Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    28-02-2021 07:02

General

  • Target

    2664ca0874468958e3819f05885a3e52ffb392ac416cb5c5618031136aa2b438.exe

  • Size

    14.9MB

  • MD5

    b7cf157c47d8d2d7bc77ba840ca3ec62

  • SHA1

    8b9e560998dde9b09498df6c5539b31af7ccbdb4

  • SHA256

    2664ca0874468958e3819f05885a3e52ffb392ac416cb5c5618031136aa2b438

  • SHA512

    cabc1d0d03d0fee9486bb1ec44786df22a24d0218f1c9b4fed909d2f81bb9c9f470b300653874e23c32bdd551f7cb5de38b6d47768bc948b5ff22bd5585f1e2d

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 9 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2664ca0874468958e3819f05885a3e52ffb392ac416cb5c5618031136aa2b438.exe
    "C:\Users\Admin\AppData\Local\Temp\2664ca0874468958e3819f05885a3e52ffb392ac416cb5c5618031136aa2b438.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:188
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Encrypted.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Encrypted.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CDS.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CDS.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3084
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crypted.exe
              "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crypted.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3592
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Encrypted.exe
                "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Encrypted.exe"
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:632
                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CDS.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CDS.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3852
                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\crypted.exe
                    "C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\crypted.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Drops file in Program Files directory
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1416
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\crypted.exe" "crypted.exe" ENABLE
                      10⤵
                        PID:3152
                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\skinchanger_csgo_free_03.08.2020.exe
                  "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\skinchanger_csgo_free_03.08.2020.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:2316
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x348
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2880

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\630_10.png

      MD5

      340b294efc691d1b20c64175d565ebc7

      SHA1

      81cb9649bd1c9a62ae79e781818fc24d15c29ce7

      SHA256

      72566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9

      SHA512

      1395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.cdd

      MD5

      3e7ecaeb51c2812d13b07ec852d74aaf

      SHA1

      e9bdab93596ffb0f7f8c65243c579180939acb26

      SHA256

      e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96

      SHA512

      635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe

      MD5

      424bf196deaeb4ddcafb78e137fa560a

      SHA1

      007738e9486c904a3115daa6e8ba2ee692af58c8

      SHA256

      0963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2

      SHA512

      a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe

      MD5

      424bf196deaeb4ddcafb78e137fa560a

      SHA1

      007738e9486c904a3115daa6e8ba2ee692af58c8

      SHA256

      0963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2

      SHA512

      a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Encrypted.exe

      MD5

      640a3adb5f66bf48acef50d63728b36c

      SHA1

      720ba237d5e37e7d7a225f8a60d23bd9bf8fc4a6

      SHA256

      2ff234b824ab4400c30554a11b8b93e378a0bf94da72870ba7359d7ac13f7a8c

      SHA512

      48088e6b732fa40c353f4b4203295aad08b1978711305490f0ae9fc4fa18637867ffb12ec9ea94b8ee280630a32c2c13c218d3ac7eb0544fba830dd6a0638021

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Encrypted.exe

      MD5

      640a3adb5f66bf48acef50d63728b36c

      SHA1

      720ba237d5e37e7d7a225f8a60d23bd9bf8fc4a6

      SHA256

      2ff234b824ab4400c30554a11b8b93e378a0bf94da72870ba7359d7ac13f7a8c

      SHA512

      48088e6b732fa40c353f4b4203295aad08b1978711305490f0ae9fc4fa18637867ffb12ec9ea94b8ee280630a32c2c13c218d3ac7eb0544fba830dd6a0638021

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c.dat

      MD5

      9a22199eb5db89328c52d1c4e536b1fd

      SHA1

      53f7b3711d418160916955963bef19ae54ddfbd0

      SHA256

      df1e987a8916389cdf81f8a86fc594a53906e70856484a8f0bb8d42d05cd550d

      SHA512

      8beaf8914eec7e480f36a604ca06889ea6565439001a2976dfcf7462d1b988c997ea858f22e4ce3bc867bef0cfe900ea93e7d0ddede509d66faadbd6686cd6e4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe

      MD5

      48db6a6bf33baeb14e327106389665ea

      SHA1

      61c1b8005fe365c9ca904193789cb9928fbe7659

      SHA256

      0d9236dd1798f945183058d505b02b6996d10423a071affd64889e3ba89a2fb4

      SHA512

      5909a52c9071a42cd934343047ec5a0f7a70b6da21854c0e7ee854223cc37d73b5b221bd9ecdc2f4ba4bca849ed55b8d87d86aa56542d17af8d7fef05cd23ee1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe

      MD5

      48db6a6bf33baeb14e327106389665ea

      SHA1

      61c1b8005fe365c9ca904193789cb9928fbe7659

      SHA256

      0d9236dd1798f945183058d505b02b6996d10423a071affd64889e3ba89a2fb4

      SHA512

      5909a52c9071a42cd934343047ec5a0f7a70b6da21854c0e7ee854223cc37d73b5b221bd9ecdc2f4ba4bca849ed55b8d87d86aa56542d17af8d7fef05cd23ee1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fs.settings

      MD5

      68934a3e9455fa72420237eb05902327

      SHA1

      7cb6efb98ba5972a9b5090dc2e517fe14d12cb04

      SHA256

      fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

      SHA512

      719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lua5.1.dll

      MD5

      c3256800dce47c14acc83ccca4c3e2ac

      SHA1

      9d126818c66991dbc3813a65eddb88bbcf77f30a

      SHA256

      f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866

      SHA512

      6865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\630_10.png

      MD5

      340b294efc691d1b20c64175d565ebc7

      SHA1

      81cb9649bd1c9a62ae79e781818fc24d15c29ce7

      SHA256

      72566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9

      SHA512

      1395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CDS.cdd

      MD5

      3e7ecaeb51c2812d13b07ec852d74aaf

      SHA1

      e9bdab93596ffb0f7f8c65243c579180939acb26

      SHA256

      e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96

      SHA512

      635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CDS.exe

      MD5

      424bf196deaeb4ddcafb78e137fa560a

      SHA1

      007738e9486c904a3115daa6e8ba2ee692af58c8

      SHA256

      0963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2

      SHA512

      a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CDS.exe

      MD5

      424bf196deaeb4ddcafb78e137fa560a

      SHA1

      007738e9486c904a3115daa6e8ba2ee692af58c8

      SHA256

      0963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2

      SHA512

      a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Encrypted.exe

      MD5

      e4d877a1b3531fd57068a94d4287c571

      SHA1

      f84f53355d77ac69ab6ff7a17bc7eb15858adb2e

      SHA256

      c5a13054823153de0627d87d4b46fe0298d6d25a0f1f1a21c07eeafdc4aaafab

      SHA512

      dd80aeeac507979fea84aa69b5f17af703c0636f47fd3f644a2c5e90dda0ed7e798ad73797d68ef366817b311758dd9bdd804f18666cf979003439289de3762b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Encrypted.exe

      MD5

      e4d877a1b3531fd57068a94d4287c571

      SHA1

      f84f53355d77ac69ab6ff7a17bc7eb15858adb2e

      SHA256

      c5a13054823153de0627d87d4b46fe0298d6d25a0f1f1a21c07eeafdc4aaafab

      SHA512

      dd80aeeac507979fea84aa69b5f17af703c0636f47fd3f644a2c5e90dda0ed7e798ad73797d68ef366817b311758dd9bdd804f18666cf979003439289de3762b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c.dat

      MD5

      b411c4ea9df69d849a1724cce49a6536

      SHA1

      bc8175e29ad618176b67fc5604ea3a02058b9367

      SHA256

      ba7816873e90cc839093f7163df5ea5841ad81a31b104c84ddf344f0ffbfe1a8

      SHA512

      fcc9a32eb3389bace38f911496d5de50429ba140d41579e2c42e13908444ed152a1765a00b6b6952a87bf9175fde24ff7f4c8988bc74779d0ac74c6276a7b204

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crypted.exe

      MD5

      c1b37b5fb2bedc2ea96c8ba35a28c7e9

      SHA1

      f42e7db07373c52b5c27a2af998a1178bdbf40bc

      SHA256

      4e60b06c430a42582f84dfb203cf1e0e92143b8150535d63d6869bc28ada5cc0

      SHA512

      01f0ced7f816f943a6c59247d8475eefce6244a67be6289a09c5c45febf9feca48ea1805156962933a942455341fbc58924d0c8ed9c44bc9f4a76d98f574e273

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\crypted.exe

      MD5

      c1b37b5fb2bedc2ea96c8ba35a28c7e9

      SHA1

      f42e7db07373c52b5c27a2af998a1178bdbf40bc

      SHA256

      4e60b06c430a42582f84dfb203cf1e0e92143b8150535d63d6869bc28ada5cc0

      SHA512

      01f0ced7f816f943a6c59247d8475eefce6244a67be6289a09c5c45febf9feca48ea1805156962933a942455341fbc58924d0c8ed9c44bc9f4a76d98f574e273

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fs.settings

      MD5

      68934a3e9455fa72420237eb05902327

      SHA1

      7cb6efb98ba5972a9b5090dc2e517fe14d12cb04

      SHA256

      fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

      SHA512

      719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lua5.1.dll

      MD5

      c3256800dce47c14acc83ccca4c3e2ac

      SHA1

      9d126818c66991dbc3813a65eddb88bbcf77f30a

      SHA256

      f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866

      SHA512

      6865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\skinchanger_csgo_free_03.08.2020.exe

      MD5

      13620e19155bd6fba2091ea17c46bc2a

      SHA1

      2aeaf4531c5a1835443f3942b0bac5a44b38cd3d

      SHA256

      2b6b6d416f6b819147e2e448d3204f04f3b8d875fe4f6938a2e26e41f09b2928

      SHA512

      9805f04e47cb5e5243674f511d73a660c31661d0427a9afb10851b85379d98ae725aeffd87e8959ab3d418431c698f531012eba8b77e7bbb78cb691fe8b18a0d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\skinchanger_csgo_free_03.08.2020.exe

      MD5

      13620e19155bd6fba2091ea17c46bc2a

      SHA1

      2aeaf4531c5a1835443f3942b0bac5a44b38cd3d

      SHA256

      2b6b6d416f6b819147e2e448d3204f04f3b8d875fe4f6938a2e26e41f09b2928

      SHA512

      9805f04e47cb5e5243674f511d73a660c31661d0427a9afb10851b85379d98ae725aeffd87e8959ab3d418431c698f531012eba8b77e7bbb78cb691fe8b18a0d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\630_10.png

      MD5

      340b294efc691d1b20c64175d565ebc7

      SHA1

      81cb9649bd1c9a62ae79e781818fc24d15c29ce7

      SHA256

      72566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9

      SHA512

      1395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CDS.cdd

      MD5

      3e7ecaeb51c2812d13b07ec852d74aaf

      SHA1

      e9bdab93596ffb0f7f8c65243c579180939acb26

      SHA256

      e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96

      SHA512

      635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CDS.exe

      MD5

      424bf196deaeb4ddcafb78e137fa560a

      SHA1

      007738e9486c904a3115daa6e8ba2ee692af58c8

      SHA256

      0963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2

      SHA512

      a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CDS.exe

      MD5

      424bf196deaeb4ddcafb78e137fa560a

      SHA1

      007738e9486c904a3115daa6e8ba2ee692af58c8

      SHA256

      0963cef2f742a31b2604fe975f4471ae6a76641490fe60805db744fef9bdd5d2

      SHA512

      a9be6dd5b2ed84baea34e0f1b1e8f5388ce3662c5dcb6a80c2d175be95f9598312837420c07b52cdfaa9e94bcffd8c7a2b9db2b551dfac171bce4b92f466e797

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c.dat

      MD5

      d43c02efcfa182d72dc19a4b7a7f71e9

      SHA1

      5380b17363059ce1ebfecdc47c83cfb25831860c

      SHA256

      7423c743a5c925999510ee4145a2d01e98d2b349f9ce484aeec12116dcde115b

      SHA512

      9241a5ab8f7489ffa9aad5667f9018fed690dc92d63b819cd9cb945a408e92719304a7862a4b5f8d6919cd3be38a4604ad4fb919e9db4b63239056fdb29cfa67

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\crypted.exe

      MD5

      e0320aaec621795486fa8c8eb1ff80d9

      SHA1

      59fe9495eccabbfebd7e182f42143f64d15a94e3

      SHA256

      e19d3b5823eb30e19e43ef28b1d139c52d6ec400ad4def86372d3b0eb42ad2cd

      SHA512

      0742fdada6c1a3090ffc43a665a6af84f2985c0515de169ed661e53cf4e969e781d29c556416718420c0e567d7cead12746281b1d765d9639dfa18edccb1a3d5

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\crypted.exe

      MD5

      e0320aaec621795486fa8c8eb1ff80d9

      SHA1

      59fe9495eccabbfebd7e182f42143f64d15a94e3

      SHA256

      e19d3b5823eb30e19e43ef28b1d139c52d6ec400ad4def86372d3b0eb42ad2cd

      SHA512

      0742fdada6c1a3090ffc43a665a6af84f2985c0515de169ed661e53cf4e969e781d29c556416718420c0e567d7cead12746281b1d765d9639dfa18edccb1a3d5

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\fs.settings

      MD5

      68934a3e9455fa72420237eb05902327

      SHA1

      7cb6efb98ba5972a9b5090dc2e517fe14d12cb04

      SHA256

      fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

      SHA512

      719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lua5.1.dll

      MD5

      c3256800dce47c14acc83ccca4c3e2ac

      SHA1

      9d126818c66991dbc3813a65eddb88bbcf77f30a

      SHA256

      f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866

      SHA512

      6865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lua5.1.dll

      MD5

      c3256800dce47c14acc83ccca4c3e2ac

      SHA1

      9d126818c66991dbc3813a65eddb88bbcf77f30a

      SHA256

      f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866

      SHA512

      6865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\lua5.1.dll

      MD5

      c3256800dce47c14acc83ccca4c3e2ac

      SHA1

      9d126818c66991dbc3813a65eddb88bbcf77f30a

      SHA256

      f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866

      SHA512

      6865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\lua5.1.dll

      MD5

      c3256800dce47c14acc83ccca4c3e2ac

      SHA1

      9d126818c66991dbc3813a65eddb88bbcf77f30a

      SHA256

      f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866

      SHA512

      6865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25

    • memory/188-11-0x0000000000000000-mapping.dmp

    • memory/632-31-0x0000000000000000-mapping.dmp

    • memory/636-14-0x0000000000000000-mapping.dmp

    • memory/1416-46-0x0000000000000000-mapping.dmp

    • memory/1416-49-0x0000000002A40000-0x0000000002A41000-memory.dmp

      Filesize

      4KB

    • memory/2316-34-0x0000000000000000-mapping.dmp

    • memory/3084-17-0x0000000000000000-mapping.dmp

    • memory/3152-50-0x0000000000000000-mapping.dmp

    • memory/3568-2-0x0000000000000000-mapping.dmp

    • memory/3592-26-0x0000000000000000-mapping.dmp

    • memory/3852-37-0x0000000000000000-mapping.dmp