Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe
Resource
win7-20240508-en
General
-
Target
bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe
-
Size
74KB
-
MD5
46d409810632a27f2d92454314d56f36
-
SHA1
b93c3ae289a74ed53aea07dd97b6b1f5dbe39008
-
SHA256
bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1
-
SHA512
18469877a470e50b74ed00dc734cab0a7456de4c35c670d7d68345cee43217470f4438ebabc30d892a301afc5feeba0f3b2834907ac8d2c4fb3ff5c50ec53015
-
SSDEEP
1536:/tmSe+Zk78NR3dN5nPAEToa9D4ZQKbgZi1dst7x9PxQ:/xe+a+3dN5QlZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2560 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exebdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exepid process 2676 Logo1_.exe 2960 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2560 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe File created C:\Windows\Logo1_.exe bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exeLogo1_.exepid process 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe 2676 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exenet.exeLogo1_.exenet.execmd.exenet.exedescription pid process target process PID 2400 wrote to memory of 2512 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe net.exe PID 2400 wrote to memory of 2512 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe net.exe PID 2400 wrote to memory of 2512 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe net.exe PID 2400 wrote to memory of 2512 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe net.exe PID 2512 wrote to memory of 2896 2512 net.exe net1.exe PID 2512 wrote to memory of 2896 2512 net.exe net1.exe PID 2512 wrote to memory of 2896 2512 net.exe net1.exe PID 2512 wrote to memory of 2896 2512 net.exe net1.exe PID 2400 wrote to memory of 2560 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe cmd.exe PID 2400 wrote to memory of 2560 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe cmd.exe PID 2400 wrote to memory of 2560 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe cmd.exe PID 2400 wrote to memory of 2560 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe cmd.exe PID 2400 wrote to memory of 2676 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe Logo1_.exe PID 2400 wrote to memory of 2676 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe Logo1_.exe PID 2400 wrote to memory of 2676 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe Logo1_.exe PID 2400 wrote to memory of 2676 2400 bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe Logo1_.exe PID 2676 wrote to memory of 2588 2676 Logo1_.exe net.exe PID 2676 wrote to memory of 2588 2676 Logo1_.exe net.exe PID 2676 wrote to memory of 2588 2676 Logo1_.exe net.exe PID 2676 wrote to memory of 2588 2676 Logo1_.exe net.exe PID 2588 wrote to memory of 2436 2588 net.exe net1.exe PID 2588 wrote to memory of 2436 2588 net.exe net1.exe PID 2588 wrote to memory of 2436 2588 net.exe net1.exe PID 2588 wrote to memory of 2436 2588 net.exe net1.exe PID 2560 wrote to memory of 2960 2560 cmd.exe bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe PID 2560 wrote to memory of 2960 2560 cmd.exe bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe PID 2560 wrote to memory of 2960 2560 cmd.exe bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe PID 2560 wrote to memory of 2960 2560 cmd.exe bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe PID 2676 wrote to memory of 2928 2676 Logo1_.exe net.exe PID 2676 wrote to memory of 2928 2676 Logo1_.exe net.exe PID 2676 wrote to memory of 2928 2676 Logo1_.exe net.exe PID 2676 wrote to memory of 2928 2676 Logo1_.exe net.exe PID 2928 wrote to memory of 2544 2928 net.exe net1.exe PID 2928 wrote to memory of 2544 2928 net.exe net1.exe PID 2928 wrote to memory of 2544 2928 net.exe net1.exe PID 2928 wrote to memory of 2544 2928 net.exe net1.exe PID 2676 wrote to memory of 1132 2676 Logo1_.exe Explorer.EXE PID 2676 wrote to memory of 1132 2676 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe"C:\Users\Admin\AppData\Local\Temp\bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2AE7.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe"C:\Users\Admin\AppData\Local\Temp\bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe"4⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2436
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exeFilesize
258KB
MD5ce1ebc3c0c328e142eab47b6635f807c
SHA15576885f6e7f2abe82df076a2d27af32eebb4c0a
SHA25658eb636f0448ed27f1c1c30503a7888e2913dec4b408e22e46f7edf574375870
SHA512f3a1be84df1ea85519589ef8b17738bf19202c444992b0d18f802d4e1ca57224a0b2e57371635a21c4cd967cb112eea9c338dbe07eb08d1c44316c5c2379b407
-
C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exeFilesize
478KB
MD53e2d3392a9d3ae3ed27661f81e853478
SHA1fa8c023a3bff75e89ed39f5d4bfb5693d818ca8b
SHA25609da8a31b7f420b9e4ed6d02e698bcc12a4f3efa46a53d1492a241a5784d44a8
SHA51227652a29d728b92995b8ce46b150cd14baf5b65789591085ef3fa959dbc99efaa071b7a014ccaabeb6e84cdea642769dc98a7a1684afcda9be82dbb0b8d3fa17
-
C:\Users\Admin\AppData\Local\Temp\$$a2AE7.batFilesize
722B
MD52a32099f3b0725f743990ca630a078ca
SHA116f688ba54120715a909a0a15e86570111518f3b
SHA2566bb0cc11f9d84203fcd7bdea77bbb18e9b976b9a093b6993f3213c3d8b655229
SHA51289eca014d0aa8525e312ffa82d7b0db563db92c69ad12dfc6709f61c1b6e78eb61317c03deee001c730132ebd418684fd00bdd5d59cf5ad300a983891c0ed362
-
C:\Users\Admin\AppData\Local\Temp\bdce9dfb061e41db50533c7093d7138c17fdbecf363e0c39e3dbe5a9170087d1.exe.exeFilesize
41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
C:\Windows\Logo1_.exeFilesize
33KB
MD505ebb4f9455d52366f013e63d099d41f
SHA1f3d867260198c5be6f0f1e796d517e8ad75b2173
SHA25605362547df367881bc8a8956b74adf5e7d0c641ad3a6defce8751787503af3f3
SHA512573fea3c1964ce511986b959789ec3e170ba5d668cab0c201e6ac27c6d23b04250910871b2fd22ad6558d20a2aa2da0380cf9594aa8a33d1315f364a8d697a2f
-
F:\$RECYCLE.BIN\S-1-5-21-2737914667-933161113-3798636211-1000\_desktop.iniFilesize
9B
MD531874817e0fb055be8d2c971c0e3bbde
SHA1ee8a35d6a86cb6d13f354d67d912e194bb09c74b
SHA25694de8b492bc2db9a9592f7c9433547eb7f80826ed67f48d2bb7e22db9d49f544
SHA51255747c69ae50fa212576d095f60cf33b42e26789cf8c34fc5120a45b1988aae95f91d9e37cb17298c5ac5243b2e4c40e1d0e084ce7fe14bceb4ebb318c65c944
-
memory/1132-27-0x00000000024E0000-0x00000000024E1000-memory.dmpFilesize
4KB
-
memory/2400-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2400-16-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2676-31-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2676-19-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2676-3347-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/2676-4175-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB