Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2022 13:16
Static task
static1
Behavioral task
behavioral1
Sample
5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe
Resource
win10v2004-20221111-en
General
-
Target
5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe
-
Size
218KB
-
MD5
16b1904a41d5a106d93914dd3e6e71be
-
SHA1
4f2a08f73cfe51f363760578588b19765eb36ec8
-
SHA256
5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7
-
SHA512
3a75d7d713b6382cc4720003bb8cfc7e2814ad9478ef7d6ded0f5b3bdfc59d6e5a7fda10fab7cd9a2231f57683e199fe7954e0e4ec19fc54c6ff8b42a2928e9a
-
SSDEEP
3072:+NCxFYH1LI/4GHR7uvUZi6eVwCll7c58u7b/fOp2NHCDml:+02VLk40AUQcsc58mHkECa
Malware Config
Extracted
systembc
109.205.214.18:443
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4188-133-0x00000000006F0000-0x00000000006F9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 25 444 rundll32.exe 27 444 rundll32.exe 68 444 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
E4F6.exe2D79.exelsknjp.exepid process 4908 E4F6.exe 3808 2D79.exe 1416 lsknjp.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aic_file_icons_retina_thumb_highContrast_bow\Parameters\ServiceDll = "C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\aic_file_icons_retina_thumb_highContrast_bow.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 4 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aic_file_icons_retina_thumb_highContrast_bow\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalServiceԀ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aic_file_icons_retina_thumb_highContrast_bow\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalServiceᴀ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aic_file_icons_retina_thumb_highContrast_bow\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService␀" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aic_file_icons_retina_thumb_highContrast_bow\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService愀" rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 444 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 444 set thread context of 1936 444 rundll32.exe rundll32.exe -
Drops file in Program Files directory 15 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\AdobePDF417.pmp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Search.api rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\manifest.json rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\base_uris.js rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\manifest.json rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\cef.pak rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\acrobat_pdf.svg rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\create_form.gif rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\AdobePDF417.pmp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Search.api rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\create_form.gif rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\CPDF_Full.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\base_uris.js rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\CPDF_Full.aapp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\aic_file_icons_retina_thumb_highContrast_bow.dll rundll32.exe -
Drops file in Windows directory 2 IoCs
Processes:
2D79.exedescription ioc process File created C:\Windows\Tasks\lsknjp.job 2D79.exe File opened for modification C:\Windows\Tasks\lsknjp.job 2D79.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2344 4908 WerFault.exe E4F6.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe -
Checks processor information in registry 2 TTPs 19 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe -
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 -
Modifies registry class 30 IoCs
Processes:
rundll32.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000094553172100054656d7000003a0009000400efbe6b55586c945532722e00000000000000000000000000000000000000000000000000633cc300540065006d007000000014000000 Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 752 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exepid process 4188 5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe 4188 5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 752 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 752 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exepid process 4188 5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 Token: SeShutdownPrivilege 752 Token: SeCreatePagefilePrivilege 752 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 1936 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pid process 752 752 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
E4F6.exerundll32.exedescription pid process target process PID 752 wrote to memory of 4908 752 E4F6.exe PID 752 wrote to memory of 4908 752 E4F6.exe PID 752 wrote to memory of 4908 752 E4F6.exe PID 4908 wrote to memory of 444 4908 E4F6.exe rundll32.exe PID 4908 wrote to memory of 444 4908 E4F6.exe rundll32.exe PID 4908 wrote to memory of 444 4908 E4F6.exe rundll32.exe PID 752 wrote to memory of 3808 752 2D79.exe PID 752 wrote to memory of 3808 752 2D79.exe PID 752 wrote to memory of 3808 752 2D79.exe PID 444 wrote to memory of 1936 444 rundll32.exe rundll32.exe PID 444 wrote to memory of 1936 444 rundll32.exe rundll32.exe PID 444 wrote to memory of 1936 444 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe"C:\Users\Admin\AppData\Local\Temp\5234114873c908014335c999b048382d2f1e68ef3cf98ff14e30e04a269126f7.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E4F6.exeC:\Users\Admin\AppData\Local\Temp\E4F6.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmp",Wufaiiuuye2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 141303⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 5362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4908 -ip 49081⤵
-
C:\Users\Admin\AppData\Local\Temp\2D79.exeC:\Users\Admin\AppData\Local\Temp\2D79.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\ProgramData\fjgceb\lsknjp.exeC:\ProgramData\fjgceb\lsknjp.exe start1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\aic_file_icons_retina_thumb_highcontrast_bow.dll",TxY5V0Ixcko=2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WindowsPowerShell\Modules\aic_file_icons_retina_thumb_highContrast_bow.dllFilesize
797KB
MD5f66bed060034ad85e2d3d7606d8f33a4
SHA158ecaa5ea7b54c0874dd5159cc6c85898be971f8
SHA256435f7a015f01caacf5e1021d800ef8a49f687d85989c7421fa3e205bc1931f4e
SHA5128d2917a6fb0330a3bac4fe299185e6c545d79053ee93691e7e7f22829dd9a8ac68253df4ed8873d648e087826dde4dd8d3e90071b391f7db371dadb81f19709e
-
C:\ProgramData\fjgceb\lsknjp.exeFilesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038
-
C:\ProgramData\fjgceb\lsknjp.exeFilesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\1527c705-839a-4832-9118-54d4Bd6a0c89_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy.xmlFilesize
2KB
MD5d2d725a3c34b3597b164a038ec06085a
SHA152eb2334afeccafd46b205de0d2c7306cb7b7c8d
SHA25601bc9a89105cebd77ff81b814f794a71cbccf40f4d3e663758e63e202f5e1f00
SHA5126f23fc81a4a5308966892ef880048ff079aec5968af5d6fcc0315c05533d597865b0572d18e0368da4ff85c9136b87a4cb9e878bc28738a18025d576b5a3f306
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\EventStore.dbFilesize
60KB
MD5df1f91f22250f52a1445cdcbf265d1a6
SHA1e7d220ec4c084da76d797efac809f3c03b190706
SHA256a60ec6a0c045b7bdafd193c4d03b57f6f0740bce1c082ed79496a8910679ae4b
SHA512236da8bf2becf5f3c265bb07c32c019dee22882108176487d7ca1e03ef0dd3a147223be1514dd4d395aabf7d0777a35cf2e16d2e58a84787a393c098e64e5319
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Fwroes.tmpFilesize
2.3MB
MD52e4e5bfd0d757cc9bef8fe8703168e7f
SHA121770102e794c82092e4e82bfedd50a5088bb215
SHA2568f1c319ec2a27577699582f741f2b43bd711aa84d45e00641941a64679c64ead
SHA5128dcbdf8cf55b485c26bfdd9a2e33b0e7bc376396abc959892a14425336fa7b77f3472a6ecf1bbac4e45487aa62144a949c1869d5235bca5bb649ba04746eac61
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe.xmlFilesize
843B
MD58a33c96712ba9c043f7a07d4c437a3fd
SHA1dbd78a66c461017ee26a751925f9cecdea2590da
SHA256eb8b0de59dd2efc380f7081af8975f37a83ee72c9c06ef25873f63d224adea1e
SHA5127b9a15d219e4a5cd9146f8e7ae1d7c3b6f843ed060edf52e4928e349edd821a2d527f8f8402f774559f6cf282c83b751f02d2feaf9e040771c07bc4038a59e5a
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\edb.chkFilesize
8KB
MD521340b30b50bf39023c82c3f5f7e2191
SHA1be30fd0676ee73ad765b60a8260b16fbb5aee75b
SHA25644b356799549f16cb20a4bdd111b599c48d8f0ee05441e2a12999fa0e45a9ec4
SHA5124b75fd293d2c659503d59045d5953c1d75d559775effc5babe0d358b15c1805cc4e6709940a647128da2cfbf191d8abee7c0f643b38858a80d6adcb7e66ffcaf
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\ringtones.icoFilesize
50KB
MD58b30e7cbd25f178baac418e9b507b61e
SHA173c93d967571bb88b1bdf33477e7a5f758fc18e9
SHA2560afa2eb896ffe20c5244dd191be791231c8b5b71eff200e75a3150a8e3296f30
SHA5126b0ff7ff67cbb4c8611696273ee16fc5d57b53ea7869e0c97686583d7875faa65f04d7678017628a11420000f8bb869f6dca5fcbefb53b1824443fa73544944d
-
C:\ProgramData\{DFE614B1-1B05-F404-C372-1D93E0034A80}\user.pngFilesize
5KB
MD5d7ee4543371744836d520e0ce24a9ee6
SHA1a6cda6aac3e480b269b9da2bd616bdb4d6fa87f0
SHA25698817a572430813ca4ca2787dab20573f7864c5168ac6912f34d14b49e7bd7c9
SHA512e15b6a50d9d498918a81488bf8d60860027f9a38f4d87e239f1c6e9d20fe4938e75861dad35c69e4087370c18b2cd5b482ab6ca694dfe205d053f1d303d17808
-
C:\Users\Admin\AppData\Local\Temp\2D79.exeFilesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038
-
C:\Users\Admin\AppData\Local\Temp\2D79.exeFilesize
218KB
MD5cdc67700f25eaed1417264c4bdec03d3
SHA156639e9414e6ee8394d940d62778475ddf071290
SHA256fdd4cca0516be799c954e96be26b2d04e42ea0bac1edb00604412914bae2f100
SHA512a2b38a1d4d0cb57532f3feb2efa1fb345c03df9114dfb2dcc93286e19b96eb5e182bd79d070a0e4fccf1980f47effc9b511dbb0074bba69bee80098317e08038
-
C:\Users\Admin\AppData\Local\Temp\E4F6.exeFilesize
1.1MB
MD511bccba197c0008c8d2635448a14541b
SHA13d7792942e6900117547d03d6ccbeac3852e1f45
SHA256f6e7473ec1d725f3f0b05f071f26355d86a480a29f6044f5dfe3210977f286aa
SHA5125f7f0457c7b3d21322db66af1038187d91b3a300b6caa72dc2f3562c0c09dd0de67af6ce974b1c8471a03fed30936d026ac1ea4e253c9a16205edd603b936a8e
-
C:\Users\Admin\AppData\Local\Temp\E4F6.exeFilesize
1.1MB
MD511bccba197c0008c8d2635448a14541b
SHA13d7792942e6900117547d03d6ccbeac3852e1f45
SHA256f6e7473ec1d725f3f0b05f071f26355d86a480a29f6044f5dfe3210977f286aa
SHA5125f7f0457c7b3d21322db66af1038187d91b3a300b6caa72dc2f3562c0c09dd0de67af6ce974b1c8471a03fed30936d026ac1ea4e253c9a16205edd603b936a8e
-
C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
C:\Users\Admin\AppData\Local\Temp\Qsedeqtedeooeo.tmpFilesize
797KB
MD524925b25552a7d8f1d3292071e545920
SHA1f786e1d40df30f6fed0301d60c823b655f2d6eac
SHA2569931503a3ab908d2840dae6a7cb77a5abc5e77cc67af405d1329b7dfc3fe800b
SHA512242dbf94b06e67fdf0aac29b2f38ce4929d156c42e2413565f203cda1fdb6458e34b26eeb0151fe4f1914432be28b16d648affa63f20c7b480c54e2d9360fb26
-
\??\c:\program files (x86)\windowspowershell\modules\aic_file_icons_retina_thumb_highcontrast_bow.dllFilesize
797KB
MD5f66bed060034ad85e2d3d7606d8f33a4
SHA158ecaa5ea7b54c0874dd5159cc6c85898be971f8
SHA256435f7a015f01caacf5e1021d800ef8a49f687d85989c7421fa3e205bc1931f4e
SHA5128d2917a6fb0330a3bac4fe299185e6c545d79053ee93691e7e7f22829dd9a8ac68253df4ed8873d648e087826dde4dd8d3e90071b391f7db371dadb81f19709e
-
memory/444-158-0x0000000005530000-0x0000000005670000-memory.dmpFilesize
1.2MB
-
memory/444-156-0x0000000005530000-0x0000000005670000-memory.dmpFilesize
1.2MB
-
memory/444-149-0x0000000005530000-0x0000000005670000-memory.dmpFilesize
1.2MB
-
memory/444-147-0x0000000005530000-0x0000000005670000-memory.dmpFilesize
1.2MB
-
memory/444-139-0x0000000000000000-mapping.dmp
-
memory/444-162-0x00000000055A9000-0x00000000055AB000-memory.dmpFilesize
8KB
-
memory/444-155-0x0000000005530000-0x0000000005670000-memory.dmpFilesize
1.2MB
-
memory/444-165-0x0000000004CB0000-0x00000000053D5000-memory.dmpFilesize
7.1MB
-
memory/444-157-0x0000000005530000-0x0000000005670000-memory.dmpFilesize
1.2MB
-
memory/444-145-0x0000000004CB0000-0x00000000053D5000-memory.dmpFilesize
7.1MB
-
memory/444-146-0x0000000004CB0000-0x00000000053D5000-memory.dmpFilesize
7.1MB
-
memory/664-183-0x0000000000000000-mapping.dmp
-
memory/1416-169-0x0000000000713000-0x0000000000723000-memory.dmpFilesize
64KB
-
memory/1416-170-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/1464-176-0x0000000003D60000-0x0000000004485000-memory.dmpFilesize
7.1MB
-
memory/1936-159-0x00007FF7BF526890-mapping.dmp
-
memory/1936-160-0x0000020895300000-0x0000020895440000-memory.dmpFilesize
1.2MB
-
memory/1936-163-0x0000000000630000-0x0000000000849000-memory.dmpFilesize
2.1MB
-
memory/1936-161-0x0000020895300000-0x0000020895440000-memory.dmpFilesize
1.2MB
-
memory/1936-164-0x0000020893AC0000-0x0000020893CEA000-memory.dmpFilesize
2.2MB
-
memory/3808-148-0x0000000000000000-mapping.dmp
-
memory/3808-154-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/3808-171-0x00000000005B9000-0x00000000005CA000-memory.dmpFilesize
68KB
-
memory/3808-172-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/3808-168-0x00000000005B9000-0x00000000005CA000-memory.dmpFilesize
68KB
-
memory/3808-152-0x00000000005B9000-0x00000000005CA000-memory.dmpFilesize
68KB
-
memory/3808-153-0x0000000000490000-0x0000000000499000-memory.dmpFilesize
36KB
-
memory/4188-132-0x0000000000788000-0x0000000000799000-memory.dmpFilesize
68KB
-
memory/4188-135-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/4188-134-0x0000000000400000-0x000000000045F000-memory.dmpFilesize
380KB
-
memory/4188-133-0x00000000006F0000-0x00000000006F9000-memory.dmpFilesize
36KB
-
memory/4908-142-0x000000000220E000-0x00000000022FD000-memory.dmpFilesize
956KB
-
memory/4908-143-0x0000000002300000-0x0000000002430000-memory.dmpFilesize
1.2MB
-
memory/4908-136-0x0000000000000000-mapping.dmp
-
memory/4908-144-0x0000000000400000-0x000000000053E000-memory.dmpFilesize
1.2MB