Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-03-2021 07:06
Static task
static1
Behavioral task
behavioral1
Sample
e0059c4ad73116bf0ea29d575ea2c175.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e0059c4ad73116bf0ea29d575ea2c175.exe
Resource
win10v20201028
General
-
Target
e0059c4ad73116bf0ea29d575ea2c175.exe
-
Size
162KB
-
MD5
e0059c4ad73116bf0ea29d575ea2c175
-
SHA1
a1316534bb8a3b52ec4f14d8c3172e49f6c5760f
-
SHA256
fb2e2174a3ec526861932043c1aa5b5e62e3abed0bb73e88e495eab66635e758
-
SHA512
b8a06dd6de28e6d29ebafe58bb6262412add147f01f3d3367dd7da95d083d92656e92a7bfce6a13179dc27b6ee346f5bcf98b0f067be2286a9cc741babd06de4
Malware Config
Extracted
smokeloader
2020
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Taurus Stealer
Taurus is an infostealer first seen in June 2020.
-
Executes dropped EXE 6 IoCs
Processes:
83B.exe83B.exe2425.exeupdatewin.exe5.exe4ECE.exepid process 392 83B.exe 292 83B.exe 1996 2425.exe 1636 updatewin.exe 1664 5.exe 1844 4ECE.exe -
Deletes itself 1 IoCs
Processes:
pid process 1328 -
Loads dropped DLL 13 IoCs
Processes:
e0059c4ad73116bf0ea29d575ea2c175.exe83B.exe83B.exeupdatewin.exeWerFault.exepid process 1152 e0059c4ad73116bf0ea29d575ea2c175.exe 392 83B.exe 392 83B.exe 292 83B.exe 1636 updatewin.exe 1636 updatewin.exe 1636 updatewin.exe 292 83B.exe 292 83B.exe 1136 WerFault.exe 1136 WerFault.exe 1136 WerFault.exe 1136 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
83B.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\7a29c289-9896-42ee-9521-f8a3ab33907f\\83B.exe\" --AutoStart" 83B.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 api.2ip.ua 29 api.2ip.ua 18 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1136 1664 WerFault.exe 5.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
e0059c4ad73116bf0ea29d575ea2c175.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e0059c4ad73116bf0ea29d575ea2c175.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e0059c4ad73116bf0ea29d575ea2c175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e0059c4ad73116bf0ea29d575ea2c175.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2016 timeout.exe -
Processes:
83B.exe83B.exe2425.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 83B.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 83B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 83B.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 83B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 2425.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 2425.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 83B.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e0059c4ad73116bf0ea29d575ea2c175.exepid process 1152 e0059c4ad73116bf0ea29d575ea2c175.exe 1152 e0059c4ad73116bf0ea29d575ea2c175.exe 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 1328 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
e0059c4ad73116bf0ea29d575ea2c175.exepid process 1152 e0059c4ad73116bf0ea29d575ea2c175.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
updatewin.exeWerFault.exedescription pid process Token: SeRestorePrivilege 1636 updatewin.exe Token: SeBackupPrivilege 1636 updatewin.exe Token: SeDebugPrivilege 1136 WerFault.exe Token: SeShutdownPrivilege 1328 -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
pid process 1328 1328 1328 1328 1328 1328 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1328 1328 1328 1328 -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
83B.exe83B.exeupdatewin.execmd.exe5.exedescription pid process target process PID 1328 wrote to memory of 392 1328 83B.exe PID 1328 wrote to memory of 392 1328 83B.exe PID 1328 wrote to memory of 392 1328 83B.exe PID 1328 wrote to memory of 392 1328 83B.exe PID 392 wrote to memory of 296 392 83B.exe icacls.exe PID 392 wrote to memory of 296 392 83B.exe icacls.exe PID 392 wrote to memory of 296 392 83B.exe icacls.exe PID 392 wrote to memory of 296 392 83B.exe icacls.exe PID 392 wrote to memory of 292 392 83B.exe 83B.exe PID 392 wrote to memory of 292 392 83B.exe 83B.exe PID 392 wrote to memory of 292 392 83B.exe 83B.exe PID 392 wrote to memory of 292 392 83B.exe 83B.exe PID 1328 wrote to memory of 1996 1328 2425.exe PID 1328 wrote to memory of 1996 1328 2425.exe PID 1328 wrote to memory of 1996 1328 2425.exe PID 1328 wrote to memory of 1996 1328 2425.exe PID 292 wrote to memory of 1636 292 83B.exe updatewin.exe PID 292 wrote to memory of 1636 292 83B.exe updatewin.exe PID 292 wrote to memory of 1636 292 83B.exe updatewin.exe PID 292 wrote to memory of 1636 292 83B.exe updatewin.exe PID 292 wrote to memory of 1636 292 83B.exe updatewin.exe PID 292 wrote to memory of 1636 292 83B.exe updatewin.exe PID 292 wrote to memory of 1636 292 83B.exe updatewin.exe PID 292 wrote to memory of 1664 292 83B.exe 5.exe PID 292 wrote to memory of 1664 292 83B.exe 5.exe PID 292 wrote to memory of 1664 292 83B.exe 5.exe PID 292 wrote to memory of 1664 292 83B.exe 5.exe PID 1636 wrote to memory of 1008 1636 updatewin.exe cmd.exe PID 1636 wrote to memory of 1008 1636 updatewin.exe cmd.exe PID 1636 wrote to memory of 1008 1636 updatewin.exe cmd.exe PID 1636 wrote to memory of 1008 1636 updatewin.exe cmd.exe PID 1636 wrote to memory of 1008 1636 updatewin.exe cmd.exe PID 1636 wrote to memory of 1008 1636 updatewin.exe cmd.exe PID 1636 wrote to memory of 1008 1636 updatewin.exe cmd.exe PID 1008 wrote to memory of 2016 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 2016 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 2016 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 2016 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 2016 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 2016 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 2016 1008 cmd.exe timeout.exe PID 1664 wrote to memory of 1136 1664 5.exe WerFault.exe PID 1664 wrote to memory of 1136 1664 5.exe WerFault.exe PID 1664 wrote to memory of 1136 1664 5.exe WerFault.exe PID 1664 wrote to memory of 1136 1664 5.exe WerFault.exe PID 1328 wrote to memory of 1844 1328 4ECE.exe PID 1328 wrote to memory of 1844 1328 4ECE.exe PID 1328 wrote to memory of 1844 1328 4ECE.exe PID 1328 wrote to memory of 1844 1328 4ECE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0059c4ad73116bf0ea29d575ea2c175.exe"C:\Users\Admin\AppData\Local\Temp\e0059c4ad73116bf0ea29d575ea2c175.exe"1⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\83B.exeC:\Users\Admin\AppData\Local\Temp\83B.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\7a29c289-9896-42ee-9521-f8a3ab33907f" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\83B.exe"C:\Users\Admin\AppData\Local\Temp\83B.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exe"C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exe"C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 13004⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\2425.exeC:\Users\Admin\AppData\Local\Temp\2425.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\4ECE.exeC:\Users\Admin\AppData\Local\Temp\4ECE.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
54e60fd0149fe960a1bb51d1a63724b3
SHA18edc3d0d641441a72c642c3e96dabfe8aa9877a8
SHA2567cdb049d052b55ee9c2ba9096e8cf7e1f9117d2898c1679ab2ef2e8683356309
SHA512090766a3ae2e7d091ee0f22ce954373327d9642e10451f55342b76b1aa444c8e16cc4102957570e08d7fa19b1e17fe34f8a764f8c041c82f799d095ccf0f357b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
61a03d15cf62612f50b74867090dbe79
SHA115228f34067b4b107e917bebaf17cc7c3c1280a8
SHA256f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d
SHA5125fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
3be96afd7b9e0ff481b665d594167224
SHA1aff8ca9cc93425b2c20b55aaf1c1e0b56f347144
SHA25636981629cd13aef6fa93a598db9dd7745d491fb7bee57b235ddcb66f1a8c5799
SHA51276df4e5a44f6be6e75136550ebdc4bad504cafeef08c2a3f3730343f43b22771b8a3f9ba6ea5b755ed4e674257754bf29b2b8197f9bc0894219dde5f34821299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CMD5
e1b17cb36e7813e48c590622bc15252b
SHA16dfc7033c04075f8925ffed5a3c13a242825c0db
SHA256e0cfd73d9d91f8b78fd95262a42ec028eb804c6f8ea6b150debbf31d187ab47a
SHA51295bd7f3752dc2676c577a7da203bf790635cb5fb54a4658377096908d6366ee065697dbcc0c92f93620e07a568935960b2682891a5d3b0c36483c96ebf286c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
593df028d3427622c7620d1db10cbf7a
SHA1ea775539b86ab16cf413e1a82e813e514c030b48
SHA25681cd54c337d0d6938f0270c4e5524881755169cc04129948cdbf73bd2c20e23e
SHA512aac65d0979b2e94931f74abb91b155192ddfe73fdc988edb8c1f9cab9e780a63a41c6889f2e768a451ac2bc24fe3ee96e9c9e96410cf10fcc388e9a3f865a219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
c2e3a7e89d1a490c87aa834fb1176b44
SHA1c03a87566a1743b85a61a3451e248c83b674f437
SHA256cdb88a93839a9a203bd605560fa77b00b7bceffed5450dc1a300fc47e3c8e012
SHA512baaccb71074b388c3d38bbf94b0a269b1d3a4463877db5a0823cf91ddadab651c1e911be04547ee53e37c7ceadeb845b98517232b963143adff06022fab33d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
604a4b541c74136e343b51454250aec5
SHA10916ff6a5459baad1c01c53a8d8f2362b014fc62
SHA256e694a4ee780675d80d4111e1a43712a1e8ba03343255f922de9e983a38f559ce
SHA512d9300a775313cf8c69208a895782624e5f9e2d3ec4117c597032c1f85ae9189877d782071960ea420c1fc4a89fb45a32111fdb359ee0ddcba55e0531bf73cfec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27CMD5
5f73d34452b97721d3bff0316d9b9c78
SHA1e4fe747dce82958a636daaf40975d77b534d91fa
SHA25638bd14af54c8ac2add4407836d31804d6123a013a329ac5787b48733c0b86173
SHA512fc5ccedf165738a950319e3e6f8f4c630d378932bb1729b1d511f7a99f74b97cc7f9115aac484d867eacf577bbb11aa9f4a4b733c11d8ac53bf629711c2aa5ce
-
C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exeMD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
C:\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exeMD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
C:\Users\Admin\AppData\Local\7a29c289-9896-42ee-9521-f8a3ab33907f\83B.exeMD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\xeronxik123[1].jsonMD5
4219bdce7fd74aca99551e67980a4edc
SHA158bfdf7c09ce66c0c1a33cbcd3ccff2af74d0ccc
SHA256dd787f9a80b43c4f9cdf85434546ef62e13ea2a080b87f92a0cda1ad439cc5cc
SHA51290f3cecb2b8df47d3b7af1d311eb022ec56da9ac1b2407660a8b6a232f007af869752b96880b368a8c6c9a514aa9ba2f9578ead7b1a47bebbcf500b7e8e9cf1a
-
C:\Users\Admin\AppData\Local\Temp\2425.exeMD5
6c1a69a9e18b98cfb5785df241f0594c
SHA1de5736e5ed2c74b14f73564e0487a67135826028
SHA2566a9c8196948a83cf1d12891b639d5fd27fa04ec5e418600cf8429184b464258e
SHA512004725c80d44475bc59899da974dc0ac6d3b4a2cb39b8d850cd8e21e357794f674fcf267f29b1b79d499e3493fa1e60e96a3154bb18eef60a30913f9289bdd6e
-
C:\Users\Admin\AppData\Local\Temp\4ECE.exeMD5
4e34484acc2dca82861b7c093e6725e6
SHA19086b5b62ea11b8130a4287221a6261abaf4a7b6
SHA256f20b356209c6bfb249c15b756306e563b2ad6263dda15bb1eef2671e06a34d13
SHA512207669d9d21b03f49cb8ead0136affe55201fe660d240b558313c976585279fa770b40c2ab72cb1ca11126221de4986c12a60e7c711ab507ec05fed062be2379
-
C:\Users\Admin\AppData\Local\Temp\83B.exeMD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
C:\Users\Admin\AppData\Local\Temp\83B.exeMD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
C:\Users\Admin\AppData\Local\Temp\83B.exeMD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GZU6Q21X.txtMD5
2dca7736f3f6e29f934306ab3d9acba3
SHA10dcedeb0c8238abe249d794fcca46bf21cba9a04
SHA2560434669756b5e7a0eb6123552e2dfffa6d543ea29ee4a8153a620c95d4952453
SHA5120ccb3bf0bec4658bfc36105a205b834c4f1e95d3099d66387cb2dfbc7798218f7d9baaaef1994d4804c6ed1edc42700f7f49438b55fd31337907700351888c19
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\5.exeMD5
e1edad05494a14cefa05fa28c3611a6e
SHA1718fe9cf4e4a7272ffa0583c0851e3134d6f1547
SHA25600b09aba4c90b634ce887da826fc74284f171698c203dcfd7da3e8b529ac6db1
SHA5127230dd424bb0e28f436239ab45a7bb93867e9ec8533b3fdd780b430762a0f5f6e8bc514841f09e49be608334f77c8d11b1ae884f032df2c05aca5739cfdacca5
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exeMD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exeMD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exeMD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
\Users\Admin\AppData\Local\3854466e-77fb-493b-9a87-7ff570fab515\updatewin.exeMD5
2ba02a23e7b421bb51d9c47665ed540b
SHA1f5e6d401c61760fe7f6edad47a0517fb85d9cdeb
SHA25653430b4106efc011a26b50b14b9cead42607cb1de2a6a7ef7bbb04b960baea92
SHA51216c9c254b8f78212f949d78c5e4679dcc9d365ad3188ffa0d12d6ad7f6f3e41b7db229075c99f31e35b58f7e6764f9177f9d1c4bf3bc5827503a8a793b54ade2
-
\Users\Admin\AppData\Local\Temp\83B.exeMD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
\Users\Admin\AppData\Local\Temp\83B.exeMD5
f3f35dcb69fca49ae55a22812770ecb2
SHA1eb8c95dc050978d10c05073b0d5311f86da986ed
SHA256a3d26db7812778043abdf20ad3ff5caf68be3752fcd33de75d1bea8f515ed3d2
SHA512098d6f2f768811004ef87b51074fbbd9d36ee483cce637efe1f97dae0bec1bcc7c37e737d9ddb082cd1870c7c0952b334b4dbd07a7eb2b293b7a2646a7e10632
-
\Users\Admin\AppData\Local\Temp\CC4F.tmpMD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
memory/292-35-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/292-26-0x0000000001A80000-0x0000000001A91000-memory.dmpFilesize
68KB
-
memory/292-24-0x0000000000000000-mapping.dmp
-
memory/296-20-0x0000000000000000-mapping.dmp
-
memory/392-8-0x0000000000000000-mapping.dmp
-
memory/392-10-0x0000000001B10000-0x0000000001B21000-memory.dmpFilesize
68KB
-
memory/392-12-0x0000000001970000-0x0000000001A8A000-memory.dmpFilesize
1.1MB
-
memory/392-13-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/916-14-0x000007FEF6010000-0x000007FEF628A000-memory.dmpFilesize
2.5MB
-
memory/1008-70-0x0000000000000000-mapping.dmp
-
memory/1136-75-0x0000000001FE0000-0x0000000001FF1000-memory.dmpFilesize
68KB
-
memory/1136-84-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1136-78-0x0000000001FE0000-0x0000000001FF1000-memory.dmpFilesize
68KB
-
memory/1136-74-0x0000000000000000-mapping.dmp
-
memory/1152-2-0x0000000002230000-0x0000000002241000-memory.dmpFilesize
68KB
-
memory/1152-3-0x00000000760C1000-0x00000000760C3000-memory.dmpFilesize
8KB
-
memory/1152-5-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1152-6-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1328-7-0x0000000002A60000-0x0000000002A76000-memory.dmpFilesize
88KB
-
memory/1636-54-0x00000000022F0000-0x0000000002301000-memory.dmpFilesize
68KB
-
memory/1636-39-0x0000000000000000-mapping.dmp
-
memory/1636-56-0x0000000000250000-0x0000000000286000-memory.dmpFilesize
216KB
-
memory/1636-57-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/1664-55-0x0000000002140000-0x0000000002151000-memory.dmpFilesize
68KB
-
memory/1664-48-0x0000000000000000-mapping.dmp
-
memory/1664-60-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/1664-59-0x00000000002C0000-0x0000000000355000-memory.dmpFilesize
596KB
-
memory/1844-85-0x0000000000000000-mapping.dmp
-
memory/1996-53-0x0000000000400000-0x0000000000498000-memory.dmpFilesize
608KB
-
memory/1996-49-0x0000000002050000-0x0000000002061000-memory.dmpFilesize
68KB
-
memory/1996-36-0x0000000000000000-mapping.dmp
-
memory/1996-52-0x0000000002050000-0x00000000020E5000-memory.dmpFilesize
596KB
-
memory/2016-72-0x0000000000000000-mapping.dmp