Overview
overview
10Static
static
9by Ry0s [G...s].zip
windows10-2004-x64
1AURORAV1.rar
windows10-2004-x64
7AURORAV1/A...V1.exe
windows10-2004-x64
10$INTERNET_CACHE/Alot
windows10-2004-x64
1$INTERNET_...earing
windows10-2004-x64
1$INTERNET_...otions
windows10-2004-x64
1$INTERNET_...rotica
windows10-2004-x64
1$INTERNET_CACHE/Fcc
windows10-2004-x64
1$INTERNET_...ighter
windows10-2004-x64
1$INTERNET_...er.ps1
windows10-2004-x64
1$INTERNET_CACHE/Genre
windows10-2004-x64
1$INTERNET_...rrison
windows10-2004-x64
1$INTERNET_CACHE/Idea
windows10-2004-x64
1$INTERNET_...roduce
windows10-2004-x64
1$INTERNET_CACHE/Ld
windows10-2004-x64
1$INTERNET_...ipants
windows10-2004-x64
1$INTERNET_CACHE/Pulse
windows10-2004-x64
1$INTERNET_CACHE/Que
windows10-2004-x64
1$INTERNET_...chmond
windows10-2004-x64
1$INTERNET_...Tuning
windows10-2004-x64
1$INTERNET_...olence
windows10-2004-x64
1$INTERNET_CACHE/Wx
windows10-2004-x64
1AURORAV1/s...ts.dll
windows10-2004-x64
1README.txt
windows10-2004-x64
1Analysis
-
max time kernel
32s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 11:37
Behavioral task
behavioral1
Sample
by Ry0s [GoddyAvroraXploits].zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
AURORAV1.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
AURORAV1/AVRORA V1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
$INTERNET_CACHE/Alot
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$INTERNET_CACHE/Clearing
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
$INTERNET_CACHE/Emotions
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$INTERNET_CACHE/Erotica
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
$INTERNET_CACHE/Fcc
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$INTERNET_CACHE/Fighter
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
$INTERNET_CACHE/Forever.ps1
Resource
win10v2004-20240319-en
Behavioral task
behavioral11
Sample
$INTERNET_CACHE/Genre
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
$INTERNET_CACHE/Harrison
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$INTERNET_CACHE/Idea
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
$INTERNET_CACHE/Introduce
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$INTERNET_CACHE/Ld
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
$INTERNET_CACHE/Participants
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$INTERNET_CACHE/Pulse
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
$INTERNET_CACHE/Que
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$INTERNET_CACHE/Richmond
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
$INTERNET_CACHE/Tuning
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$INTERNET_CACHE/Violence
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
$INTERNET_CACHE/Wx
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
AURORAV1/scripts/scripts.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral24
Sample
README.txt
Resource
win10v2004-20240226-en
General
-
Target
AURORAV1/AVRORA V1.exe
-
Size
287.0MB
-
MD5
ae6a6df39b6c4c157233078507d95e11
-
SHA1
2a58a806431b91b0d08044e58293dc4493800718
-
SHA256
9ffaea98983a0fe1749a30f766267ca3a2a485247fbd6153492cea0decdf1fb5
-
SHA512
5948e3a6984742325698652072fcedcff22468dfcf4f2a62e50343e50aa5ff8a42da89510e8ccd010c03b14173e702736b1a05a38cea7a092a8080e1042d309b
-
SSDEEP
49152:NqttHg4EaM9b/+P5LCShPVJPuNJrdlaVtwI1EgBX:NQA4Ef5YNCSbWJRlCwIDBX
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Derived.pifdescription pid process target process PID 1920 created 3476 1920 Derived.pif Explorer.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AVRORA V1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation AVRORA V1.exe -
Executes dropped EXE 2 IoCs
Processes:
Derived.pifDerived.pifpid process 1920 Derived.pif 1384 Derived.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Derived.pifdescription pid process target process PID 1920 set thread context of 1384 1920 Derived.pif Derived.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 5020 tasklist.exe 2676 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Derived.pifpid process 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exetasklist.exedescription pid process Token: SeDebugPrivilege 5020 tasklist.exe Token: SeDebugPrivilege 2676 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Derived.pifpid process 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Derived.pifpid process 1920 Derived.pif 1920 Derived.pif 1920 Derived.pif -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
AVRORA V1.execmd.exeDerived.pifdescription pid process target process PID 1828 wrote to memory of 3528 1828 AVRORA V1.exe cmd.exe PID 1828 wrote to memory of 3528 1828 AVRORA V1.exe cmd.exe PID 1828 wrote to memory of 3528 1828 AVRORA V1.exe cmd.exe PID 3528 wrote to memory of 5020 3528 cmd.exe tasklist.exe PID 3528 wrote to memory of 5020 3528 cmd.exe tasklist.exe PID 3528 wrote to memory of 5020 3528 cmd.exe tasklist.exe PID 3528 wrote to memory of 4824 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 4824 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 4824 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 2676 3528 cmd.exe tasklist.exe PID 3528 wrote to memory of 2676 3528 cmd.exe tasklist.exe PID 3528 wrote to memory of 2676 3528 cmd.exe tasklist.exe PID 3528 wrote to memory of 3192 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 3192 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 3192 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 3000 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 3000 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 3000 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 2272 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 2272 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 2272 3528 cmd.exe findstr.exe PID 3528 wrote to memory of 3308 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 3308 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 3308 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 4608 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 4608 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 4608 3528 cmd.exe cmd.exe PID 3528 wrote to memory of 1920 3528 cmd.exe Derived.pif PID 3528 wrote to memory of 1920 3528 cmd.exe Derived.pif PID 3528 wrote to memory of 1920 3528 cmd.exe Derived.pif PID 3528 wrote to memory of 2000 3528 cmd.exe PING.EXE PID 3528 wrote to memory of 2000 3528 cmd.exe PING.EXE PID 3528 wrote to memory of 2000 3528 cmd.exe PING.EXE PID 1920 wrote to memory of 1384 1920 Derived.pif Derived.pif PID 1920 wrote to memory of 1384 1920 Derived.pif Derived.pif PID 1920 wrote to memory of 1384 1920 Derived.pif Derived.pif PID 1920 wrote to memory of 1384 1920 Derived.pif Derived.pif PID 1920 wrote to memory of 1384 1920 Derived.pif Derived.pif
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\AURORAV1\AVRORA V1.exe"C:\Users\Admin\AppData\Local\Temp\AURORAV1\AVRORA V1.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c move Emotions Emotions.bat && Emotions.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c md 26924⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MasBathroomsCompoundInjection" Participants4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 2692\Derived.pif + Richmond + Alot + Genre + Fighter + Violence + Ld + Que 2692\Derived.pif4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Pulse + Fcc + Idea + Tuning + Wx + Erotica + Harrison + Introduce + Clearing + Forever 2692\X4⤵
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\2692\Derived.pif2692\Derived.pif 2692\X4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\2692\Derived.pifC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\2692\Derived.pif2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\2692\Derived.pifFilesize
28B
MD58aa97c77b47172bf01434da95ae35957
SHA1d5003133030a8b3162a37107a374bdc400d21957
SHA256a797eb9f33292fd5cca5c741701b2aab9ac05662f9ae3b482352e326f73da04e
SHA512cbe77641809b8ba3257d41b00d9e603a5a284488c20314a8d309d358e8a5793cacc8f3080842b98ec11a95d681882f93e2449b3594d7057c7d4625ceada4ac8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\2692\Derived.pifFilesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\2692\XFilesize
2.1MB
MD5beb3f0d399c7da3a192de72accf35183
SHA1e4b5269f0ca802f2a4adc4a93a3e9e340d8bdf44
SHA2569d0e68ada3981817c12ff96f97df74d3d8f6578bc5a9f7b59e9d2b2a5f2ff859
SHA51268ba394a9980ab20dd6a8c16f6b5323c6b90cb209ef835eb346091b2071bc2d5d789c5a2f1cdc215aa435199fc0ccb24b12d392fadc0ba9ec4ef365ed214ad10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\AlotFilesize
46KB
MD52f9f83a1d508d78c3672034a43a293c5
SHA11f7baf69f61e749464fd6e1e4569e9a22de1c548
SHA2560634b38196d73953401fb0348cc208625f40dc70979f13ed754277ba7fbfd291
SHA5129c5fc69233d983567ffaf9adc3b3305f454d116743ae481c9bf57d245b4a055ab5938848ee85c87b5c71f3e2c6b4f1e4cd1adf1574bcb98098080ebf0edbebf7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\ClearingFilesize
220KB
MD51ef4da14132bef6a979acd1456d98f3d
SHA159f9ffeef09845224ac57508738ae9b69e1dd1b7
SHA256b813cfbd43195490ca29f9dc59e94bef9fb9f4e76ee0b43c16d5b16884bae5a1
SHA51246b9a18853f14a9c36c4a9eea347ead634cb6db25a55a00c793eec7b1a7d4715c45263355d1800c81778174b57a17e77a250b0a89da59a64a855d909e4f5355d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\EmotionsFilesize
12KB
MD55d2e99be0f015f8dd0ea396e18298b36
SHA1ef6046177d89c2d4a8382a81b350702cac319112
SHA25692951dd31f519369d41dd38f33d2413218e80719b0df7d644ab802631f5034a3
SHA512e9aa8c20ed343fcfd899aada6c9ff5aecbd5a851ed153884da285732fb961d42ca096152e60c7fecd69fcc67853eb6285b8fed43e289af61c5bef25c93d51098
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\EroticaFilesize
287KB
MD5267b5e481037717e735391deeea0ff8f
SHA17fe2ac9c02bc53c1fb889f206aa51aa6da794f36
SHA256afc7e1a378b9d972854c5a83ceb498b7bcd590a4841e2f34dcce9f5249de71ab
SHA5121288a15102d756ff21a72023a24ef428b556358b37c5ec26d17aafcfab10b558b3f453cc9d481c1c4c851410190f812f9c94cc11f8cb1ee9fbe577b25ef8ac03
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\FccFilesize
209KB
MD53b5281a40da51473173ae333354a4708
SHA11caa01b6ce05f28d3df1e93b9edad31116fd8782
SHA25606e0cded6103f91778bb311d7771ed13e39509c44fe659cd28ce4b0afe69f553
SHA51250538e36aeca1182cb9c368976d8b3816fa7cc9fb017269d4a1e6f7608ca0db227e343038d29ca483461eeed6812717b9d6227d7e980dbb8c3cd332e5da14dee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\FighterFilesize
166KB
MD555bc4dc42166555b8a6f011c7f9ad209
SHA1310e974352ee2e7ef63a91af925947a77cac6eba
SHA256284bcbdf5593032547c119847d9d4a6359b400a74f13fa9d3774181d6be248c6
SHA512f793c981720747f49eab38838d97458d4625ee0ee790e7a79319489c4d1bbae11b9f9c23e33609e35b15d476d5c084f77164332f654ed8040ce7c4d8faf54252
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\ForeverFilesize
46KB
MD5cdc1c1777ae9a8548ef73e3d8d3cb771
SHA1ab9e4243eff32ab19c709c57ebd8a826b226646b
SHA256e5909739456e96f48ede99e430190574db9593ec2ef32009557cffa71f141fba
SHA5122f384cf0a24ba04c117d8fa00f757b0bd9ce7a333182eff3d8927bd80c068d4ad9bbfa1b90f904c974162d843e65ef450c938ce13a7ac6b64a1393202d1fc3d0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\GenreFilesize
257KB
MD5e250dae40537d592778b9502cf8227fb
SHA1303369f3adaec712570adc4c56ac5bea64e365f1
SHA2561a6dab9fd80044680137ec4073c4963ec28341361a44ec5d710d4bea67a21074
SHA5125bd19c4b18cdeb27be1470758efe724da9a123b857a849e742bd110f22fc6caaf65590d1628b3869a7427a8b67cfd3e63b6f42d23d0fe08d3e8a0f1d6ede65b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\HarrisonFilesize
204KB
MD5d48f0066bbbae76cf753fa44ba32c1e3
SHA14afa385545e4f98cb7c64caa5da8b15018d3a518
SHA2563cf27be352bcd2994403a9af6300d36c0390089a1d768df2d307e92edb0b3ac5
SHA51213bc1212d2de7146d00bbb03f5f0cfe93a2ae2d077311e54859239d84e772cc0881d83ba28de3010418685e8f10de218f06a526994b8cd6b3ffbc921ec92a86a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IdeaFilesize
277KB
MD50f1de8c0e038c0275860fd290b02c4d8
SHA125de651d877c2a413cf67b96c1606600d86b25d5
SHA2564f4bc55aed3199ab69af774d87a48890c5ebc470719cb94ebb3e9691cc7aa84e
SHA51294ebf780cdfdd68b1e5f5de76037adea1d2a7b207af06ec64907d966767987a72db7c727d819578e20eecbb29eef8f60cc69eb4150f3ad660e42394ee69c9899
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IntroduceFilesize
251KB
MD54365b4a8e5a9f7d34d242d83148d37c9
SHA191d4dea7b5f2a4bdb8de6a4f01202d7c7017cbd0
SHA256a0f8eecc85f3d72f066bfd72605132c745f849b8fb10eba610c9460b6c2e687b
SHA512ed17236d833fa4475d1683b8660ec8243c09b2ef5d278968e317670048661b225ca0a5006c8c506ebeb22814b046e26fe64c34f8c2d6d813874b2f4c6e37d423
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\LdFilesize
171KB
MD50fc4b1c389fa315ae8563d2c3ebc636b
SHA1e03df5eb60d707bb7c1ad29e42e83feb47983672
SHA256ff9bf8a27b8a03935494646154d9eff8e565452041c3cf52c8b76bf2fb0c996b
SHA5124d9aa3cc48836a7b5d5ea9af67b25582febadc7c13ab4ffe202523558cf393ebdb39b4ee1be916e19d5389ca234b41c824bdc553f1d47bd36ddf3d63b34f09df
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\ParticipantsFilesize
59B
MD5df7fa3ba9a23cdb72499f49026149b1b
SHA1167a471297e7e1f9de2d51233453788fd0a1227b
SHA256e4754b247074cc987484c9f2a38903ab11b88a9bcff87e4f9f31986fcc4334cb
SHA5129843fcc8c2a2fd032f6366341ad7bc69b33fe7791dc4f9cf7793d7aecbe8c9340dcaeba9e1d771b35acebde2d027bc8bd804d9133038758fbbba6589e84fbc3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\PulseFilesize
261KB
MD51acfe30f6c52692e861389771d895a25
SHA13ab030b1694910c721974e0f1b17625d28bd8404
SHA2562301e62606fc0bce2d842c479d9c1795d18865253ae4fbe47584f0b6c5c458dc
SHA5124241ca04a9f7b0af070af8f776ce8c450745c62af61e1eec2c4ce59e0b26d9e7f42a35093e7128336396f3ca402805a5073b9967f65e3a7d01c7e533174a71dd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\QueFilesize
10KB
MD5f216efd0e80184e0d79622683db9295a
SHA1919909b47e5c12ebaab598e9b0f50e1c21824d0c
SHA256b134655bdf6d40b5ffef9022258559e2fc1d16a07b1fc787953afdd83bce7ac1
SHA512b5127430ca8eea6630117158b26a8c1e2460d447388e8254613f5a522b4a90b3eb9ccdc652eec11afdbd2b56630abcd213104ba116e7327057644e6c3ef58455
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\RichmondFilesize
147KB
MD53c370bf91af8951f8239bee8271aed1c
SHA13c119efa24464782f44616ccef5acbe9e05ab6d4
SHA256ee2f4d8bd7ca8ec5ffd4748359e9b2206b8a057a7b9b101a5442920cf8ec1a92
SHA512c1d4c820b055a66101c71f519e860f9db3631676401f91c2391c8ac21e851aea6b1156939f95393369041e379071078c5ceba60d9b22528dcb6802a98df18b7d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\TuningFilesize
207KB
MD5dba4b4595f4d9c99d69154aa0f42b4bd
SHA1cb19ba14ea855bd2737aa35b027ab4fd10297891
SHA25630f642a61d77c6ee9696b3d5a1d005ec480173d54b7856ed8e8ff38c5dda8b04
SHA512529df12751251575ae545da26e2764d5d7641950c2be746598308774cadee0a936d94c9aa0f3d7820487a54b5095b6904bc65c38378c7d95aa44c25046d9986e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\ViolenceFilesize
124KB
MD5686da1e809252566fa97937e1188cae0
SHA16ba10ebcc5e08f97bbc301abb9a5831614ac1de0
SHA256556debffc737309044830063f82360a44faddd2cae5815311c985b9f989d3140
SHA512343cef200d3b716da927a1fa7170518cdbfa5c3258da7146b862e49abaa60bb831de23f09c4c9b9da55ee31056abe3e0fa35e62f8ce33f1a8e7c54fbe4f87b7c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\WxFilesize
212KB
MD5ec3efd198fbe9a0f73fd23578aca60c0
SHA177899232753f45275e2d05bf565ae90cba2f875b
SHA256847206f6fa8e78dd46542d742d3bf7c3675b07ff9777d58f638d22fb101b0e14
SHA5125514e280866a7863110afe7bdca78d9036e148213b4d32ac1b4d99358962954e2aa3b60cfd0051b2999e313c4fb4b8a92f8835e623748ef5870cc031da298d7b
-
memory/1384-48-0x0000000001200000-0x0000000001352000-memory.dmpFilesize
1.3MB
-
memory/1384-49-0x0000000001200000-0x0000000001352000-memory.dmpFilesize
1.3MB
-
memory/1384-51-0x0000000001200000-0x0000000001352000-memory.dmpFilesize
1.3MB
-
memory/1920-45-0x0000000076F91000-0x00000000770B1000-memory.dmpFilesize
1.1MB
-
memory/1920-46-0x0000000000B40000-0x0000000000B41000-memory.dmpFilesize
4KB