Resubmissions
08-04-2024 13:45
240408-q2dpsaae25 1021-11-2023 22:21
231121-196ewagh72 1021-11-2023 22:20
231121-183ycshf5y 1021-11-2023 22:06
231121-1z2c6sgh38 1027-08-2023 18:38
230827-w98ssaee5z 1001-06-2023 22:35
230601-2h4yeagg74 1021-04-2023 17:56
230421-whz2kahb76 1016-04-2023 14:28
230416-rtht7sad45 1016-04-2023 14:28
230416-rs4qaaca91 116-04-2023 14:22
230416-rpvyzaad38 10Analysis
-
max time kernel
337s -
max time network
473s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-02-2023 18:49
Static task
static1
Behavioral task
behavioral1
Sample
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
Resource
win7-20230220-en
General
-
Target
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
-
Size
1.2MB
-
MD5
5b3b6822964b4151c6200ecd89722a86
-
SHA1
ce7a11dae532b2ade1c96619bbdc8a8325582049
-
SHA256
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34
-
SHA512
2f0d99af35c326cf46810c7421325deb55ae7ca36a8edc2716a3d32d9e6769e0d374581a98912e22fceeb6973e972463ed8b2fa4d4399043c443fa100dfd17b0
-
SSDEEP
24576:5yY4YriuQJ5X4SuIcmuBLahxwUzN1YyqoVKucvTNLF9:sY4FuIahGxRMoobNLF
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
funka
193.233.20.20:4134
-
auth_value
cdb395608d7ec633dce3d2f0c7fb0741
Signatures
-
Processes:
iwN36Rn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iwN36Rn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iwN36Rn.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Explorer.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
Processes:
resource yara_rule behavioral1/memory/1512-113-0x00000000022E0000-0x0000000002326000-memory.dmp family_redline behavioral1/memory/1512-117-0x0000000002370000-0x00000000023B4000-memory.dmp family_redline behavioral1/memory/1512-118-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-119-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-121-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-123-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-125-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-127-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-129-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-135-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-139-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-143-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-145-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-149-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-153-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-157-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-159-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-161-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-163-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-167-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-169-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-173-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-175-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-179-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-181-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-177-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-171-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-165-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-155-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-151-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-147-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-141-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-137-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-133-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-131-0x0000000002370000-0x00000000023AE000-memory.dmp family_redline behavioral1/memory/1512-1024-0x0000000004DF0000-0x0000000004E30000-memory.dmp family_redline behavioral1/memory/1512-1028-0x0000000004DF0000-0x0000000004E30000-memory.dmp family_redline -
Modifies Installed Components in the registry 2 TTPs 20 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED}\Locale = "EN" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{89B4C1CD-B018-4511-B0A1-5476DBF70820} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}\Version = "6,1,7601,17514" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}\Username = "CACA SHEEP" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\Version = "12,0,7601,17514" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4340}\Locale = "en" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Version = "11,0,9600,0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\Locale = "*" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\Locale = "EN" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED} Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED}\Version = "1,1,1,9" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4340}\Version = "6,1,7601,17514" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C}\Locale = "*" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4340} Explorer.EXE -
Drops startup file 2 IoCs
Processes:
regsvr32.exeregsvr32.exedescription ioc process File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini regsvr32.exe -
Executes dropped EXE 6 IoCs
Processes:
sbO31En07.exesmS09II74.exeslc39Ad82.exesko86jV13.exeiwN36Rn.exekLG98Ei.exepid process 2044 sbO31En07.exe 540 smS09II74.exe 1616 slc39Ad82.exe 1240 sko86jV13.exe 1540 iwN36Rn.exe 1512 kLG98Ei.exe -
Loads dropped DLL 12 IoCs
Processes:
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exesbO31En07.exesmS09II74.exeslc39Ad82.exesko86jV13.exekLG98Ei.exepid process 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe 2044 sbO31En07.exe 2044 sbO31En07.exe 540 smS09II74.exe 540 smS09II74.exe 1616 slc39Ad82.exe 1616 slc39Ad82.exe 1240 sko86jV13.exe 1240 sko86jV13.exe 1240 sko86jV13.exe 1240 sko86jV13.exe 1512 kLG98Ei.exe -
Processes:
iwN36Rn.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features iwN36Rn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iwN36Rn.exe -
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exesko86jV13.exesmS09II74.exeslc39Ad82.exesidebar.exesbO31En07.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" sko86jV13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" smS09II74.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce slc39Ad82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" slc39Ad82.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce sko86jV13.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Windows\CurrentVersion\Run sidebar.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce sbO31En07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sbO31En07.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce smS09II74.exe -
Drops desktop.ini file(s) 53 IoCs
Processes:
unregmp2.exeregsvr32.exeregsvr32.exeExplorer.EXEie4uinit.exeWinMail.exeunregmp2.exemctadmin.exeregsvr32.exeWinMail.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini unregmp2.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Explorer.EXE File opened for modification C:\Users\CACA SHEEP\Contacts\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Downloads\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini ie4uinit.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Favorites\Links\desktop.ini ie4uinit.exe File opened for modification C:\Users\CACA SHEEP\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Favorites\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Saved Games\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Favorites\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Links\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Contacts\desktop.ini WinMail.exe File opened for modification C:\Users\CACA SHEEP\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Searches\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Links\desktop.ini regsvr32.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini unregmp2.exe File opened for modification C:\Users\CACA SHEEP\Contacts\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Favorites\Links for United States\desktop.ini mctadmin.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-3430344531-3702557399-3004411149-1001\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Explorer.EXE File created C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini WinMail.exe File opened for modification C:\Users\CACA SHEEP\Saved Games\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Desktop\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Downloads\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Desktop\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Videos\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Documents\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini ie4uinit.exe File opened for modification C:\Users\CACA SHEEP\Music\desktop.ini regsvr32.exe File opened for modification C:\Users\Public\Pictures\desktop.ini regsvr32.exe File opened for modification C:\Users\CACA SHEEP\Searches\desktop.ini regsvr32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
unregmp2.exeunregmp2.exedescription ioc process File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\F: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\F: unregmp2.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
regsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Control Panel\Desktop\Wallpaper = "C:\\Users\\CACA SHEEP\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Control Panel\Desktop\Wallpaper = "C:\\Users\\CACA SHEEP\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" regsvr32.exe -
Drops file in Program Files directory 9 IoCs
Processes:
ie4uinit.exerundll32.exedescription ioc process File opened for modification C:\Program Files\Uninstall Information\IE UserData NT\IE UserData NT.DAT ie4uinit.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT ie4uinit.exe File opened for modification C:\Program Files\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI ie4uinit.exe File opened for modification C:\Program Files\Uninstall Information\mshtml.Install\mshtml.Install.DAT rundll32.exe File opened for modification C:\Program Files\Uninstall Information\mshtml.Install\mshtml.Install.INI rundll32.exe File created C:\Program Files (x86)\Internet Explorer\Signup\TMP4352$.TMP ie4uinit.exe File opened for modification C:\Program Files\Uninstall Information\IE UserData NT\IE UserData NT.INI ie4uinit.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT ie4uinit.exe File opened for modification C:\Program Files\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI ie4uinit.exe -
Drops file in Windows directory 4 IoCs
Processes:
ie4uinit.exerundll32.exeExplorer.EXEdescription ioc process File opened for modification C:\Windows\INF\setupapi.app.log ie4uinit.exe File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe Explorer.EXE File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Explorer.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
runonce.exeExplorer.EXErunonce.exerunonce.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.EXE Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Enumerates system info in registry 2 TTPs 35 IoCs
Processes:
csrss.exechrome.exedescription ioc process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Configuration Data csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Configuration Data csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Identifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\0\KeyboardController\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\MultifunctionAdapter\1\KeyboardController csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Configuration Data csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Identifier csrss.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
Processes:
ie4uinit.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" ie4uinit.exe -
Processes:
ie4uinit.exeunregmp2.exeunregmp2.exerundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\24\IEPropFontName = "MS PGothic" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\26\IEPropFontName = "Simsun" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\29 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\Search Page = "http://go.microsoft.com/fwlink/?LinkId=54896" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\InternetRegistry ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\6 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\12\IEPropFontName = "Raavi" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\13\IEFixedFontName = "Shruti" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Settings\Text Color = "0,0,0" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\33 ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EmbedExtnToClsidMappings\.wax unregmp2.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EmbedExtnToClsidMappings\.wmx unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\3\IEFixedFontName = "Courier New" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\14 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\5\IEPropFontName = "Times New Roman" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\17\IEFixedFontName = "Tunga" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\33\IEPropFontName = "Segoe UI Symbol" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\SOFTWARE\Microsoft\Internet Explorer\Main ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EmbedExtnToClsidMappings\.wmd unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\15 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\Local Page = "C:\\Windows\\system32\\blank.htm" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EmbedExtnToClsidMappings\.wmx unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\37 ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\XMLHTTP = "1" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\NoUpdateCheck = "1" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Settings\Anchor Color Visited = "128,0,128" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\IntelliForms ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\9\IEPropFontName = "Times New Roman" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\22\IEPropFontName = "Sylfaen" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\25\IEPropFontName = "PMingLiu" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Document Windows\Maximized = "no" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\SOFTWARE\Microsoft\Internet Explorer\Services ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\SOFTWARE\Microsoft\Internet Explorer\TypedURLs ie4uinit.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Document Windows\height = 00000000 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\25\IEFixedFontName = "MingLiu" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\37\IEPropFontName = "Khmer UI" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\38\IEFixedFontName = "MV Boli" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\39 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\16 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\30\IEFixedFontName = "Microsoft Yi Baiti" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\SOFTWARE\Microsoft\Internet Explorer\Document Windows ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Security\Safety Warning Level = "Query" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\17\IEPropFontName = "Tunga" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\22 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\31\IEFixedFontName = "Segoe UI Symbol" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\URLSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497} ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\38 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\3 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\14\IEPropFontName = "Kalinga" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\20 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\23\IEPropFontName = "Gulim" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\32 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EmbedExtnToClsidMappings\.wmz unregmp2.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\10 ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\13 ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\27\IEPropFontName = "Nyala" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\21\IEFixedFontName = "Microsoft Himalaya" ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\39\IEPropFontName = "Mongolian Baiti" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\International\Scripts\4 ie4uinit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
ie4uinit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1001\Software\Microsoft\Internet Explorer\Main\Start Page = "http://go.microsoft.com/fwlink/p/?LinkId=255141" ie4uinit.exe -
Modifies data under HKEY_USERS 9 IoCs
Processes:
winlogon.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MuiCached\MachinePreferredUILanguages = 65006e002d00550053000000 winlogon.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ThemeManager winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LoadedBefore = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastLoadedDPI = "96" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ColorName = "NormalColor" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\ThemeActive = "1" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\LastUserLangID = "1033" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\DllName = "%SystemRoot%\\resources\\themes\\Aero\\Aero.msstyles" winlogon.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\ThemeManager\SizeName = "NormalSize" winlogon.exe -
Modifies registry class 64 IoCs
Processes:
unregmp2.exeunregmp2.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\image\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-ms-wmd unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mpegurl\Extension = ".m3u" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mod\OpenWithProgIds unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.ADTS\OpenWithProgIds\WMP11.AssocFile.ADTS = "0" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.MOD\MP2.Last = "Custom" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shellex\ContextMenuHandlers\PlayTo unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WMS\ = "WMP11.AssocFile.WMS" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\wmplayer.exe\SupportedTypes\.wmv unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/x-msvideo\Extension = ".avi" unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.m4v\OpenWithProgIds\WMP11.AssocFile.MP4 = "0" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mov unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shell\Play\command unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mp3\Extension = ".mp3" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/3gpp2\Extension = ".3g2" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aif unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\command\DelegateExecute = "{45597c98-80f6-4549-84ff-752cf55e2d29}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/quicktime\Extension = ".mov" unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.mpv2\OpenWithProgIds\WMP11.AssocFile.MPEG = "0" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx\ContextMenuHandlers\{17FC1A80-140E-4290-A64F-4A29A951A867} unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mpeg unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/x-mpeg2a\CLSID = "{cd3afa89-b84f-48f0-9393-7edc34128127}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dvr-ms unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mp2v\OpenWithProgIds unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/vnd.dlna.mpeg-tts\CLSID = "{cd3afa9b-b84f-48f0-9393-7edc34128127}" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NetworkExplorerPlugins\urn:schemas-upnp-org:device:MediaRenderer:1\ShellEx\ContextMenuHandlers\{17FC1A80-140E-4290-A64F-4A29A951A867} unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\Directory.Video\shell\Enqueue\NeverDefault unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP11.AssocFile.3GP unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shell\Play\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/3gpp2\CLSID = "{cd3afa98-b84f-48f0-9393-7edc34128127}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wma\MP2.Last = "Custom" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WMD\ = "WMP11.AssocFile.WMD" unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.mp4\OpenWithProgIds\WMP11.AssocFile.MP4 = "0" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wms unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/3gpp2 unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.3gpp\OpenWithProgIds\WMP11.AssocFile.3GP = "0" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mid unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mp3\CLSID = "{cd3afa76-b84f-48f0-9393-7edc34128127}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mpegurl\Extension = ".m3u" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/x-mp3 unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\wmplayer.exe\SupportedTypes\.mod unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tts\OpenWithProgIds unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/vnd.ms-wpl\Extension = ".wpl" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP11.AssocFile.WMD unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP11.AssocFile.WMZ unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/3gpp2\Extension = ".3g2" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP11.AssocFile.ASX unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.midi\OpenWithProgIds\WMP11.AssocFile.MIDI = "0" unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.wpl\OpenWithProgIds\WMP11.AssocFile.WPL = "0" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shell\Play\command\DelegateExecute = "{ed1d0fdf-4414-470a-a56d-cfb68623fc58}" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AAC\MP2.Last = "Custom" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\wmplayer.exe\SupportedTypes\.au unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.TS\MP2.Last = "Custom" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/midi unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.m3u\OpenWithProgIds unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\video\shell\Enqueue\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9800" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/x-ms-wvx unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Stack.Audio\shell\Enqueue\NeverDefault unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\video/mpg\CLSID = "{cd3afa89-b84f-48f0-9393-7edc34128127}" unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WMP11.AssocFile.ASF\PreferExecuteOnMismatch = "1" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WMS\ = "WMP11.AssocFile.WMS" unregmp2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP11.AssocFile.WAX unregmp2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\.wm\OpenWithProgIds\WMP11.AssocFile.ASF = "0" unregmp2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\audio/mp4\Extension = ".m4a" unregmp2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
iwN36Rn.exechrome.exepid process 1540 iwN36Rn.exe 1540 iwN36Rn.exe 1852 chrome.exe 1852 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2028 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
iwN36Rn.exeAUDIODG.EXEkLG98Ei.exeLogonUI.exewinlogon.exeWinMail.exeie4uinit.exerundll32.exeWinMail.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1540 iwN36Rn.exe Token: 33 2012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2012 AUDIODG.EXE Token: 33 2012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2012 AUDIODG.EXE Token: SeDebugPrivilege 1512 kLG98Ei.exe Token: SeShutdownPrivilege 1952 LogonUI.exe Token: SeShutdownPrivilege 1952 LogonUI.exe Token: SeShutdownPrivilege 1952 LogonUI.exe Token: SeSecurityPrivilege 1640 winlogon.exe Token: SeBackupPrivilege 1640 winlogon.exe Token: SeSecurityPrivilege 1640 winlogon.exe Token: SeTcbPrivilege 1640 winlogon.exe Token: SeShutdownPrivilege 1952 LogonUI.exe Token: SeSecurityPrivilege 1640 winlogon.exe Token: SeBackupPrivilege 1640 winlogon.exe Token: SeSecurityPrivilege 1640 winlogon.exe Token: SeSecurityPrivilege 1640 winlogon.exe Token: SeBackupPrivilege 1640 winlogon.exe Token: SeSecurityPrivilege 1640 winlogon.exe Token: SeManageVolumePrivilege 1488 WinMail.exe Token: SeRestorePrivilege 1792 ie4uinit.exe Token: SeRestorePrivilege 1792 ie4uinit.exe Token: SeRestorePrivilege 1792 ie4uinit.exe Token: SeRestorePrivilege 1792 ie4uinit.exe Token: SeRestorePrivilege 1792 ie4uinit.exe Token: SeRestorePrivilege 1792 ie4uinit.exe Token: SeRestorePrivilege 1792 ie4uinit.exe Token: SeRestorePrivilege 1696 rundll32.exe Token: SeRestorePrivilege 1696 rundll32.exe Token: SeRestorePrivilege 1696 rundll32.exe Token: SeRestorePrivilege 1696 rundll32.exe Token: SeRestorePrivilege 1696 rundll32.exe Token: SeRestorePrivilege 1696 rundll32.exe Token: SeRestorePrivilege 1696 rundll32.exe Token: SeManageVolumePrivilege 1264 WinMail.exe Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeSecurityPrivilege 2028 Explorer.EXE Token: SeTakeOwnershipPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeSecurityPrivilege 2028 Explorer.EXE Token: SeTakeOwnershipPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE Token: SeShutdownPrivilege 2028 Explorer.EXE -
Suspicious use of FindShellTrayWindow 31 IoCs
Processes:
Explorer.EXEchrome.exepid process 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 1852 chrome.exe -
Suspicious use of SendNotifyMessage 57 IoCs
Processes:
Explorer.EXEpid process 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE 2028 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WinMail.exeWinMail.exepid process 1488 WinMail.exe 1264 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exesbO31En07.exesmS09II74.exeslc39Ad82.exesko86jV13.execsrss.exewinlogon.exeuserinit.exedescription pid process target process PID 1712 wrote to memory of 2044 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 1712 wrote to memory of 2044 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 1712 wrote to memory of 2044 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 1712 wrote to memory of 2044 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 1712 wrote to memory of 2044 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 1712 wrote to memory of 2044 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 1712 wrote to memory of 2044 1712 106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe sbO31En07.exe PID 2044 wrote to memory of 540 2044 sbO31En07.exe smS09II74.exe PID 2044 wrote to memory of 540 2044 sbO31En07.exe smS09II74.exe PID 2044 wrote to memory of 540 2044 sbO31En07.exe smS09II74.exe PID 2044 wrote to memory of 540 2044 sbO31En07.exe smS09II74.exe PID 2044 wrote to memory of 540 2044 sbO31En07.exe smS09II74.exe PID 2044 wrote to memory of 540 2044 sbO31En07.exe smS09II74.exe PID 2044 wrote to memory of 540 2044 sbO31En07.exe smS09II74.exe PID 540 wrote to memory of 1616 540 smS09II74.exe slc39Ad82.exe PID 540 wrote to memory of 1616 540 smS09II74.exe slc39Ad82.exe PID 540 wrote to memory of 1616 540 smS09II74.exe slc39Ad82.exe PID 540 wrote to memory of 1616 540 smS09II74.exe slc39Ad82.exe PID 540 wrote to memory of 1616 540 smS09II74.exe slc39Ad82.exe PID 540 wrote to memory of 1616 540 smS09II74.exe slc39Ad82.exe PID 540 wrote to memory of 1616 540 smS09II74.exe slc39Ad82.exe PID 1616 wrote to memory of 1240 1616 slc39Ad82.exe sko86jV13.exe PID 1616 wrote to memory of 1240 1616 slc39Ad82.exe sko86jV13.exe PID 1616 wrote to memory of 1240 1616 slc39Ad82.exe sko86jV13.exe PID 1616 wrote to memory of 1240 1616 slc39Ad82.exe sko86jV13.exe PID 1616 wrote to memory of 1240 1616 slc39Ad82.exe sko86jV13.exe PID 1616 wrote to memory of 1240 1616 slc39Ad82.exe sko86jV13.exe PID 1616 wrote to memory of 1240 1616 slc39Ad82.exe sko86jV13.exe PID 1240 wrote to memory of 1540 1240 sko86jV13.exe iwN36Rn.exe PID 1240 wrote to memory of 1540 1240 sko86jV13.exe iwN36Rn.exe PID 1240 wrote to memory of 1540 1240 sko86jV13.exe iwN36Rn.exe PID 1240 wrote to memory of 1540 1240 sko86jV13.exe iwN36Rn.exe PID 1240 wrote to memory of 1540 1240 sko86jV13.exe iwN36Rn.exe PID 1240 wrote to memory of 1540 1240 sko86jV13.exe iwN36Rn.exe PID 1240 wrote to memory of 1540 1240 sko86jV13.exe iwN36Rn.exe PID 1240 wrote to memory of 1512 1240 sko86jV13.exe kLG98Ei.exe PID 1240 wrote to memory of 1512 1240 sko86jV13.exe kLG98Ei.exe PID 1240 wrote to memory of 1512 1240 sko86jV13.exe kLG98Ei.exe PID 1240 wrote to memory of 1512 1240 sko86jV13.exe kLG98Ei.exe PID 1240 wrote to memory of 1512 1240 sko86jV13.exe kLG98Ei.exe PID 1240 wrote to memory of 1512 1240 sko86jV13.exe kLG98Ei.exe PID 1240 wrote to memory of 1512 1240 sko86jV13.exe kLG98Ei.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1640 wrote to memory of 1952 1640 winlogon.exe LogonUI.exe PID 1640 wrote to memory of 1952 1640 winlogon.exe LogonUI.exe PID 1640 wrote to memory of 1952 1640 winlogon.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1952 1592 csrss.exe LogonUI.exe PID 1592 wrote to memory of 1964 1592 csrss.exe userinit.exe PID 1592 wrote to memory of 1964 1592 csrss.exe userinit.exe PID 1640 wrote to memory of 1964 1640 winlogon.exe userinit.exe PID 1640 wrote to memory of 1964 1640 winlogon.exe userinit.exe PID 1640 wrote to memory of 1964 1640 winlogon.exe userinit.exe PID 1592 wrote to memory of 2028 1592 csrss.exe Explorer.EXE PID 1592 wrote to memory of 2028 1592 csrss.exe Explorer.EXE PID 1964 wrote to memory of 2028 1964 userinit.exe Explorer.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\userinit.exeC:\Windows\system32\userinit.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE3⤵
- Modifies visibility of file extensions in Explorer
- Modifies Installed Components in the registry
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\runonce.exeC:\Windows\system32\runonce.exe /Explorer4⤵
- Checks processor information in registry
-
C:\Windows\SysWOW64\runonce.exeC:\Windows\SysWOW64\runonce.exe /RunOnce64325⤵
- Checks processor information in registry
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\"6⤵
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:/UserInstall C:\Windows\system32\themeui.dll4⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail.exe" OCInstallUserConfigOE4⤵
- Drops desktop.ini file(s)
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE5⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /FirstLogon /Shortcuts /RegBrowsers /ResetMUI4⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:U shell32.dll4⤵
- Drops startup file
- Drops desktop.ini file(s)
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" C:\Windows\SysWOW64\mscories.dll,Install4⤵
-
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -UserConfig4⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\ie4uinit.exeC:\Windows\System32\ie4uinit.exe -ClearIconCache5⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32 advpack.dll,LaunchINFSectionEx C:\Windows\system32\ieuinit.inf,Install,,365⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32 C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m5⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /06⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /06⤵
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:/UserInstall C:\Windows\system32\themeui.dll4⤵
- Sets desktop wallpaper using registry
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" OCInstallUserConfigOE4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /FirstLogon /Shortcuts /RegBrowsers /ResetMUI4⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i:U shell32.dll4⤵
- Drops startup file
- Drops desktop.ini file(s)
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\mscories.dll,Install4⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level4⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fbe7688,0x13fbe7698,0x13fbe76a85⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=05⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fbe7688,0x13fbe7698,0x13fbe76a86⤵
-
C:\Windows\System32\o6wnyn.exe"C:\Windows\System32\o6wnyn.exe"4⤵
-
C:\Program Files\Windows Sidebar\sidebar.exe"C:\Program Files\Windows Sidebar\sidebar.exe" /autoRun4⤵
- Adds Run key to start application
-
C:\Windows\SysWOW64\runonce.exeC:\Windows\SysWOW64\runonce.exe /Run64324⤵
- Checks processor information in registry
-
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" /DelayServices5⤵
-
C:\Windows\System32\mctadmin.exe"C:\Windows\System32\mctadmin.exe"4⤵
- Drops desktop.ini file(s)
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef4839758,0x7fef4839768,0x7fef48397785⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1204 --field-trial-handle=1216,i,16269704310001591152,12257558744855778182,131072 /prefetch:25⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1216,i,16269704310001591152,12257558744855778182,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1216,i,16269704310001591152,12257558744855778182,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1216,i,16269704310001591152,12257558744855778182,131072 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1216,i,16269704310001591152,12257558744855778182,131072 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings5⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fbe7688,0x13fbe7698,0x13fbe76a86⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=06⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fbe7688,0x13fbe7698,0x13fbe76a87⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\Themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\Themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Hidden Files and Directories
1Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
9Disabling Security Tools
2Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\ebf5250e-bd09-4ded-907e-3eba4b4e22b8.tmpFilesize
488B
MD56d971ce11af4a6a93a4311841da1a178
SHA1cbfdbc9b184f340cbad764abc4d8a31b9c250176
SHA256338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783
SHA512c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Media Player.lnkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.iniFilesize
964B
MD546a4eca2a791d84afecfd9f129a567df
SHA1004f2926d9377cc23c5b68ce26907435b8539643
SHA25606b6d34db7e9ebecc07e0b53fedb2a9bc2d4563b1d2037b7630fbc002942baf7
SHA512dbeecf882210add0dd4ac57f75ccdf6a9604c3308e92f70747313f89a7f9c590f4e1cdd507e53ee37e0a1b7e437320dc6ec1299d406ef34ddd67dfd900fddd98
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.iniFilesize
964B
MD546a4eca2a791d84afecfd9f129a567df
SHA1004f2926d9377cc23c5b68ce26907435b8539643
SHA25606b6d34db7e9ebecc07e0b53fedb2a9bc2d4563b1d2037b7630fbc002942baf7
SHA512dbeecf882210add0dd4ac57f75ccdf6a9604c3308e92f70747313f89a7f9c590f4e1cdd507e53ee37e0a1b7e437320dc6ec1299d406ef34ddd67dfd900fddd98
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rJZ23Jd.exeFilesize
239KB
MD50179181b2d4a5bb1346b67a4be5ef57c
SHA1556750988b21379fd24e18b31e6cf14f36bf9e99
SHA2560a763637206a70a3ec6707fe5728ea673ae3bc11eb5e059d962e99dcc3991f31
SHA5121adaab4993ec3d1e32b9cc780ab17b5a6acfe352789aaf2872e91bef738dd5aca3115071ac42a21c4fd19a82a522b515243ebef340249115cfbe6951cb3c9cee
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exeFilesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exeFilesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\opm55oC.exeFilesize
175KB
MD52ca336ffac2e58e59bf4ba497e146fd7
SHA1ab8ebd53709abd15fd7d1df9dd91cbfbecb3ef14
SHA2568a07fc51578589686a864b2d74ac3c1b02a9ceee8f8a20d432832228d9665459
SHA5123a42bf9db2ec8fb1851a61e81d93a3a92765036f5aa768a228f8b6988de18a03259e1886c6d87c3549163e8a6c73b69479a3c35f49a87d332a37718d928c5d4b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exeFilesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exeFilesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nUc88BK16.exeFilesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exeFilesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exeFilesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mLy23qg.exeFilesize
217KB
MD5705bb6b6c31c48e23ccd0f6dea0b5ad8
SHA1a729563989de97a8e6d0274755731d4e05310983
SHA256c6831dd1b8db4c6c0b70977d86da3be226ef219425adf3210fc71d1e1c72e74c
SHA512b4530e051baa5a741a66bff66e80a5e814dd9975a09c59303c2bae176d94006d6626d821605c4cca39d870813d20e7a67391dc6e7f42e260aa0b68d5485a80fc
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exeFilesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exeFilesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeFilesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeFilesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeFilesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\0507ef0c-f38c-4823-9fde-6db539a37c1a.tmpFilesize
6KB
MD5fdbdc896bd7952650951c8de86f4f9bd
SHA1c82878a2c04fe28b62b2aa53118c273e6f486afb
SHA256bf258c21fe6240035044efd998905c7772895da0883f2b8a78daed5e0c2198d5
SHA512743427d2152a314bc27e10741d49ac9c1b695a6ee88dc3b718bca48b995d1ccecedf2a98f4648ad4225fdf8db56c6a420b7815a557d92870ea7eea69b16fcfbd
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5bc32496c50dc8ce7075f480c5abef924
SHA19eb46a55091e450f9fd4e56aad63f4d70ac1f725
SHA256f843366c5cca09790ccaa3bc6192b929c20fb92efe69e759c2b1e590ebaad5a7
SHA5122e6af817f37297c34b0cdedd8d0b350aa36e4e029e11c47810a882f4a4ec8c55cab48a3161873e54bedd8ff46636820f8a08f9820dcee7f0e362faec54f11eaa
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5f0e1efb005819674dcd49141dc1774b0
SHA105f00feda172d03ade0cd1fd4cc52e9d7f4e5598
SHA2566802657f3ee22928bdfcd5ef25298e4fb29d0f9c7165dd9e5ec213ee7d93714d
SHA5129fb9cc8b85d6cb817d6c4f0c4fd8c071fbac4ee701ee31494ef7293121ad6b928aa516537028b0ead0a5b1c01504fab7ab6e83401338b5a0196068068734d659
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000002.dbtmpFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT~RF713728.TMPFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\fe3e7923-d2f1-4c5c-8cb9-c5a1516ff6ee.tmpFilesize
193KB
MD5ef36a84ad2bc23f79d171c604b56de29
SHA138d6569cd30d096140e752db5d98d53cf304a8fc
SHA256e9eecf02f444877e789d64c2290d6922bd42e2f2fe9c91a1381959acd3292831
SHA512dbb28281f8fa86d9084a0c3b3cdb6007c68aa038d8c28fe9b69ac0c1be6dc2141ca1b2d6a444821e25ace8e92fb35c37c89f8bce5fee33d6937e48b2759fa8be
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\ShaderCache\data_0Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\ShaderCache\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\CACA SHEEP\AppData\Local\Google\Chrome\User Data\ShaderCache\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Feeds\Feeds for United States~\USA~dgov Updates~c News and Features~.feed-msFilesize
28KB
MD560ad88c8e7dfb6bdb5d56d1bdeb1a7bd
SHA17c1a934ae2a214911d6eeb426b5c8b7fa04ee0c6
SHA25655c47c76da1418a6cdcd4d55672ac90b80e5790bf5b8dd1788969ff1330b79b8
SHA5123d3525f1fc1ce37bf758996c5417cbf8fa794c170810afd69aeb54ffc51bf336855a90ea2a0a21d1ce2db45824667d7336c53c401afb37b014c8053d6598643e
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Media Player\CurrentDatabase_372.wmdbFilesize
1.0MB
MD509c38ca679096fc2f7c45e4642cad113
SHA14794e0d7302d4126e20d2bba090e974ef32ad0ac
SHA25645625e8159c75e994c270bfae7593ed7495ae0a9375b5893081985d8948c2a2d
SHA51296fcf48aa6172a8bd06c59ba0b2566f94b4b973e9cb6baf091f975baa8cc10588aedcded40038ede3cc64e58a34ce780a2e9e31723de4010a83abb3e644fd826
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdbFilesize
68KB
MD55e2e3589e0b11de95fc6337d60fca451
SHA1d160b81d9a058036c11952fed58e06200ea2298b
SHA2566b8021edd769b6d419a73c038b6a12a0f4dc865487b658e43834a92928868127
SHA512db437333dd810ded6ad6332ebbf57aa9814b2c011993ed5cf730c20242b9ef8141caf70a052be023a23da619d00a6e963bd8bdf96c895de3e2e679bc70787e51
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStoreFilesize
2.0MB
MD5b316fe9444fe59e9cbb102350fe5cde8
SHA13655ce80b42bbdcd48bce4f17b43ba6aa431cd9d
SHA256b346a1ad70b5a120a9a40cb34c985f54316575870a35838c0e064fd2f0b98999
SHA51259db0d9e07a1cc8cb88c4640f8afa24a31c95b8d7ceea1e6b59a5f74063b5ef37d1e39158cce003d75a5575f719f7f44d5df551b5067cb70b1b934f18bce5a28
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows Mail\edb.chkFilesize
8KB
MD5d53529d144e18f13967fe477f481651e
SHA1ecb0f46af5ae75794f6d22044bf8f11734441dc5
SHA256a3d87f030717fb34f2c33fe1aade776179e6f1be3847b031b2036827e65627c3
SHA512771e1c9a62e29bb584779207305a2c798edfd6b98cf00b3cdd685259b6b2d37b5f8f4f095c66b6548fd4c99258a331173faa84a4ae3ce69386fb3dcdf50f8751
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows Mail\edb.logFilesize
2.0MB
MD550c510487abb91f9a5dbf156c340f287
SHA15ba11036e03402472d107b8f9683a60ea93a663a
SHA256cad4faba2d24b78ebbb45d4a9adc109d8a1d0f7aa09aab2ba4116aadc4c89b06
SHA512e436c881c13b758e1587fb4793c5c2318bf1b6dc1224855a851e3f10070face436e4e0f11e62647da2fb61766d0d3aa0df095259833874af6e129bb3b52e286d
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows Mail\edb.logFilesize
2.0MB
MD5026ae157a08a08349e3e05f9466e5fab
SHA1f7b369674b06ab4f8b7f311b882bb88a098793cb
SHA256d9329c3ab853a19aee7e76d4323a9d6ee11326caadf195ba9c3f199f90e2f26c
SHA512c666267ef98397e933ea139d55527332c8fce4cde680f37c12630b44a165b2c7b10873f67892540c5269d7c27f2ba0afac1aa8aef15d61123932f57fa5b42f4e
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows Mail\edb.logFilesize
2.0MB
MD5026ae157a08a08349e3e05f9466e5fab
SHA1f7b369674b06ab4f8b7f311b882bb88a098793cb
SHA256d9329c3ab853a19aee7e76d4323a9d6ee11326caadf195ba9c3f199f90e2f26c
SHA512c666267ef98397e933ea139d55527332c8fce4cde680f37c12630b44a165b2c7b10873f67892540c5269d7c27f2ba0afac1aa8aef15d61123932f57fa5b42f4e
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XMLFilesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\CACA SHEEP\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.iniFilesize
174B
MD5e0fd7e6b4853592ac9ac73df9d83783f
SHA12834e77dfa1269ddad948b87d88887e84179594a
SHA256feea416e5e5c8aa81416b81fb25132d1c18b010b02663a253338dbdfb066e122
SHA512289de77ffbe328388ad080129b7460712985d42076e78a3a545124881c30f564c5ef8fb4024d98903d88a6a187c60431a600f6ecbbe2888ee69e40a67ce77b55
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnkFilesize
1KB
MD5c28dba299d8eb6d0b0e89447543a780b
SHA11cc152ee2cc70e502504615bac608d7df6263488
SHA25686bcb752fbe68ef53d37f3df421fd490a87044e82214719dd9dedeefe03e309f
SHA512afef94f488358e3b427163e3d701573d814dbd4e92f3224f134e9e627aed41977eec7eea4a76faa81d90397b6883b70e9d7678acebb1f376712310a8a738fb67
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnkFilesize
1KB
MD547b2e1c4ddd5fa161f4e7314222d7a29
SHA1f8e0a57ad324aa0ce6eafcbee54361cfc3fac7a4
SHA25620b9ba1869ed5d109962522c7c9a09e2675c457edd780f3723d33f9b40475772
SHA51207c8e9fcc6441c45540ced17802aea9fc84197733cc13af77516813c3beb346ae2748445ae99318309cbdc2da8e69e622dd91e658b7e9ba27d424eae6f5acf1b
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Media Player.lnkFilesize
1KB
MD54cdace8b110f3a86ef773f6b2f8c265f
SHA17b3b69055c26049590346bfc84a0163573692ffd
SHA256d2219e5b7acaa71781610f9d661149efdb1a2d66634c6cd76519eae46d21da39
SHA5123cb534f1972caa82c006c5e6e7bc57aafe1c98910f487e8eecd478c0117844e380d8a292ca6a500151b8e057e68ec9fce5df96eeabc6c46b1e601df3a99fd09c
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.iniFilesize
82B
MD51c61dc21f9b83172d65be1e94b79026f
SHA17324473ddda64b87c299bf6e3b9e9aff53f7fd74
SHA2568e920d7893b682a049f6a5097f880d915dc2d7bf8bc87ae558cd7f14466d5d1b
SHA5129660cde4d7606826c2fb6623460a2a286339970256e677c8abf8189fd1d58e0284c024bbf5c0bf539189dafa3e8d5269c1e0f7e3717891f2ae4771634731bbd8
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.iniFilesize
211B
MD5e5a8eb64419f6d85a1b7aed2152616c2
SHA1f5d94f8953bb235e35fccec0ea4f14ba69443081
SHA2565266b08d0c1bf229ec5eafdb6dae2a4849b6b394694d34033453cf8a379725a7
SHA5127c304bc842c81d3b5cff745d34b038a2a867063c65e502f4155439ba0642e8b0643f9b7254f74e85d5b150c134836b9e398a0dcb192550d97dfd431c3d93f1f6
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Documents.library-msFilesize
3KB
MD50d93d8a441be896b275fd117266f8d2d
SHA1be9e4883cb6a9d35fcfc41b22f30254bf59476df
SHA256740f19e2b65d59424cffc00aa955f0c32415c9bd6a2926cfc1876032ce1eea05
SHA512621f89ff7dfd0b8121dc393ffc7fc41ace761643706d83e487a937c831eae385385bdb2f727d813f142d93cacc907297de0a0d80b79a7cb1f0d550ee7025b8d0
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Documents.library-msFilesize
3KB
MD50d93d8a441be896b275fd117266f8d2d
SHA1be9e4883cb6a9d35fcfc41b22f30254bf59476df
SHA256740f19e2b65d59424cffc00aa955f0c32415c9bd6a2926cfc1876032ce1eea05
SHA512621f89ff7dfd0b8121dc393ffc7fc41ace761643706d83e487a937c831eae385385bdb2f727d813f142d93cacc907297de0a0d80b79a7cb1f0d550ee7025b8d0
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Documents.library-msFilesize
3KB
MD5c45ff179005fbc507f7cdb476d216099
SHA19db85d70c1ebb553ce6e9ac1b34e6d0538916c1d
SHA2565e35747f362618681f54a1536e783e61e975b44aded4fbf3de7900bb81f5e249
SHA512ffe22ba2b5644bb23d64637ffb58c94e945db1430850c38efa6af4828bf5f9dd62e9221279e6f10d6c76a97b3de77b2b41306e074a5fede14ce9b7f783a19a92
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Music.library-msFilesize
3KB
MD56cff54705d87495d3bf207764d9abdfe
SHA175a5642a7214c90472a15d5bf3f6abccf61df437
SHA256248b99d8479193c381a5aee36b9c1bc127fbeef380f3a454a45870816cc91ea3
SHA51276c3cc59fbdd2a99cdcd81ffdafd7a153b1c641531eeb7ddf3c0e3f667fcba51811b2c7c8c9a98283b87bd549ac9b68425693ac238cd82fd33550703d1ba790a
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Music.library-msFilesize
3KB
MD56cff54705d87495d3bf207764d9abdfe
SHA175a5642a7214c90472a15d5bf3f6abccf61df437
SHA256248b99d8479193c381a5aee36b9c1bc127fbeef380f3a454a45870816cc91ea3
SHA51276c3cc59fbdd2a99cdcd81ffdafd7a153b1c641531eeb7ddf3c0e3f667fcba51811b2c7c8c9a98283b87bd549ac9b68425693ac238cd82fd33550703d1ba790a
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Music.library-msFilesize
3KB
MD5722f23a669c524033363f4dd1a9ad708
SHA169ca9393fe78de0507538a9aed65eaedf43a91ae
SHA2561c850f345e5ea0fc05abbc03424975aeba2bb313c6586e57c4db787f782c5725
SHA5123bd903d99086fb8ea0ecf96125f9498540a06abae88a9fd5bcfa3ba4fcf26b202baea0f93ab1407a328f5f8cbd0b3914a163bca4bab8effc78a63064786ace1f
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Pictures.library-msFilesize
3KB
MD5813c20514646ca7faa2eb43f2559631f
SHA1fe5e7c516fcd20ba9c5979eab360da09f1b95d57
SHA256633952e88fbac4c65a90866e20383c92862628f601f2c5fe8ca9f4984a9df04f
SHA5128861ba5afd0747ab854a3916e72eb5b0b6aba3e71b0b2c99a51c3dd7eeca1ed26764087345cf8f9246bc7f08b0eefb82d31314780086f1be8d4a58ac93fb0cfe
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Pictures.library-msFilesize
3KB
MD5813c20514646ca7faa2eb43f2559631f
SHA1fe5e7c516fcd20ba9c5979eab360da09f1b95d57
SHA256633952e88fbac4c65a90866e20383c92862628f601f2c5fe8ca9f4984a9df04f
SHA5128861ba5afd0747ab854a3916e72eb5b0b6aba3e71b0b2c99a51c3dd7eeca1ed26764087345cf8f9246bc7f08b0eefb82d31314780086f1be8d4a58ac93fb0cfe
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Pictures.library-msFilesize
3KB
MD59b199ac80d0b88ec991af40dc30a53c3
SHA1e5804add3ce315cf8832958ecf2c28af7456c89e
SHA256a3c8dd9a5f05e3592e82faf64c71eda7a7a003ee26ecdf374ba8d9a6dc71544a
SHA512f611a91f0605f45db4496ed0a7b533385bf53abba5238108be428d5998dc51f2986817cd7ee9da7f8576e02fd62f61778592d536eac8b8efbea1ee57ce141bd9
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Videos.library-msFilesize
3KB
MD5964ba8cd2b6f42d0f1a1611a178e6d98
SHA16c7dec0200b4f0d44206058911b653fb33bbdae0
SHA256a01568ae0bf54e48bb5dfcd5c6b8910d6322479f600545667112509daab0c195
SHA51226e99b88ccbe1e8d8fbd2f8b4d2f467c91fed06f82b07afc00e226c22f54a0c3ec9d9884c437eea9ca10f51c0f4b849d975bacb75c59d5f4255319543c917965
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Videos.library-msFilesize
3KB
MD5964ba8cd2b6f42d0f1a1611a178e6d98
SHA16c7dec0200b4f0d44206058911b653fb33bbdae0
SHA256a01568ae0bf54e48bb5dfcd5c6b8910d6322479f600545667112509daab0c195
SHA51226e99b88ccbe1e8d8fbd2f8b4d2f467c91fed06f82b07afc00e226c22f54a0c3ec9d9884c437eea9ca10f51c0f4b849d975bacb75c59d5f4255319543c917965
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\Videos.library-msFilesize
3KB
MD50fbf6e7980d7452910b906b9c1f2263c
SHA1776ac083beb4c2061efd46e204f2aec9899a3e06
SHA256ed247faf8f7abfc32015c2e9869fbfdbe2c71b5499d171b4b2330cb4e0def742
SHA512add8feff10c94e09ac5c137d7ab65f99b7a9e0d63740cb1358e163a6e991b9dece373eff9366e6ab24bdc626e1da8f988ffcb9d7bcb98d4e610cc61657402caf
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\desktop.iniFilesize
151B
MD50ff56a4620c3221ff64ec61a3a0d3033
SHA13a45320be12b585dcdc5ab2af5ea1455b2c919a1
SHA2560b0a65accca705494739d03b6c2ea769c78cd0eee996bc95b0c6ebc0941f4b1a
SHA512962a340efeb6d18c85e5872997eebb83374e114be088689690ba438f0db8e2e4df6c24713a35cfaec518f58d5322cf9617638ea55ff279a9d161c4fdf9af74f6
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\desktop.iniFilesize
213B
MD55547a64ee3681b1fca07111e73dcc51a
SHA10b16a54ccb7c0284df649594e006ca96e07ac296
SHA256c6a3db953cc63f23aa5ff66de5fc6b483f6a1106cf1f77cbd73617b2c4340e0e
SHA51221a6b9b2c578ea8d0bfb22c1b37b0dde47395ec958fa5c73eafeb8b865080db132e565c7e8ce2ab1d2e934f414e23b820f3ff3571a7d737453f3ace76d11cc25
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\desktop.iniFilesize
274B
MD5453249f95d75eb5e450eb91fa755e1c8
SHA13e200e187e8cd21d3d1976ea0f7356626254de18
SHA25601bef150c18e377a57843965d55f18f0b5cb3fa867c5ab30f1e67eacd6ece48a
SHA5126125ffc1ab457bc1ba957c78c2a89ca54060c1969c4a981acf71025a1d79760159816d5fc36e351429de3bb5820e755b9bc22386f3d6892bfdf3da67d86f157c
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Libraries\desktop.iniFilesize
274B
MD5453249f95d75eb5e450eb91fa755e1c8
SHA13e200e187e8cd21d3d1976ea0f7356626254de18
SHA25601bef150c18e377a57843965d55f18f0b5cb3fa867c5ab30f1e67eacd6ece48a
SHA5126125ffc1ab457bc1ba957c78c2a89ca54060c1969c4a981acf71025a1d79760159816d5fc36e351429de3bb5820e755b9bc22386f3d6892bfdf3da67d86f157c
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Recent\desktop.iniFilesize
432B
MD5f107d0270e21a2fe91099fdc15918d44
SHA1dabc2f24f4a4e90053743166e5c4175dcf2b2d2d
SHA256eb315c9d165b4916e3b00e4d148b53a6c03a2f0694a6a8821d98e76f935ca6a8
SHA512b5d51c0d6abe99121d4f4f1d236def4260b7d5c26c501d7735eba4f58e2597db0e89b2b1df16545e49fc39649806e5305efb912328541bdd31c01ff3d2bda49c
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Recent\desktop.iniFilesize
432B
MD5f107d0270e21a2fe91099fdc15918d44
SHA1dabc2f24f4a4e90053743166e5c4175dcf2b2d2d
SHA256eb315c9d165b4916e3b00e4d148b53a6c03a2f0694a6a8821d98e76f935ca6a8
SHA512b5d51c0d6abe99121d4f4f1d236def4260b7d5c26c501d7735eba4f58e2597db0e89b2b1df16545e49fc39649806e5305efb912328541bdd31c01ff3d2bda49c
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.iniFilesize
174B
MD5548b310fbc7a26d0b9da3a9f2d604a0c
SHA11e20c38b721dff06faa8aa69a69e616c228736c1
SHA256be49aff1e82fddfc2ab9dfffcb7e7be100800e3653fd1d12b6f8fa6a0957fcac
SHA512fa5bb7ba547a370160828fe720e6021e7e3a6f3a0ce783d81071292739cef6cac418c4bc57b377b987e69d5f633c2bd97a71b7957338472c67756a02434d89f1
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.iniFilesize
174B
MD5548b310fbc7a26d0b9da3a9f2d604a0c
SHA11e20c38b721dff06faa8aa69a69e616c228736c1
SHA256be49aff1e82fddfc2ab9dfffcb7e7be100800e3653fd1d12b6f8fa6a0957fcac
SHA512fa5bb7ba547a370160828fe720e6021e7e3a6f3a0ce783d81071292739cef6cac418c4bc57b377b987e69d5f633c2bd97a71b7957338472c67756a02434d89f1
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnkFilesize
1KB
MD5c28dba299d8eb6d0b0e89447543a780b
SHA11cc152ee2cc70e502504615bac608d7df6263488
SHA25686bcb752fbe68ef53d37f3df421fd490a87044e82214719dd9dedeefe03e309f
SHA512afef94f488358e3b427163e3d701573d814dbd4e92f3224f134e9e627aed41977eec7eea4a76faa81d90397b6883b70e9d7678acebb1f376712310a8a738fb67
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.iniFilesize
174B
MD57f1698bab066b764a314a589d338daae
SHA1524abe4db03afef220a2cc96bf0428fd1b704342
SHA256cdb11958506a5ba5478e22ed472fa3ae422fe9916d674f290207e1fc29ae5a76
SHA5124f94ad0fe3df00838b288a0ef4c12d37e175c37cbf306bdb1336ff44d0e4d126cd545c636642c0e88d8c6b8258dc138a495f4d025b662f40a9977d409d6b5719
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.iniFilesize
174B
MD57f1698bab066b764a314a589d338daae
SHA1524abe4db03afef220a2cc96bf0428fd1b704342
SHA256cdb11958506a5ba5478e22ed472fa3ae422fe9916d674f290207e1fc29ae5a76
SHA5124f94ad0fe3df00838b288a0ef4c12d37e175c37cbf306bdb1336ff44d0e4d126cd545c636642c0e88d8c6b8258dc138a495f4d025b662f40a9977d409d6b5719
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.iniFilesize
174B
MD517d5d0735deaa1fb4b41a7c406763c0a
SHA1584e4be752bb0f1f01e1088000fdb80f88c6cae0
SHA256768b6fde6149d9ebbed1e339a72e8cc8c535e5c61d7c82752f7dff50923b7aed
SHA512a521e578903f33f9f4c3ebb51b6baa52c69435cb1f9cb2ce9db315a23d53345de4a75668096b14af83a867abc79e0afa1b12f719294ebba94da6ad1effc8b0a3
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.iniFilesize
174B
MD517d5d0735deaa1fb4b41a7c406763c0a
SHA1584e4be752bb0f1f01e1088000fdb80f88c6cae0
SHA256768b6fde6149d9ebbed1e339a72e8cc8c535e5c61d7c82752f7dff50923b7aed
SHA512a521e578903f33f9f4c3ebb51b6baa52c69435cb1f9cb2ce9db315a23d53345de4a75668096b14af83a867abc79e0afa1b12f719294ebba94da6ad1effc8b0a3
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.iniFilesize
338B
MD5e4e50dfa455b2cbe356dffdf7aa1fcaf
SHA1c58be9d954b5e2dd0e5efa23a0a3d95ab8119205
SHA2569284bd835c20f5da3f76bc1d8c591f970a74e62a7925422858e5b9fbec08b927
SHA512bef1fad5d4b97a65fec8c350fe663a443bc3f7406c12184c79068f9a635f13f9127f89c893e7a807f1258b45c84c1a4fc98f6bd6902f7b72b02b6ffbc7e37169
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.iniFilesize
338B
MD5e4e50dfa455b2cbe356dffdf7aa1fcaf
SHA1c58be9d954b5e2dd0e5efa23a0a3d95ab8119205
SHA2569284bd835c20f5da3f76bc1d8c591f970a74e62a7925422858e5b9fbec08b927
SHA512bef1fad5d4b97a65fec8c350fe663a443bc3f7406c12184c79068f9a635f13f9127f89c893e7a807f1258b45c84c1a4fc98f6bd6902f7b72b02b6ffbc7e37169
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniFilesize
174B
MD5a2d31a04bc38eeac22fca3e30508ba47
SHA19b7c7a42c831fcd77e77ade6d3d6f033f76893d2
SHA2568e00a24ae458effe00a55344f7f34189b4594613284745ff7d406856a196c531
SHA512ed8233d515d44f79431bb61a4df7d09f44d33ac09279d4a0028d11319d1f82fc923ebbc6c2d76ca6f48c0a90b6080aa2ea91ff043690cc1e3a15576cf62a39a6
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniFilesize
174B
MD5a2d31a04bc38eeac22fca3e30508ba47
SHA19b7c7a42c831fcd77e77ade6d3d6f033f76893d2
SHA2568e00a24ae458effe00a55344f7f34189b4594613284745ff7d406856a196c531
SHA512ed8233d515d44f79431bb61a4df7d09f44d33ac09279d4a0028d11319d1f82fc923ebbc6c2d76ca6f48c0a90b6080aa2ea91ff043690cc1e3a15576cf62a39a6
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpgFilesize
627KB
MD5da288dceaafd7c97f1b09c594eac7868
SHA1b433a6157cc21fc3258495928cd0ef4b487f99d3
SHA2566ea9f8468c76aa511a5b3cfc36fb212b86e7abd377f147042d2f25572bf206a2
SHA5129af8cb65ed6a46d4b3d673cea40809719772a7aaf4a165598dc850cd65afb6b156af1948aab80487404bb502a34bc2cce15c502c6526df2427756e2338626062
-
C:\Users\CACA SHEEP\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpgFilesize
627KB
MD5da288dceaafd7c97f1b09c594eac7868
SHA1b433a6157cc21fc3258495928cd0ef4b487f99d3
SHA2566ea9f8468c76aa511a5b3cfc36fb212b86e7abd377f147042d2f25572bf206a2
SHA5129af8cb65ed6a46d4b3d673cea40809719772a7aaf4a165598dc850cd65afb6b156af1948aab80487404bb502a34bc2cce15c502c6526df2427756e2338626062
-
C:\Users\CACA SHEEP\Contacts\CACA SHEEP.contactFilesize
43KB
MD5f6bd4f4972ba7f948cc26989c0b0f4dc
SHA11d41e2c5153c7f95c4f24cc3a6926b8e911df7fd
SHA256d94594115362a738b0c1d924bde754301a4ccc399015a90535e4d22caf8d3d64
SHA5124ea2209d5a97bbbede2441d1b8c550adc70297d04f57da69c10d47b2a99ba025e10e408d853a8ccf757e8909bde5c369aa12bf55a7c23f4d8bd3df0cd528556d
-
C:\Users\CACA SHEEP\Contacts\desktop.iniFilesize
432B
MD5eefa7f76ff11a5ec21bb777b798ac46c
SHA12e7a65ea8427d13a92ea159a5b8859ff99d2a836
SHA256840b46ed74821b5b61ca9ddc51a91cfe9151d11a494c89f183fadc02a78ac8ae
SHA512111301e33c0b33c154ffff274db5eb167de0ddb4e769cab9a2d9fcd2882e6192053149abbcb00d17ae5f7661bafecc1111aff2025c89d07b247633bbccb0e3ef
-
C:\Users\CACA SHEEP\Contacts\desktop.iniFilesize
412B
MD5449f2e76e519890a212814d96ce67d64
SHA1a316a38e1a8325bef6f68f18bc967b9aaa8b6ebd
SHA25648a6703a09f1197ee85208d5821032b77d20b3368c6b4de890c44fb482149cf7
SHA512c66521ed261dcbcc9062a81d4f19070216c6335d365bac96b64d3f6be73cd44cbfbd6f3441be606616d13017a8ab3c0e7a25d0caa211596e97a9f7f16681b738
-
C:\Users\CACA SHEEP\Contacts\desktop.iniFilesize
412B
MD5449f2e76e519890a212814d96ce67d64
SHA1a316a38e1a8325bef6f68f18bc967b9aaa8b6ebd
SHA25648a6703a09f1197ee85208d5821032b77d20b3368c6b4de890c44fb482149cf7
SHA512c66521ed261dcbcc9062a81d4f19070216c6335d365bac96b64d3f6be73cd44cbfbd6f3441be606616d13017a8ab3c0e7a25d0caa211596e97a9f7f16681b738
-
C:\Users\CACA SHEEP\Desktop\desktop.iniFilesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
C:\Users\CACA SHEEP\Desktop\desktop.iniFilesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
C:\Users\CACA SHEEP\Documents\desktop.iniFilesize
402B
MD5ecf88f261853fe08d58e2e903220da14
SHA1f72807a9e081906654ae196605e681d5938a2e6c
SHA256cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844
SHA51282c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b
-
C:\Users\CACA SHEEP\Documents\desktop.iniFilesize
402B
MD5ecf88f261853fe08d58e2e903220da14
SHA1f72807a9e081906654ae196605e681d5938a2e6c
SHA256cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844
SHA51282c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b
-
C:\Users\CACA SHEEP\Downloads\desktop.iniFilesize
282B
MD53a37312509712d4e12d27240137ff377
SHA130ced927e23b584725cf16351394175a6d2a9577
SHA256b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3
SHA512dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05
-
C:\Users\CACA SHEEP\Downloads\desktop.iniFilesize
282B
MD53a37312509712d4e12d27240137ff377
SHA130ced927e23b584725cf16351394175a6d2a9577
SHA256b029393ea7b7cf644fb1c9f984f57c1980077562ee2e15d0ffd049c4c48098d3
SHA512dbb9abe70f8a781d141a71651a62a3a743c71a75a8305e9d23af92f7307fb639dc4a85499115885e2a781b040cbb7613f582544c2d6de521e588531e9c294b05
-
C:\Users\CACA SHEEP\Favorites\Links\Web Slice Gallery.urlFilesize
134B
MD5873c8643cbbfb8ff63731bc25ac9b18c
SHA1043cbc1b31b9988d8041c3d01f71ce3393911f69
SHA256c4ad21379c11da7943c605eadb22f6fc6f54b49783466f8c1f3ad371eb167466
SHA512356b13b22b7b1717ded0ae1272b07f1839184e839132f3ab891b5d84421e375d4fc45158c291b46a933254f463c52d92574ce6b15c1402dfb00ee5d0a74c9943
-
C:\Users\CACA SHEEP\Favorites\Links\Web Slice Gallery.urlFilesize
226B
MD5ad93eaac4ac4a095f8828f14790c1f8c
SHA1f84f24c4ca9d04485a0005770e3ef1ca30eede55
SHA256729111c923821a7ad0bb23d1a1dea03edbf503cd8b732e2d7eb36cf88eaa0cac
SHA512f561b98836233849c016227a3366fcf8449db662f21aecd4bd45eb988f6316212685ce7ce6e0461fb2604f664ed03a7847a237800d3cdca8ba23a41a49f68769
-
C:\Users\CACA SHEEP\Favorites\desktop.iniFilesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
C:\Users\CACA SHEEP\Favorites\desktop.iniFilesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
C:\Users\CACA SHEEP\Links\desktop.iniFilesize
282B
MD598470d9bd7fba55a0c303065f9c4f9be
SHA15303b190e29ba48332f7c90a832ef08af5a1953d
SHA2563830022d5d7ef2ae2ca0a2b6ad73f0d4716b49bf7eeeaa87b618988d531b7c72
SHA512134e072c3600bbb3c724c2700da399a14ba5b907153969362b3dbff32c480d39e7f5ecceebc9122a5a27265410557a16eb6bf82c9b635b90ef1fa0ae9efb849c
-
C:\Users\CACA SHEEP\Links\desktop.iniFilesize
468B
MD592adc8410cd8cb1d0481e2adbb62c7dd
SHA1bac1444ebe0bac748966f3bee84ee11e151a4810
SHA2564a3d7ccddac5c1b437fb687e90589015b9b9ae7708ea35eed9917d1190f65694
SHA512d7c3a5df50b28e336ff24f828cdf225554d199d3c2a857e2a7baa1f2bc1fee21944733edee52bd665ebaee999f5668d03497e9bfe88d58d380b74e6046ec5d62
-
C:\Users\CACA SHEEP\Links\desktop.iniFilesize
580B
MD5de8858093993987d123060097a2bad66
SHA10a89e87ba46538cb73aff1a47e4dc0bcfb4760d5
SHA2564c0d757717dec80eca8c6cbbfdda4706eb38fbbb7624933d5429dafc7bb9f0ec
SHA512fa348ac4025b599f460cb831338ce010dde8fba87587a6d078d6d594a30fee87ed112e412078c10604553f326cc7bd7627ae93b0e3d8a60cfeda0720cad29f4c
-
C:\Users\CACA SHEEP\Links\desktop.iniFilesize
580B
MD5de8858093993987d123060097a2bad66
SHA10a89e87ba46538cb73aff1a47e4dc0bcfb4760d5
SHA2564c0d757717dec80eca8c6cbbfdda4706eb38fbbb7624933d5429dafc7bb9f0ec
SHA512fa348ac4025b599f460cb831338ce010dde8fba87587a6d078d6d594a30fee87ed112e412078c10604553f326cc7bd7627ae93b0e3d8a60cfeda0720cad29f4c
-
C:\Users\CACA SHEEP\Music\desktop.iniFilesize
504B
MD506e8f7e6ddd666dbd323f7d9210f91ae
SHA1883ae527ee83ed9346cd82c33dfc0eb97298dc14
SHA2568301e344371b0753d547b429c5fe513908b1c9813144f08549563ac7f4d7da68
SHA512f7646f8dcd37019623d5540ad8e41cb285bcc04666391258dbf4c42873c4de46977a4939b091404d8d86f367cc31e36338757a776a632c7b5bf1c6f28e59ad98
-
C:\Users\CACA SHEEP\Music\desktop.iniFilesize
504B
MD506e8f7e6ddd666dbd323f7d9210f91ae
SHA1883ae527ee83ed9346cd82c33dfc0eb97298dc14
SHA2568301e344371b0753d547b429c5fe513908b1c9813144f08549563ac7f4d7da68
SHA512f7646f8dcd37019623d5540ad8e41cb285bcc04666391258dbf4c42873c4de46977a4939b091404d8d86f367cc31e36338757a776a632c7b5bf1c6f28e59ad98
-
C:\Users\CACA SHEEP\Pictures\desktop.iniFilesize
504B
MD529eae335b77f438e05594d86a6ca22ff
SHA1d62ccc830c249de6b6532381b4c16a5f17f95d89
SHA25688856962cef670c087eda4e07d8f78465beeabb6143b96bd90f884a80af925b4
SHA5125d2d05403b39675b9a751c8eed4f86be58cb12431afec56946581cb116b9ae1014ab9334082740be5b4de4a25e190fe76de071ef1b9074186781477919eb3c17
-
C:\Users\CACA SHEEP\Pictures\desktop.iniFilesize
504B
MD529eae335b77f438e05594d86a6ca22ff
SHA1d62ccc830c249de6b6532381b4c16a5f17f95d89
SHA25688856962cef670c087eda4e07d8f78465beeabb6143b96bd90f884a80af925b4
SHA5125d2d05403b39675b9a751c8eed4f86be58cb12431afec56946581cb116b9ae1014ab9334082740be5b4de4a25e190fe76de071ef1b9074186781477919eb3c17
-
C:\Users\CACA SHEEP\Saved Games\desktop.iniFilesize
282B
MD5b441cf59b5a64f74ac3bed45be9fadfc
SHA13da72a52e451a26ca9a35611fa8716044a7c0bbc
SHA256e6fdf8ed07b19b2a3b8eff05de7bc71152c85b377b9226f126dc54b58b930311
SHA512fdc26609a674d36f5307fa3f1c212da1f87a5c4cd463d861ce1bd2e614533f07d943510abed0c2edeb07a55f1dccff37db7e1f5456705372d5da8e12d83f0bb3
-
C:\Users\CACA SHEEP\Saved Games\desktop.iniFilesize
282B
MD5b441cf59b5a64f74ac3bed45be9fadfc
SHA13da72a52e451a26ca9a35611fa8716044a7c0bbc
SHA256e6fdf8ed07b19b2a3b8eff05de7bc71152c85b377b9226f126dc54b58b930311
SHA512fdc26609a674d36f5307fa3f1c212da1f87a5c4cd463d861ce1bd2e614533f07d943510abed0c2edeb07a55f1dccff37db7e1f5456705372d5da8e12d83f0bb3
-
C:\Users\CACA SHEEP\Searches\Indexed Locations.search-msFilesize
248B
MD5b6acbeb59959aa5412a7565423ea7bab
SHA14905f02dbef69c830b807a32e9a4b6206bd01dc6
SHA25699653a38c445ae1d4c373ee672339fd47fd098e0d0ada5f0be70e3b2bf711d38
SHA5120058aa67ae9060cb708e34cb2e12cea851505694e328fd0aa6deba99f205afaffdf86af8119c65ada5a3c9b1f8b94923baa6454c2d5ab46a21257d145f9a8162
-
C:\Users\CACA SHEEP\Searches\desktop.iniFilesize
278B
MD58e11566270550c575d6d2c695c5a4b1f
SHA1ae9645fad2107b5899f354c9144a4dfc33b66f9e
SHA2561dc14736f6b0e9b68059324321acc14e156cd3a2890466a23bf7abf365d6c704
SHA512a9fc4b17d75f85ae64315ba94570cb5317b5510c655d3d5c8fb44091ea37f31e431e99ed5308252897bdd93c34e771bf80f456c4873ef0aa58ca9bbb2e5ff7e0
-
C:\Users\CACA SHEEP\Searches\desktop.iniFilesize
524B
MD5089d48a11bff0df720f1079f5dc58a83
SHA188f1c647378b5b22ebadb465dc80fcfd9e7b97c9
SHA256a9e8ad0792b546a4a8ce49eda82b327ad9581141312efec3ac6f2d3ad5a05f17
SHA512f0284a3cc46e9c23af22fec44ac7bbde0b72f5338260c402564242c3dd244f8f8ca71dd6ceabf6a2b539cacc85a204d9495f43c74f6876317ee8e808d4a60ed8
-
C:\Users\CACA SHEEP\Searches\desktop.iniFilesize
524B
MD5089d48a11bff0df720f1079f5dc58a83
SHA188f1c647378b5b22ebadb465dc80fcfd9e7b97c9
SHA256a9e8ad0792b546a4a8ce49eda82b327ad9581141312efec3ac6f2d3ad5a05f17
SHA512f0284a3cc46e9c23af22fec44ac7bbde0b72f5338260c402564242c3dd244f8f8ca71dd6ceabf6a2b539cacc85a204d9495f43c74f6876317ee8e808d4a60ed8
-
C:\Users\CACA SHEEP\Videos\desktop.iniFilesize
504B
MD550a956778107a4272aae83c86ece77cb
SHA110bce7ea45077c0baab055e0602eef787dba735e
SHA256b287b639f6edd612f414caf000c12ba0555adb3a2643230cbdd5af4053284978
SHA512d1df6bdc871cacbc776ac8152a76e331d2f1d905a50d9d358c7bf9ed7c5cbb510c9d52d6958b071e5bcba7c5117fc8f9729fe51724e82cc45f6b7b5afe5ed51a
-
C:\Users\CACA SHEEP\Videos\desktop.iniFilesize
504B
MD550a956778107a4272aae83c86ece77cb
SHA110bce7ea45077c0baab055e0602eef787dba735e
SHA256b287b639f6edd612f414caf000c12ba0555adb3a2643230cbdd5af4053284978
SHA512d1df6bdc871cacbc776ac8152a76e331d2f1d905a50d9d358c7bf9ed7c5cbb510c9d52d6958b071e5bcba7c5117fc8f9729fe51724e82cc45f6b7b5afe5ed51a
-
C:\Users\CACASH~1\AppData\Local\Temp\RGI2138.tmpFilesize
24KB
MD53006752a2bcfeda0f75d551ea656b2ef
SHA1b7198fc772be6d6261ed4e76aca3998e8f7a7bdb
SHA256dfd64231860c732dced3dc78627a7844a08d5d3e4cd253fd81186bae33cc368a
SHA5123fcfa7c8f46220852dc7efef5b29caba86825d0461a35559f26dbb2540c487b92059713f42fe1082a00a711d83216db012835673e1c54120ffa079e154950854
-
C:\Users\CACASH~1\AppData\Local\Temp\RGI22F2.tmpFilesize
3KB
MD5a828b8c496779bdb61fce06ba0d57c39
SHA12c0c1f9bc98e29bf7df8117be2acaf9fd6640eda
SHA256c952f470a428d5d61ed52fb05c0143258687081e1ad13cfe6ff58037b375364d
SHA512effc846e66548bd914ad530e9074afbd104fea885237e9b0f0f566bd535996041ec49fb97f4c326d12d9c896390b0e76c019b3ace5ffeb29d71d1b48e83cbaea
-
C:\Users\CACASH~1\AppData\Local\Temp\wmsetup.logFilesize
527B
MD53b566bdd8562bbb5b28206f7a2ffe08c
SHA1a9084f667af3c283d060018d8ee00359c6f57d95
SHA2569bdbbc572e4238473e099907c3fd8d10e2a4a4cc1a0106ab0f69111fef3e8e6b
SHA512ef56ead5d2c89b06b4e686d76fec3c31a4916aae6be9bd97e2fccb1febe4463c903c29cf88c07a27c9d9340d1bf71ae28d5c79bd75a3ac032fb81834b7f88b2e
-
C:\Users\CACASH~1\AppData\Local\Temp\www3EBC.tmpFilesize
206B
MD5c2858b664c882dcce6042c40041f6108
SHA152eeaa0c7b9d17a8f56217f2ac912ba8fdc5041a
SHA256b4a6fb97b5e3f87bcd9fae49a9174e3f5b230a37767d7a70bf33d151702eff91
SHA51251522e67f426ba96495be5e7f8346e6bb32233a59810df2a3712ecd754a2b5d54d0049c8ea374bd4d20629500c3f68f40e4845f6bb236d6cca7d00da589b2260
-
C:\Users\Public\Desktop\Google Chrome.lnkFilesize
1KB
MD521e2af791854bef3f5b48b59009fba7a
SHA1d57b71a85df9c55654e02d806908d518a9aba3fb
SHA25625a0429284fd949964d2521663fca71917cb1f445f6ccdcab65f1deb12082813
SHA51238b6328b35c5c2a2bcc7a8f729cedaa0bb2cbbb3e383adde2ad78ebf4c6a0c110e1611e7b152f45b96c11470803f19c671f63e861608951daacdfa6b0f30f606
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exeFilesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exeFilesize
1010KB
MD5f8d3a0a73fbee1e94dcd0fedf9a31c4e
SHA171ef31102516e25e3b3aa347b5c697a85d237b16
SHA256ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c
SHA51281337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exeFilesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exeFilesize
869KB
MD55739bc2cafd62977daa950a317be8d14
SHA1f7f582e1863642c4d5a8341e2005c06c0f3d9e74
SHA256b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9
SHA512f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exeFilesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exeFilesize
651KB
MD5e12e7b53183d3b1c6cd53ef42aa815f8
SHA19dedb739590a02e37c82e54cc8eb3e0ce57248ee
SHA25663ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63
SHA5125e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exeFilesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exeFilesize
383KB
MD57c29db2ac66b846cc00ca802838c116b
SHA123f9d79f7cf7d5fb41111bf4896645d3989b4f11
SHA256e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b
SHA512a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7
-
\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeFilesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeFilesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exeFilesize
275KB
MD5ef9dd5707f37f0e2f802b3d7856e7bbc
SHA1e9cbeca90f2edece7174b0fcffe65f311b5b3689
SHA256de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf
SHA51224d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44
-
memory/1188-1037-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/1512-141-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-119-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-159-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-161-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-163-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-153-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-149-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-167-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-145-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-143-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-169-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-139-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-135-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-129-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-127-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-125-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-123-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-173-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-175-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-121-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-179-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-181-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-177-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-157-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-118-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-117-0x0000000002370000-0x00000000023B4000-memory.dmpFilesize
272KB
-
memory/1512-116-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB
-
memory/1512-115-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB
-
memory/1512-114-0x0000000000330000-0x000000000037B000-memory.dmpFilesize
300KB
-
memory/1512-113-0x00000000022E0000-0x0000000002326000-memory.dmpFilesize
280KB
-
memory/1512-171-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-1028-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB
-
memory/1512-1026-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB
-
memory/1512-165-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-155-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-151-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-1024-0x0000000004DF0000-0x0000000004E30000-memory.dmpFilesize
256KB
-
memory/1512-147-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-137-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-133-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1512-131-0x0000000002370000-0x00000000023AE000-memory.dmpFilesize
248KB
-
memory/1540-102-0x00000000011A0000-0x00000000011AA000-memory.dmpFilesize
40KB
-
memory/1952-1038-0x0000000002730000-0x0000000002731000-memory.dmpFilesize
4KB
-
memory/2028-2070-0x0000000001B60000-0x0000000001B61000-memory.dmpFilesize
4KB
-
memory/2028-2068-0x0000000001B60000-0x0000000001B61000-memory.dmpFilesize
4KB