Analysis

  • max time kernel
    408s
  • max time network
    426s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-03-2024 07:13

Errors

Reason
Machine shutdown

General

  • Target

    http://h

Malware Config

Signatures

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (88) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables RegEdit via registry modification 4 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://h
    1⤵
      PID:3968
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4500 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
      1⤵
        PID:940
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5268 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
        1⤵
          PID:2548
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5736 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:1552
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5508 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:2120
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5872 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
              1⤵
                PID:3676
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=4220 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                1⤵
                  PID:4300
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=4828 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                  1⤵
                    PID:4412
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=5476 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                    1⤵
                      PID:3116
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --mojo-platform-channel-handle=6084 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                      1⤵
                        PID:1548
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4668 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                        1⤵
                          PID:4244
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --mojo-platform-channel-handle=5968 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                          1⤵
                            PID:2228
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5928 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                            1⤵
                              PID:3456
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --mojo-platform-channel-handle=4100 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                              1⤵
                                PID:1716
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --mojo-platform-channel-handle=6168 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                1⤵
                                  PID:732
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --mojo-platform-channel-handle=6360 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                  1⤵
                                    PID:4968
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --mojo-platform-channel-handle=6232 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                    1⤵
                                      PID:1372
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6180 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                      1⤵
                                        PID:4176
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=6728 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                        1⤵
                                          PID:4316
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6772 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                          1⤵
                                          • Modifies registry class
                                          PID:1432
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --mojo-platform-channel-handle=6564 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                          1⤵
                                            PID:5164
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --mojo-platform-channel-handle=6932 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                            1⤵
                                              PID:5172
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --mojo-platform-channel-handle=7212 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                              1⤵
                                                PID:5336
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=6300 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                                1⤵
                                                  PID:5468
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --mojo-platform-channel-handle=6212 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                                  1⤵
                                                    PID:5476
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --mojo-platform-channel-handle=6224 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                                    1⤵
                                                      PID:5592
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=7624 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                                      1⤵
                                                        PID:5776
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7732 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                                        1⤵
                                                          PID:5836
                                                        • C:\Users\Admin\Downloads\Annabelle.exe
                                                          "C:\Users\Admin\Downloads\Annabelle.exe"
                                                          1⤵
                                                          • Modifies WinLogon for persistence
                                                          • Modifies Windows Defender Real-time Protection settings
                                                          • UAC bypass
                                                          • Disables RegEdit via registry modification
                                                          • Sets file execution options in registry
                                                          • Adds Run key to start application
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:6100
                                                          • C:\Windows\SYSTEM32\vssadmin.exe
                                                            vssadmin delete shadows /all /quiet
                                                            2⤵
                                                            • Interacts with shadow copies
                                                            PID:5440
                                                          • C:\Windows\SYSTEM32\vssadmin.exe
                                                            vssadmin delete shadows /all /quiet
                                                            2⤵
                                                            • Interacts with shadow copies
                                                            PID:5464
                                                          • C:\Windows\SYSTEM32\vssadmin.exe
                                                            vssadmin delete shadows /all /quiet
                                                            2⤵
                                                            • Interacts with shadow copies
                                                            PID:5496
                                                          • C:\Windows\SYSTEM32\NetSh.exe
                                                            NetSh Advfirewall set allprofiles state off
                                                            2⤵
                                                            • Modifies Windows Firewall
                                                            PID:5392
                                                          • C:\Windows\System32\shutdown.exe
                                                            "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                            2⤵
                                                              PID:2184
                                                          • C:\Users\Admin\Downloads\Annabelle.exe
                                                            "C:\Users\Admin\Downloads\Annabelle.exe"
                                                            1⤵
                                                            • Modifies WinLogon for persistence
                                                            • Modifies Windows Defender Real-time Protection settings
                                                            • UAC bypass
                                                            • Disables RegEdit via registry modification
                                                            • Sets file execution options in registry
                                                            • Adds Run key to start application
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:6108
                                                            • C:\Windows\SYSTEM32\vssadmin.exe
                                                              vssadmin delete shadows /all /quiet
                                                              2⤵
                                                              • Interacts with shadow copies
                                                              PID:5452
                                                            • C:\Windows\SYSTEM32\vssadmin.exe
                                                              vssadmin delete shadows /all /quiet
                                                              2⤵
                                                              • Interacts with shadow copies
                                                              PID:5364
                                                            • C:\Windows\SYSTEM32\vssadmin.exe
                                                              vssadmin delete shadows /all /quiet
                                                              2⤵
                                                              • Interacts with shadow copies
                                                              PID:5388
                                                            • C:\Windows\SYSTEM32\NetSh.exe
                                                              NetSh Advfirewall set allprofiles state off
                                                              2⤵
                                                              • Modifies Windows Firewall
                                                              PID:2612
                                                            • C:\Windows\System32\shutdown.exe
                                                              "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                              2⤵
                                                                PID:1196
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --mojo-platform-channel-handle=7224 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                                              1⤵
                                                                PID:5400
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=6928 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                                                1⤵
                                                                  PID:2716
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6236 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
                                                                  1⤵
                                                                    PID:5896
                                                                  • C:\Windows\system32\vssvc.exe
                                                                    C:\Windows\system32\vssvc.exe
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:572
                                                                  • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                    "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                    1⤵
                                                                      PID:3316
                                                                    • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                      "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                      1⤵
                                                                        PID:2948
                                                                      • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                        "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                        1⤵
                                                                        • Drops startup file
                                                                        • Adds Run key to start application
                                                                        • Drops desktop.ini file(s)
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Program Files directory
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:5584
                                                                      • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                        "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                        1⤵
                                                                          PID:5848
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --mojo-platform-channel-handle=7064 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:1
                                                                          1⤵
                                                                            PID:9064
                                                                          • C:\Windows\system32\LogonUI.exe
                                                                            "LogonUI.exe" /flags:0x4 /state0:0xa390d855 /state1:0x41c64e6d
                                                                            1⤵
                                                                              PID:7472

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-3FC71F31.[[email protected]].ncov

                                                                              Filesize

                                                                              2.0MB

                                                                              MD5

                                                                              7ac7c8fb3f9e62a08f18a3dd8069f72d

                                                                              SHA1

                                                                              8a4cd5a64d59b45efc6ecd11f74a1d3f24ff39e2

                                                                              SHA256

                                                                              94b2ab8a853f4da79778c284233f54086ff7f85bb8613508dc9ec5ee8eaa62a4

                                                                              SHA512

                                                                              c45b8e3000a950f6e32c33b8b8ae1862407954e3ad88245a6ac7a8f80466bffa72ceab3754c70021fc7f5b2b7c6f7838f41cea564e0c5c70759c81dd5f0bb2bd

                                                                            • C:\Save1.txt

                                                                              Filesize

                                                                              11B

                                                                              MD5

                                                                              c574673963f5deaa865000217e2b05ec

                                                                              SHA1

                                                                              bc00804848ce6b87fdb52aa5c0dca96138fb3512

                                                                              SHA256

                                                                              3b3ccb221b8715d0cd71a858d7024a3ebbcaa3507d7e1866f05dce4a75ad6362

                                                                              SHA512

                                                                              08fcf72301e768eef7d2724a5bf3037a1984ee937ba6fa6545f9389eec8cddb2b04a92240f1c570c6a743628f221207f9f106b7737265082ffdf01f66eb8843c

                                                                            • C:\Users\Admin\Pictures\ReadEnter.wmf.ANNABELLE

                                                                              Filesize

                                                                              299KB

                                                                              MD5

                                                                              85d1f16f80097de170240b6f282d116a

                                                                              SHA1

                                                                              7c9d0a66d71ee41e79bc3ad36b5ac32128002831

                                                                              SHA256

                                                                              8a55c6ad8efed15278e386b033545a13bbe1a30381caf1fe0be8aed85170d4eb

                                                                              SHA512

                                                                              a646ed6c290324ac6fbf308a8d9e0b778ac075f391cb3e354b6f0b1d34e743aae0cc1f6d2f3218d2284d7b06e26125e46962ba5dc49afaaf687399ba357e7c03

                                                                            • C:\Users\Admin\Pictures\UninstallUnblock.bmp.ANNABELLE

                                                                              Filesize

                                                                              172KB

                                                                              MD5

                                                                              10a292940293f9094349bfb929093243

                                                                              SHA1

                                                                              fade255feef2bc57c4ba755ed624fc68520750cc

                                                                              SHA256

                                                                              878066128872ade52c27e2793c46d9f78f8b2f7a73856564fcd80ab9e5e87050

                                                                              SHA512

                                                                              9b4edff472104a98a58b1df3e8e7b145c1bb9f78dec18386cc58b39a4b85d6587ad8a16ed72666b63965f3b21e4668c82f26922d6cd45fc29fe3583103affa91

                                                                            • memory/2948-30-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/2948-578-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/2948-149-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/3316-150-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/3316-33-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/3316-1802-0x000000000A5C0000-0x000000000A5F4000-memory.dmp

                                                                              Filesize

                                                                              208KB

                                                                            • memory/3316-579-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/5584-51-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/5584-163-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/5584-145-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/5848-577-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/5848-144-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/5848-67-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/6100-3-0x000001E5D9CF0000-0x000001E5DB27E000-memory.dmp

                                                                              Filesize

                                                                              21.6MB

                                                                            • memory/6100-2-0x00007FFD75820000-0x00007FFD762E1000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/6100-4-0x000001E5C14B0000-0x000001E5C14C0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/6100-62-0x00007FFD75820000-0x00007FFD762E1000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/6100-0-0x000001E5BE810000-0x000001E5BF804000-memory.dmp

                                                                              Filesize

                                                                              16.0MB

                                                                            • memory/6100-5986-0x00007FFD75820000-0x00007FFD762E1000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/6108-1-0x00007FFD75820000-0x00007FFD762E1000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/6108-55-0x00007FFD75820000-0x00007FFD762E1000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/6108-5985-0x00007FFD75820000-0x00007FFD762E1000-memory.dmp

                                                                              Filesize

                                                                              10.8MB