Overview
overview
7Static
static
3windirstat...up.exe
windows7-x64
7windirstat...up.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$_5_.exe
windows7-x64
7$_5_.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3shfolder.dll
windows7-x64
1shfolder.dll
windows10-2004-x64
1wdsh0407.chm
windows7-x64
1wdsh0407.chm
windows10-2004-x64
1wdsh040e.chm
windows7-x64
1wdsh040e.chm
windows10-2004-x64
1wdsh0415.chm
windows7-x64
1wdsh0415.chm
windows10-2004-x64
1wdsr0405.dll
windows7-x64
1wdsr0405.dll
windows10-2004-x64
1wdsr0407.dll
windows7-x64
1wdsr0407.dll
windows10-2004-x64
1wdsr040a.dll
windows7-x64
1wdsr040a.dll
windows10-2004-x64
1wdsr040b.dll
windows7-x64
1wdsr040b.dll
windows10-2004-x64
1wdsr040c.dll
windows7-x64
1wdsr040c.dll
windows10-2004-x64
1wdsr040e.dll
windows7-x64
1wdsr040e.dll
windows10-2004-x64
1Analysis
-
max time kernel
95s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
windirstat1_1_2_setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
windirstat1_1_2_setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$_5_.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$_5_.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
shfolder.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
shfolder.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
wdsh0407.chm
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
wdsh0407.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
wdsh040e.chm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
wdsh040e.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
wdsh0415.chm
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
wdsh0415.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
wdsr0405.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
wdsr0405.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
wdsr0407.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
wdsr0407.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
wdsr040a.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
wdsr040a.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
wdsr040b.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
wdsr040b.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
wdsr040c.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
wdsr040c.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
wdsr040e.dll
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
wdsr040e.dll
Resource
win10v2004-20231215-en
General
-
Target
windirstat1_1_2_setup.exe
-
Size
630KB
-
MD5
3abf1c149873e25d4e266225fbf37cbf
-
SHA1
6fa92dd2ca691c11dfbfc0a239e34369897a7fab
-
SHA256
370a27a30ee57247faddeb1f99a83933247e07c8760a07ed82e451e1cb5e5cdd
-
SHA512
b6d9672a580a02299bc370deb1fd99b5ca10ab86456385870cdae522c185ae51f8d390a7c50fcb5c7898523f52c834bb73515ffc6d0b0bcde210640e815ece9e
-
SSDEEP
12288:yCjeMsiGVBKvjxTNlZaLlcMj+wXZvQpd9nP2+ZMU2tYspZcMwr/GNd35:yCjeTZa7BTsxewXZUTP2HU2yawjY5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windirstat.exepid process 4328 windirstat.exe -
Loads dropped DLL 3 IoCs
Processes:
windirstat1_1_2_setup.exepid process 4952 windirstat1_1_2_setup.exe 4952 windirstat1_1_2_setup.exe 4952 windirstat1_1_2_setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windirstat.exedescription ioc process File opened (read-only) \??\F: windirstat.exe File opened (read-only) \??\D: windirstat.exe -
Drops file in Program Files directory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription ioc process File created C:\Program Files (x86)\WinDirStat\Uninstall.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.exe windirstat1_1_2_setup.exe File created C:\Program Files (x86)\WinDirStat\windirstat.chm windirstat1_1_2_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\WinDirStat\Uninstall.exe nsis_installer_1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msedge.exepid process 1360 msedge.exe 1360 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
windirstat.exepid process 4328 windirstat.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
windirstat.exedescription pid process Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe Token: SeBackupPrivilege 4328 windirstat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
windirstat.exepid process 4328 windirstat.exe 4328 windirstat.exe 4328 windirstat.exe 4328 windirstat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
windirstat1_1_2_setup.exedescription pid process target process PID 4952 wrote to memory of 4328 4952 windirstat1_1_2_setup.exe windirstat.exe PID 4952 wrote to memory of 4328 4952 windirstat1_1_2_setup.exe windirstat.exe PID 4952 wrote to memory of 4328 4952 windirstat1_1_2_setup.exe windirstat.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc896646f8,0x7ffc89664708,0x7ffc896647181⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"C:\Users\Admin\AppData\Local\Temp\windirstat1_1_2_setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\WinDirStat\windirstat.exe"C:\Program Files (x86)\WinDirStat\windirstat.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4564749699002177473,17622881685101198986,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:21⤵PID:3520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,4564749699002177473,17622881685101198986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,4564749699002177473,17622881685101198986,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:81⤵PID:3188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4564749699002177473,17622881685101198986,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:11⤵PID:1716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4564749699002177473,17622881685101198986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:11⤵PID:2436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4564749699002177473,17622881685101198986,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:11⤵PID:2536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4564749699002177473,17622881685101198986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:11⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\WinDirStat\Uninstall.exeFilesize
46KB
MD5a127e6118b9dd2f9d5a7cc4d697a0105
SHA19ac17d4dcf0884ceafacf10c42209c0942dfe7a8
SHA256afc864cfce79b2a6add491a27ea672d958233ed7a97a2cbbce60100d2fa1e670
SHA5120e57d2856c02c55d477d9b3cc1d4bf5ffa3650d4b20be18b0a9e614d19143aee325c4cd92ff31bbddf6e93cd3ebeb47d8727de6e25faa366341cc71117122065
-
C:\Program Files (x86)\WinDirStat\windirstat.chmFilesize
50KB
MD51bddb8a0e0f9cd90a5b3936ec2c2c4cf
SHA1c8302168fb532fe03e76cb8a82aa53b49ee0bc44
SHA2561e87c07744054709d271337d8ce06929429b334d70875605cb68ecc4c6610cd1
SHA512b857de9026b3eab13f4dbc464e6403835e3a61e5e9e3566735bf1ddd8dedc4ecf08807b27207bd8b385250b71ea234b301dd49e6f3c90f1270ae03868c035472
-
C:\Program Files (x86)\WinDirStat\windirstat.exeFilesize
636KB
MD524cd9a82fcfc658dd3ae7ba25c958ffb
SHA126e14a532e1e050eb20755a0b7a5fea99dd80588
SHA256cc3ee246f2710dc9ba9e2a88e3192b88f1db4caa2eefb8641642a33df04e585c
SHA5124de675be1f7d618d133ef24765a027840473e0c5bc93550d5e5fdbf078edc74c2241e6e3cd8753517e2954c7f09b9909028de7b727294d723fb5700658c7979d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_0Filesize
44KB
MD5d1f604157b0745a40453afb93a6caa42
SHA13d5d77429b03674ebb0ba34d925ba1b09310df5e
SHA256468456974fd86b33647942820dce7284879acfab9e9e6eca008e1fdcf9006fb5
SHA5120644ce93724a57dedd8aec208e5a038e323a1b9871d5046d58a87c60479626693e6c8f25b7c7f7b60fd35aac133d2e660ecbd8f8d579ad1fc6703ae117a485a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_1Filesize
264KB
MD52cca7c4d73f79a05a1d5db248dd1eed1
SHA17170fb834eaf8992c030f2728c7cf8a8553b2648
SHA2560432886deb2fc21ba1ad9d879c5a3901bd81bfd8a232f8f447fe437c9b95b3fe
SHA512e5b095e2e4441d1e942f91ee4f046810a97ff938fea09bca23601109b56e4b4792fcae9650c1f988b0b387a6bb8f7ba8fd9d43be2cc8f82039c809b9c98f3d2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Temp\nsb7EC.tmp\InstallOptions.dllFilesize
14KB
MD59b2ad0546fd834c01a3bdcbfbc95da7d
SHA14f92f5a6b269d969ba3340f1c1978d337992a62c
SHA2567e08cb4ff81dbb0573c672301681e31b2042682e9a2204673f811455f823dd37
SHA5125b374fe7cc8d6ff8b93cfcc8deae23f2313f8240c998d04d3e65c196b33c7d36a33930ffd481cdd6d30aa4c73dd2a1c6fe43791e9bf10bd71b33321a8e71c6b8
-
C:\Users\Admin\AppData\Local\Temp\nsb7EC.tmp\System.dllFilesize
10KB
MD54125926391466fdbe8a4730f2374b033
SHA1fdd23034ada72d2537939ac6755d7f7c0e9b3f0e
SHA2566692bd93bcd04146831652780c1170da79aa3784c3c070d95fb1580e339de6c5
SHA51232a1cf96842454b3c3641316ee39051ae024bdce9e88ac236eadad531f2c0a08d46b77d525f7d994c9a5af4cc9a391d30ee92b9ec782b7fb9a42c76f0f52a008
-
C:\Users\Admin\AppData\Local\Temp\nsb7EC.tmp\ioSpecial.iniFilesize
798B
MD59e471ea6086d9b59907b0bc372ea9c4a
SHA186654ad4318d8880027de8a99899fc06aabc7e00
SHA256f2bcc02745cb635f85722720aac87bf24064c7ad0b06041752f696a5eaf78a1a
SHA512c958d30b689fb9cfa8df671489e2dba2cf976f7197e8a6ba11c7c0bdc2343a492a94baa0580069565c8897006b6408fa369ca3d604d771318fbb7343957635a4
-
C:\Users\Admin\AppData\Local\Temp\nsb7EC.tmp\ioSpecial.iniFilesize
724B
MD54dd99290e028e44c81fc006cebe234d7
SHA1d0e97431f2e26cd583f2fcd2d4e7c8d87391a259
SHA256e5efeaa51ae6553fefa799deaf3122ca3e3f0fef52647aff85afd2bd05f3e8ac
SHA5129fa751aecdcc1a5fc591663822d7d26b26995ff52752bf3b75d427452a841c22fac61111cc664dd33131c2d409723672a14c6705c1fcaf09deb6ef14ae06cc49
-
C:\Users\Admin\AppData\Local\Temp\nsb7EC.tmp\ioSpecial.iniFilesize
789B
MD50911dc38642e47b4fd9b7efc8162487f
SHA11153ec26d584780b68c94377c763ec1b46a26824
SHA256ca3dd714022862fa9ad97054bc651469d7dbeb4ddcdc421df75f3786bb7a7a6d
SHA5122e7fb5d507652748e3cdcb192948ca64a35d7d383408ee2d04aa1ad0f30b67d99ec4e34d0d891db3d37d767168d22fbf982a3e6e878513b805bfb2e5f5675bc3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Help (ENG).lnkFilesize
1KB
MD59b96d4713e65e3f47cac0bf0ba2235a2
SHA125546db2ddb78a231f46bc8be4abb26003bc4d48
SHA25614898451cdbd3849c6db717bee9abd6d8f2a669762a7d7fd4605a57ef2919b04
SHA5126efd3b4d0fe050b17322182ac45ac86e883723fc9796394ca4afff8afaa48390980c00dc0ff48da61f75794ce295f1c3c1c6a67bb6391b9da3ef12eeb5c785df
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\Uninstall WinDirStat.lnkFilesize
1KB
MD50e1a9b9abdc730268a2d950e1d7ac03d
SHA14acab5ea4ea3c0c93e521b5a65e9702dc1c07525
SHA256c2effb1685707e9ab9e1796b83fff193090a8429c28fc79e8b64b9698321b81e
SHA512e67a2999142545e1dffbc1b8a91f2cf8c01feef07774780f0bb54245d452097d58ca04f983146cb58c045d34bc558c6849a36f30546ce485509bdb088f521910
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinDirStat\WinDirStat.lnkFilesize
1KB
MD5d8770d0318817e14bbaa5d377de0eeec
SHA1da5416b60d4a05326d07aba4e85c3aa01958d2bb
SHA256f846436b8f21a41675290ea14a23222c7ebc6fe1ccb0b4c46ec0324c2472ac2a
SHA51271588b5ef75945ef9eb196b053aa6df8871d06f0a83f3387b7fff55b3824337f54045928b47ecaabef1d1f40c622eedf89010fe104a1ed4b4549c814798800e1
-
C:\Users\Admin\Desktop\WinDirStat.lnkFilesize
1KB
MD56915cf292978c6e480ee18b608c328d1
SHA144bf333809755ccd13c67bc383e37080591cb3f8
SHA2566b05ec464a841f03a83e3f1fdfd3ccdee5654c4982bcaa43b1ab05e540b26408
SHA512523f27f92ad8511303400576f58ee25bbfa59489a6faed73f3d515cfcdb5d68a1e0c6ff8f09798433fa80276837625deb125fbdd19213e820f13af0491461441
-
\??\pipe\LOCAL\crashpad_1788_MZJBHBXILAUURMWEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e