Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-11-2020 10:45

General

  • Target

    0x000300000001a5a2-209.exe

  • Size

    842KB

  • MD5

    185749ffbb860d3e5b705b557d819702

  • SHA1

    f09470a934d381cfc4e1504193eb58139061a645

  • SHA256

    1c5319523b316c789c5c29e87675e580a9016b4624f197df889cb942c9a32bfa

  • SHA512

    0bb85d296bdcee1fd50200af1924c73f751b08737256178052f46a8937a1a9be5656b4ea465b97ef798e48a0f600ceb7d2e18feb4026426112642d3b9213cce5

Malware Config

Extracted

Path

C:\_readme.txt

Ransom Note
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-jydQMZP2Ie Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: helpmanager@mail.ch Reserve e-mail address to contact us: restoremanager@airmail.cc Your personal ID: 0267OrjkgUGkv6TOoEMNyhW6VCgrizkAUg4XiClXtVqLCdtl
Emails

helpmanager@mail.ch

restoremanager@airmail.cc

URLs

https://we.tl/t-jydQMZP2Ie

Signatures

  • Deletes Windows Defender Definitions 2 TTPs 1 IoCs

    Uses mpcmdrun utility to delete all AV definitions.

  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 16 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • JavaScript code in executable 1 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 77 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000300000001a5a2-209.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000300000001a5a2-209.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\81127d0c-4c0d-458b-9f82-44ed51ac94e5" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:776
    • C:\Users\Admin\AppData\Local\Temp\0x000300000001a5a2-209.exe
      "C:\Users\Admin\AppData\Local\Temp\0x000300000001a5a2-209.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Modifies extensions of user files
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
        "C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          "C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe" --Admin
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:304
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1264
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:620
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps1
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1080
          • C:\Program Files\Windows Defender\mpcmdrun.exe
            "C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all
            5⤵
            • Deletes Windows Defender Definitions
            PID:1904
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""
            5⤵
              PID:1580
        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin2.exe
          "C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin2.exe"
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          PID:332
        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\5.exe
          "C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\5.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:316
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\5.exe & exit
            4⤵
              PID:600
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /im 5.exe /f
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:796
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {E02ABABD-E7D5-4167-BEFF-E3EE364F149C} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]
        1⤵
          PID:2020
          • C:\Users\Admin\AppData\Local\81127d0c-4c0d-458b-9f82-44ed51ac94e5\0x000300000001a5a2-209.exe
            C:\Users\Admin\AppData\Local\81127d0c-4c0d-458b-9f82-44ed51ac94e5\0x000300000001a5a2-209.exe --Task
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1168

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Command-Line Interface

        1
        T1059

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Disabling Security Tools

        1
        T1089

        File Permissions Modification

        1
        T1222

        Modify Registry

        2
        T1112

        Install Root Certificate

        1
        T1130

        Credential Access

        Credentials in Files

        4
        T1081

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        1
        T1082

        Collection

        Data from Local System

        4
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
          MD5

          da538122a8b241ee1ac7e06f703b2812

          SHA1

          3b28a969f885abee9eaededd5b57fb26d6c59464

          SHA256

          74836dabf0db99ccf45f994555ae4cdf6228ec0e1cd3745b64baedb10d0c69d7

          SHA512

          ecd4dde4e0a93d18ac1ef3552117d65a60f40e4d20ac050584c267c68c846538753ead7faecca3b93ab88eb0df1842523fe6dbfe88fe2f350d12a2ff55b57645

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          2fbe681c900d02992635cc9c8c51452e

          SHA1

          c424061bddc86a7c8c00d615af90cdcddeb05ae7

          SHA256

          0fdaf4d9478d37b3dd51469a2f0559f9573bb4ec0b0026e424a1155583fb66ac

          SHA512

          15e71354fa4b444a0db306fd54f3c7d16e31395268d9164f36a9f532dcd65a95d598dea77a698d4a78c996596d489c7d18175f77aac11ebd98adac46d5570712

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
          MD5

          509195995efa0a7a36db87c6193948a2

          SHA1

          ef1a9d084d9d22a0a0fe9901e23012d80bed8195

          SHA256

          3ed05f454b0895440d172e0759a0b427773e70da93aab7a52f1b8df3f3fd2cc6

          SHA512

          258e07af85af0fe9ea1e62828bb37b233db52349060d392d1b6f2b3c5ef35c36b0aa68abda6ffb2545de37e19b7cd502d7ae696565cfd86a7beef4b8845b71f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          e93abb7edb05ddf9e7566b70a63c9a2f

          SHA1

          e305d57905393bfbb387e6fe7d7413cd46bbf4d3

          SHA256

          a24010b061f2ee08b083a22e21cb83152c5ec9bc07dceade1aa352d14f98ee99

          SHA512

          4b82457b5dbda409c027bb67ade6a2c228ec37a3aa04818ce24cc4f5b5c10e3a915ea60d7e125e8c60866f91be7385e6ee670b265ac03673536569ef80d07410

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
          MD5

          9f0089d408fe1d0da395c288ff84a45f

          SHA1

          d47d6dde2f1ce3f65abc2af81ef2971dfdfc0208

          SHA256

          c98496630db862221c9a3e97640164d7c21674a0ec57d7a2257e779df0d937f8

          SHA512

          d5555602c55fd578ab1420bac39c3dca850918d4da7c90793042bdb42d98e7a7b84981669325ec580b266547d59d71db48066ab5bdab2138eb6cb7a1f07b10fb

        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\5.exe
          MD5

          637a8b78f4985a7807c6cdb238df4534

          SHA1

          01c47b02ec8b83a0a29590c2512c844318af8710

          SHA256

          87dc2c320339840a39ae63d4a53a406d2c091573c9f75aa28ea614b454fcfe95

          SHA512

          0eef7aec2cd0de345299bccda7cce486d65bde9d8d1dcfb6a90ffff79bb32d2be36452b064e4bd5da7aa5998e3398dca4bc1bf1ead863c324f7111a8ebfa0682

        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\5.exe
          MD5

          637a8b78f4985a7807c6cdb238df4534

          SHA1

          01c47b02ec8b83a0a29590c2512c844318af8710

          SHA256

          87dc2c320339840a39ae63d4a53a406d2c091573c9f75aa28ea614b454fcfe95

          SHA512

          0eef7aec2cd0de345299bccda7cce486d65bde9d8d1dcfb6a90ffff79bb32d2be36452b064e4bd5da7aa5998e3398dca4bc1bf1ead863c324f7111a8ebfa0682

        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • C:\Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin2.exe
          MD5

          996ba35165bb62473d2a6743a5200d45

          SHA1

          52169b0b5cce95c6905873b8d12a759c234bd2e0

          SHA256

          5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d

          SHA512

          2a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634

        • C:\Users\Admin\AppData\Local\81127d0c-4c0d-458b-9f82-44ed51ac94e5\0x000300000001a5a2-209.exe
          MD5

          185749ffbb860d3e5b705b557d819702

          SHA1

          f09470a934d381cfc4e1504193eb58139061a645

          SHA256

          1c5319523b316c789c5c29e87675e580a9016b4624f197df889cb942c9a32bfa

          SHA512

          0bb85d296bdcee1fd50200af1924c73f751b08737256178052f46a8937a1a9be5656b4ea465b97ef798e48a0f600ceb7d2e18feb4026426112642d3b9213cce5

        • C:\Users\Admin\AppData\Local\81127d0c-4c0d-458b-9f82-44ed51ac94e5\0x000300000001a5a2-209.exe
          MD5

          185749ffbb860d3e5b705b557d819702

          SHA1

          f09470a934d381cfc4e1504193eb58139061a645

          SHA256

          1c5319523b316c789c5c29e87675e580a9016b4624f197df889cb942c9a32bfa

          SHA512

          0bb85d296bdcee1fd50200af1924c73f751b08737256178052f46a8937a1a9be5656b4ea465b97ef798e48a0f600ceb7d2e18feb4026426112642d3b9213cce5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3bf4f350-86fe-486e-8b87-41ab96d0ad9c
          MD5

          b6d38f250ccc9003dd70efd3b778117f

          SHA1

          d5a17c02cac698d4f0a4a9b7d71db2aa19e3f18a

          SHA256

          4de9d7b5ccab7b67ca8efc83084c7ee6e5e872b7216ed4683bc5da950bf41265

          SHA512

          67d8195836b7f280d3f9219fd0f58276342e55d5dfdd8a4c54355030d96685d73f1b2b6da0eb39322ec7c3a1d1c5ef06b52d22646cea30a96f822de1800d31e9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4408bb97-19ee-4815-b02c-5a0939dddad8
          MD5

          df44874327d79bd75e4264cb8dc01811

          SHA1

          1396b06debed65ea93c24998d244edebd3c0209d

          SHA256

          55de642c5c9e436ec01c57004dae797022442c3245daf7162d19a5585f221181

          SHA512

          95dc9298b8db059bbe746f67e6a7f8515781c7053cc60c01532e47623a996be7e1bd23d1bd8f5f2045adff27454f44930d503c15b695690088841cedbd2a06c3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_644b5728-e9b5-45ab-9104-7136ec814422
          MD5

          be4d72095faf84233ac17b94744f7084

          SHA1

          cc78ce5b9c57573bd214a8f423ee622b00ebb1ec

          SHA256

          b0d72c5c22e57913476ac8fc686a4593f137c6667d5094522c0a0685dabd7adc

          SHA512

          43856e9b1032b8690ceea810c931bed3655e9190414bb220fb6afc136f31b8335e07604dffb28405d4006f266a54cff424c527d29924b1b732c9647a3252b097

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6532a425-51ae-4577-837f-c6e09d9fcfcf
          MD5

          75a8da7754349b38d64c87c938545b1b

          SHA1

          5c28c257d51f1c1587e29164cc03ea880c21b417

          SHA256

          bf08151c174b5d00c9dbc7907b2c6a01b4be76bfa3afce1e8bd98a04ad833c96

          SHA512

          798797bc74c56c874e9a5fdcb0157c04e37a1b3cce285ef064b01bceef8cec45f11a5198918c6c647220b62883606b5e12e3cca3ea369f3a66e69dea6e15f643

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_69670b6c-d49a-42a9-993a-10d18807f7c6
          MD5

          5e3c7184a75d42dda1a83606a45001d8

          SHA1

          94ca15637721d88f30eb4b6220b805c5be0360ed

          SHA256

          8278033a65d1ff48be4d86e11f87930d187692f59f8bf2f0a9d170de285afb59

          SHA512

          fae99b6e9b106e0f1c30aa4082b25ae1ad643455c1295c2c16ad534e3e611b9b08492353ffe1af1cfdddc9b2b7c330747a64012c45e62b8f4a4982dcc214e05b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7f45a795-9723-4ae3-b7ea-79ea7f92b87a
          MD5

          a725bb9fafcf91f3c6b7861a2bde6db2

          SHA1

          8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

          SHA256

          51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

          SHA512

          1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e9f9468a-8cbd-4472-b808-e8b3772f4134
          MD5

          02ff38ac870de39782aeee04d7b48231

          SHA1

          0390d39fa216c9b0ecdb38238304e518fb2b5095

          SHA256

          fbd66a9baf753db31b8de23f2d51b67f8676687503653103080c45b16f1dc876

          SHA512

          24a1ff76ee42ff7a5ea42843928c4df07b06178f7781cd840e1e086e88735d81506eb67259ff1e6ce5aaa7c5baea03886da265eb7e025ff4dc4c4b5f8cd3e341

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
          MD5

          1a46d6ec49b0b55d2bd5d5ca465c842a

          SHA1

          3a25fff7b9afc52943c1b178c9787d7f3a9fa34b

          SHA256

          949f590bbaa68838ef10d0f72f41e72f5ba55cae576da8a66cbe9b0aa8098d00

          SHA512

          e7bf1ee2c8a50c15cbf2c87341ecbc70ed35ee09f9f4f4ae76f9e25f5ef8f72d94e9b309d2cb46f888556bc48780def4b99e20f5cc46e0f9c6682053db6cb5c2

        • C:\Users\Admin\AppData\Local\Temp\delself.bat
          MD5

          763ba377c33798b893865f4e921029f8

          SHA1

          3407b01a51e360dfa3021816795cad7b5b9050e0

          SHA256

          8a4f75db06820b88197a4df23ff98b2bd428225ea23816bbbced72bbaa507be5

          SHA512

          661a9dbba02541a660d842c4f6a956a38d0200ff816e278a6fbc81a85c4e4ce66d43f561b3d2f523f647c7a147f614239534f4f6f640d3e2bfd75170a207cffc

        • C:\Users\Admin\AppData\Local\script.ps1
          MD5

          f972c62f986b5ed49ad7713d93bf6c9f

          SHA1

          4e157002bdb97e9526ab97bfafbf7c67e1d1efbf

          SHA256

          b47f85974a7ec2fd5aa82d52f08eb0f6cea7e596a98dd29e8b85b5c37beca0a8

          SHA512

          2c9e2e1b8b6cb5ffe3edf5dfbc2c3b917cd15ba6a5e5264207a43b02ce7020f44f5088aca195f7b428699f0d6bd693ce557a0227d67bbb4795e350a97314e9c4

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
          MD5

          0102200e00b2cb254ba9a419ba665248

          SHA1

          d99271d9b35b036104472dd2849337039f9aeff5

          SHA256

          e0af8d7bed35387dfa25a95b6076dd3bd120479068027898eb2b9a614ac53554

          SHA512

          c3133f3eb80926e0be7adbc96405ccaac138c354b948f12d8ff711996ee1a0dd097caabcfe4de29e38356f5597ed5ce230702e2966751b887a722b3697e8eac3

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
          MD5

          0102200e00b2cb254ba9a419ba665248

          SHA1

          d99271d9b35b036104472dd2849337039f9aeff5

          SHA256

          e0af8d7bed35387dfa25a95b6076dd3bd120479068027898eb2b9a614ac53554

          SHA512

          c3133f3eb80926e0be7adbc96405ccaac138c354b948f12d8ff711996ee1a0dd097caabcfe4de29e38356f5597ed5ce230702e2966751b887a722b3697e8eac3

        • \ProgramData\mozglue.dll
          MD5

          8f73c08a9660691143661bf7332c3c27

          SHA1

          37fa65dd737c50fda710fdbde89e51374d0c204a

          SHA256

          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

          SHA512

          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

        • \ProgramData\msvcp140.dll
          MD5

          109f0f02fd37c84bfc7508d4227d7ed5

          SHA1

          ef7420141bb15ac334d3964082361a460bfdb975

          SHA256

          334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

          SHA512

          46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

        • \ProgramData\nss3.dll
          MD5

          bfac4e3c5908856ba17d41edcd455a51

          SHA1

          8eec7e888767aa9e4cca8ff246eb2aacb9170428

          SHA256

          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

          SHA512

          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

        • \ProgramData\vcruntime140.dll
          MD5

          7587bf9cb4147022cd5681b015183046

          SHA1

          f2106306a8f6f0da5afb7fc765cfa0757ad5a628

          SHA256

          c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

          SHA512

          0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\5.exe
          MD5

          637a8b78f4985a7807c6cdb238df4534

          SHA1

          01c47b02ec8b83a0a29590c2512c844318af8710

          SHA256

          87dc2c320339840a39ae63d4a53a406d2c091573c9f75aa28ea614b454fcfe95

          SHA512

          0eef7aec2cd0de345299bccda7cce486d65bde9d8d1dcfb6a90ffff79bb32d2be36452b064e4bd5da7aa5998e3398dca4bc1bf1ead863c324f7111a8ebfa0682

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\5.exe
          MD5

          637a8b78f4985a7807c6cdb238df4534

          SHA1

          01c47b02ec8b83a0a29590c2512c844318af8710

          SHA256

          87dc2c320339840a39ae63d4a53a406d2c091573c9f75aa28ea614b454fcfe95

          SHA512

          0eef7aec2cd0de345299bccda7cce486d65bde9d8d1dcfb6a90ffff79bb32d2be36452b064e4bd5da7aa5998e3398dca4bc1bf1ead863c324f7111a8ebfa0682

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin1.exe
          MD5

          5b4bd24d6240f467bfbc74803c9f15b0

          SHA1

          c17f98c182d299845c54069872e8137645768a1a

          SHA256

          14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

          SHA512

          a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

        • \Users\Admin\AppData\Local\6542cc58-a24e-407a-9384-1244417c537e\updatewin2.exe
          MD5

          996ba35165bb62473d2a6743a5200d45

          SHA1

          52169b0b5cce95c6905873b8d12a759c234bd2e0

          SHA256

          5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d

          SHA512

          2a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634

        • memory/304-23-0x0000000000000000-mapping.dmp
        • memory/304-28-0x0000000002150000-0x0000000002161000-memory.dmp
          Filesize

          68KB

        • memory/304-29-0x00000000005A2000-0x00000000005A3000-memory.dmp
          Filesize

          4KB

        • memory/316-66-0x0000000006110000-0x0000000006121000-memory.dmp
          Filesize

          68KB

        • memory/316-43-0x0000000000000000-mapping.dmp
        • memory/332-32-0x0000000000000000-mapping.dmp
        • memory/332-34-0x0000000001E90000-0x0000000001EA1000-memory.dmp
          Filesize

          68KB

        • memory/332-35-0x000000000053F000-0x0000000000540000-memory.dmp
          Filesize

          4KB

        • memory/600-111-0x0000000000000000-mapping.dmp
        • memory/620-63-0x0000000073160000-0x000000007384E000-memory.dmp
          Filesize

          6.9MB

        • memory/620-77-0x0000000005890000-0x0000000005891000-memory.dmp
          Filesize

          4KB

        • memory/620-64-0x0000000001F70000-0x0000000001F71000-memory.dmp
          Filesize

          4KB

        • memory/620-65-0x0000000004B10000-0x0000000004B11000-memory.dmp
          Filesize

          4KB

        • memory/620-68-0x0000000002670000-0x0000000002671000-memory.dmp
          Filesize

          4KB

        • memory/620-69-0x0000000004A30000-0x0000000004A31000-memory.dmp
          Filesize

          4KB

        • memory/620-61-0x0000000000000000-mapping.dmp
        • memory/776-2-0x0000000000000000-mapping.dmp
        • memory/796-113-0x0000000000000000-mapping.dmp
        • memory/1080-109-0x0000000006460000-0x0000000006461000-memory.dmp
          Filesize

          4KB

        • memory/1080-94-0x0000000005860000-0x0000000005861000-memory.dmp
          Filesize

          4KB

        • memory/1080-91-0x0000000005420000-0x0000000005421000-memory.dmp
          Filesize

          4KB

        • memory/1080-90-0x0000000002760000-0x0000000002761000-memory.dmp
          Filesize

          4KB

        • memory/1080-110-0x0000000006470000-0x0000000006471000-memory.dmp
          Filesize

          4KB

        • memory/1080-88-0x0000000004970000-0x0000000004971000-memory.dmp
          Filesize

          4KB

        • memory/1080-78-0x0000000000000000-mapping.dmp
        • memory/1080-97-0x0000000006330000-0x0000000006331000-memory.dmp
          Filesize

          4KB

        • memory/1080-87-0x00000000020C0000-0x00000000020C1000-memory.dmp
          Filesize

          4KB

        • memory/1080-85-0x00000000728B0000-0x0000000072F9E000-memory.dmp
          Filesize

          6.9MB

        • memory/1168-117-0x0000000005FF0000-0x0000000006001000-memory.dmp
          Filesize

          68KB

        • memory/1168-115-0x0000000000000000-mapping.dmp
        • memory/1264-38-0x0000000004800000-0x0000000004801000-memory.dmp
          Filesize

          4KB

        • memory/1264-39-0x00000000011F0000-0x00000000011F1000-memory.dmp
          Filesize

          4KB

        • memory/1264-47-0x0000000005770000-0x0000000005771000-memory.dmp
          Filesize

          4KB

        • memory/1264-52-0x0000000006160000-0x0000000006161000-memory.dmp
          Filesize

          4KB

        • memory/1264-30-0x0000000000000000-mapping.dmp
        • memory/1264-53-0x0000000006200000-0x0000000006201000-memory.dmp
          Filesize

          4KB

        • memory/1264-60-0x00000000065A0000-0x00000000065A1000-memory.dmp
          Filesize

          4KB

        • memory/1264-40-0x0000000005360000-0x0000000005361000-memory.dmp
          Filesize

          4KB

        • memory/1264-37-0x0000000001120000-0x0000000001121000-memory.dmp
          Filesize

          4KB

        • memory/1264-36-0x0000000073850000-0x0000000073F3E000-memory.dmp
          Filesize

          6.9MB

        • memory/1356-6-0x0000000006210000-0x0000000006221000-memory.dmp
          Filesize

          68KB

        • memory/1356-4-0x0000000000000000-mapping.dmp
        • memory/1356-120-0x0000000007AB0000-0x0000000007AC1000-memory.dmp
          Filesize

          68KB

        • memory/1356-119-0x0000000007EC0000-0x0000000007ED1000-memory.dmp
          Filesize

          68KB

        • memory/1356-118-0x0000000007AB0000-0x0000000007AC1000-memory.dmp
          Filesize

          68KB

        • memory/1580-86-0x0000000000000000-mapping.dmp
        • memory/1612-1-0x000007FEF7B10000-0x000007FEF7D8A000-memory.dmp
          Filesize

          2.5MB

        • memory/1632-0-0x0000000006100000-0x0000000006111000-memory.dmp
          Filesize

          68KB

        • memory/1904-79-0x0000000000000000-mapping.dmp
        • memory/1920-13-0x0000000000000000-mapping.dmp
        • memory/1920-19-0x0000000001E80000-0x0000000001E91000-memory.dmp
          Filesize

          68KB

        • memory/1920-20-0x0000000000340000-0x0000000000341000-memory.dmp
          Filesize

          4KB