb7dc4aebf5ad7cb08b813a8529f2ccf3cd4e1ab
SHA2565b9e694c359df280d69e9df92b5351642148367ac135f036b16539fc3d774355
SHA512b0bb84bf93c9f86a44946bd8932ce274869b8f619ad969eb55cf6584e42c8091fd9a8e07c97d8e6c0bfd350f5940bf47c8bfb9bb7085b153f6e11b905948d316
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\VISINTL.DLL.trx_dllFilesize
462KB
MD513097a116f09601935ab89fdbb604402
SHA16da82026200b90dde4dd61359cf559e2c3c77863
SHA256bc65e3c6f0ca6ffffcf885836f3b9372a8774c47c2bd260158619804cd8b8c5f
SHA512ff60810d07c76badb62fa074d49addd40ab8fb936c4c2a24bf2d1a78f0e9395bbc4de19e5aa4d8e7e5d0234ec3dbc6cd49788f83fa94e1bdf9d933c8d4ab19fd
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\folder.icoFilesize
52KB
MD5bbf9dbdc079c0cd95f78d728aa3912d4
SHA1051f76cc8c6520768bac9559bb329abeebd70d7c
SHA256bef53904908769ceeb60f8e0976c3194e73534f00f4afb65497c2091121b98b2
SHA512af110c52c983f1cf55b3db7d375e03c8c9308e3cf9ee1c154c2b25cb3f8299f0c0ba87b47445f09f98659eb536184c245887a341733c11af713e9ecc15288b5d
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\print_pref.icoFilesize
56KB
MD5a52a082f2b18811deaf3138d27c57af8
SHA1317bf685e50de705818bff26f032e7f593830509
SHA2566b4b668a30271d7853257b5752dc429b39c7b264e77ff3533196e6fd03fbeb88
SHA5120d6f4bbb993b4e9a0069ddd0503ceb45d8a1cc6f6453cc2faf91cb137fa49e15eeaa3d77cb9954cc07701153932da51977d467c54b1e0fcfe74b6670cac47d99
-
C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
\??\c:\program files (x86)\windows sidebar\shared gadgets\ahclient.dllFilesize
797KB
MD5e0d1e0ebf1d0984357037aae57fa19fd
SHA10b866ea0b917481fde547bea710ff9a7522f9e08
SHA2568c0fe5c4827e6e1c959e35c1e33b1bf86f276adbf21351d97cd820593bd4b487
SHA5126467571037bcc76f041d747e5d9ace4b1ae91301cbfb97bad55e0da99c0285c49c100004333987d7054d068dfc51adbe29ccecf0e6721d94262e7c02faa9d59a
-
\Program Files (x86)\Windows Sidebar\Shared Gadgets\ahclient.dllFilesize
797KB
MD5e0d1e0ebf1d0984357037aae57fa19fd
SHA10b866ea0b917481fde547bea710ff9a7522f9e08
SHA2568c0fe5c4827e6e1c959e35c1e33b1bf86f276adbf21351d97cd820593bd4b487
SHA5126467571037bcc76f041d747e5d9ace4b1ae91301cbfb97bad55e0da99c0285c49c100004333987d7054d068dfc51adbe29ccecf0e6721d94262e7c02faa9d59a
-
\Program Files (x86)\Windows Sidebar\Shared Gadgets\ahclient.dllFilesize
797KB
MD5e0d1e0ebf1d0984357037aae57fa19fd
SHA10b866ea0b917481fde547bea710ff9a7522f9e08
SHA2568c0fe5c4827e6e1c959e35c1e33b1bf86f276adbf21351d97cd820593bd4b487
SHA5126467571037bcc76f041d747e5d9ace4b1ae91301cbfb97bad55e0da99c0285c49c100004333987d7054d068dfc51adbe29ccecf0e6721d94262e7c02faa9d59a
-
\Program Files (x86)\Windows Sidebar\Shared Gadgets\ahclient.dllFilesize
797KB
MD5e0d1e0ebf1d0984357037aae57fa19fd
SHA10b866ea0b917481fde547bea710ff9a7522f9e08
SHA2568c0fe5c4827e6e1c959e35c1e33b1bf86f276adbf21351d97cd820593bd4b487
SHA5126467571037bcc76f041d747e5d9ace4b1ae91301cbfb97bad55e0da99c0285c49c100004333987d7054d068dfc51adbe29ccecf0e6721d94262e7c02faa9d59a
-
\Program Files (x86)\Windows Sidebar\Shared Gadgets\ahclient.dllFilesize
797KB
MD5e0d1e0ebf1d0984357037aae57fa19fd
SHA10b866ea0b917481fde547bea710ff9a7522f9e08
SHA2568c0fe5c4827e6e1c959e35c1e33b1bf86f276adbf21351d97cd820593bd4b487
SHA5126467571037bcc76f041d747e5d9ace4b1ae91301cbfb97bad55e0da99c0285c49c100004333987d7054d068dfc51adbe29ccecf0e6721d94262e7c02faa9d59a
-
\Program Files (x86)\Windows Sidebar\Shared Gadgets\ahclient.dllFilesize
797KB
MD5e0d1e0ebf1d0984357037aae57fa19fd
SHA10b866ea0b917481fde547bea710ff9a7522f9e08
SHA2568c0fe5c4827e6e1c959e35c1e33b1bf86f276adbf21351d97cd820593bd4b487
SHA5126467571037bcc76f041d747e5d9ace4b1ae91301cbfb97bad55e0da99c0285c49c100004333987d7054d068dfc51adbe29ccecf0e6721d94262e7c02faa9d59a
-
\Program Files\Mozilla Firefox\firefox.exeFilesize
562KB
MD5d388df6ed5ccbf1acdeda5af2d18cb0b
SHA1124d3c2ba93644ac6c2d7253de242b46be836692
SHA2568bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606
SHA512f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234
-
\Program Files\Mozilla Firefox\firefox.exeFilesize
562KB
MD5d388df6ed5ccbf1acdeda5af2d18cb0b
SHA1124d3c2ba93644ac6c2d7253de242b46be836692
SHA2568bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606
SHA512f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234
-
\Program Files\Mozilla Firefox\firefox.exeFilesize
562KB
MD5d388df6ed5ccbf1acdeda5af2d18cb0b
SHA1124d3c2ba93644ac6c2d7253de242b46be836692
SHA2568bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606
SHA512f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234
-
\Program Files\Mozilla Firefox\firefox.exeFilesize
562KB
MD5d388df6ed5ccbf1acdeda5af2d18cb0b
SHA1124d3c2ba93644ac6c2d7253de242b46be836692
SHA2568bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606
SHA512f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234
-
\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
memory/268-102-0x0000000003B10000-0x0000000004235000-memory.dmpFilesize
7.1MB
-
memory/268-106-0x0000000003B10000-0x0000000004235000-memory.dmpFilesize
7.1MB
-
memory/268-104-0x0000000003B10000-0x0000000004235000-memory.dmpFilesize
7.1MB
-
memory/268-96-0x0000000000000000-mapping.dmp
-
memory/1004-86-0x0000000003BA0000-0x00000000042C5000-memory.dmpFilesize
7.1MB
-
memory/1004-112-0x0000000003BA0000-0x00000000042C5000-memory.dmpFilesize
7.1MB
-
memory/1004-105-0x0000000003BA0000-0x00000000042C5000-memory.dmpFilesize
7.1MB
-
memory/1004-88-0x0000000003BA0000-0x00000000042C5000-memory.dmpFilesize
7.1MB
-
memory/1624-68-0x0000000004470000-0x00000000045B0000-memory.dmpFilesize
1.2MB
-
memory/1624-72-0x0000000004470000-0x00000000045B0000-memory.dmpFilesize
1.2MB
-
memory/1624-65-0x0000000004910000-0x0000000005035000-memory.dmpFilesize
7.1MB
-
memory/1624-63-0x0000000004910000-0x0000000005035000-memory.dmpFilesize
7.1MB
-
memory/1624-69-0x0000000004470000-0x00000000045B0000-memory.dmpFilesize
1.2MB
-
memory/1624-73-0x0000000004470000-0x00000000045B0000-memory.dmpFilesize
1.2MB
-
memory/1624-66-0x0000000004910000-0x0000000005035000-memory.dmpFilesize
7.1MB
-
memory/1624-74-0x0000000004470000-0x00000000045B0000-memory.dmpFilesize
1.2MB
-
memory/1624-56-0x0000000000000000-mapping.dmp
-
memory/1624-81-0x0000000004910000-0x0000000005035000-memory.dmpFilesize
7.1MB
-
memory/1624-67-0x0000000004470000-0x00000000045B0000-memory.dmpFilesize
1.2MB
-
memory/1672-59-0x0000000001EF0000-0x0000000002020000-memory.dmpFilesize
1.2MB
-
memory/1672-55-0x0000000075111000-0x0000000075113000-memory.dmpFilesize
8KB
-
memory/1672-54-0x00000000005B0000-0x000000000069E000-memory.dmpFilesize
952KB
-
memory/1672-57-0x00000000005B0000-0x000000000069E000-memory.dmpFilesize
952KB
-
memory/1672-60-0x0000000000400000-0x0000000000531000-memory.dmpFilesize
1.2MB
-
memory/1784-111-0x0000000000000000-mapping.dmp
-
memory/1948-76-0x0000000002140000-0x0000000002280000-memory.dmpFilesize
1.2MB
-
memory/1948-77-0x0000000002140000-0x0000000002280000-memory.dmpFilesize
1.2MB
-
memory/1948-79-0x00000000000F0000-0x0000000000309000-memory.dmpFilesize
2.1MB
-
memory/1948-80-0x0000000001F10000-0x000000000213A000-memory.dmpFilesize
2.2MB
-
memory/1948-75-0x00000000FF1A3CEC-mapping.dmp
-
memory/1948-78-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmpFilesize
8KB
-
memory/1948-70-0x00000000000F0000-0x0000000000309000-memory.dmpFilesize
2.1MB