Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    14-08-2021 06:33

General

  • Target

    27f8a512e8c010f338893076c00bb848.exe

  • Size

    179KB

  • MD5

    27f8a512e8c010f338893076c00bb848

  • SHA1

    bb8bc6f7f277ebdae7e84895c621b15a1876eee5

  • SHA256

    6af4561fbac47bfe47db9d90beda964637aab451521caea9a2e60e1806d96c48

  • SHA512

    d8001e276d22126cacce510bac8676e9275cd408e904ece1ad153ad42def20adf032caf55637189a005c8f5b981671e5b7f36afbe1917129eb06e6cededee6ff

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforjuly1.xyz/

http://readinglistforjuly2.xyz/

http://readinglistforjuly3.xyz/

http://readinglistforjuly4.xyz/

http://readinglistforjuly5.xyz/

http://readinglistforjuly6.xyz/

http://readinglistforjuly7.xyz/

http://readinglistforjuly8.xyz/

http://readinglistforjuly9.xyz/

http://readinglistforjuly10.xyz/

http://readinglistforjuly1.site/

http://readinglistforjuly2.site/

http://readinglistforjuly3.site/

http://readinglistforjuly4.site/

http://readinglistforjuly5.site/

http://readinglistforjuly6.site/

http://readinglistforjuly7.site/

http://readinglistforjuly8.site/

http://readinglistforjuly9.site/

http://readinglistforjuly10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

MIX#13.08

C2

qusshedrni.xyz:80

Extracted

Family

vidar

Version

40

Botnet

936

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    936

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • Vidar Stealer 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27f8a512e8c010f338893076c00bb848.exe
    "C:\Users\Admin\AppData\Local\Temp\27f8a512e8c010f338893076c00bb848.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\27f8a512e8c010f338893076c00bb848.exe
      "C:\Users\Admin\AppData\Local\Temp\27f8a512e8c010f338893076c00bb848.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3164
  • C:\Users\Admin\AppData\Local\Temp\4F2.exe
    C:\Users\Admin\AppData\Local\Temp\4F2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\4F2.exe
      "C:\Users\Admin\AppData\Local\Temp\4F2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies system certificate store
      PID:4188
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im 4F2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4F2.exe" & del C:\ProgramData\*.dll & exit
        3⤵
          PID:4300
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im 4F2.exe /f
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4348
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 6
            4⤵
            • Delays execution with timeout.exe
            PID:4396
    • C:\Users\Admin\AppData\Local\Temp\590.exe
      C:\Users\Admin\AppData\Local\Temp\590.exe
      1⤵
      • Executes dropped EXE
      PID:572
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 736
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 748
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 848
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 884
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 828
        2⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3544
    • C:\Users\Admin\AppData\Local\Temp\794.exe
      C:\Users\Admin\AppData\Local\Temp\794.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3256
    • C:\Users\Admin\AppData\Local\Temp\90C.exe
      C:\Users\Admin\AppData\Local\Temp\90C.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
        C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3868
        • C:\Users\Admin\Windows Application Manager\winappmgr.exe
          "C:\Users\Admin\Windows Application Manager\winappmgr.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of WriteProcessMemory
          PID:1620
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall show rule name="c:\users\admin\windows application manager\winappmgr.exe" || netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\admin\windows application manager\winappmgr.exe" program="C:\Users\Admin\Windows Application Manager\winappmgr.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3192
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall show rule name="c:\users\admin\windows application manager\winappmgr.exe"
              5⤵
                PID:3252
              • C:\Windows\SysWOW64\netsh.exe
                netsh advfirewall firewall add rule action=allow profile=any protocol=any enable=yes direction=in name="c:\users\admin\windows application manager\winappmgr.exe" program="C:\Users\Admin\Windows Application Manager\winappmgr.exe"
                5⤵
                  PID:4104
        • C:\Users\Admin\AppData\Local\Temp\A65.exe
          C:\Users\Admin\AppData\Local\Temp\A65.exe
          1⤵
          • Executes dropped EXE
          PID:3928
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:1600
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:636
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:2292
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:2052
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3020
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:1512
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:1516
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:3156
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:2264

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Modify Existing Service

                          1
                          T1031

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Defense Evasion

                          Modify Registry

                          2
                          T1112

                          Install Root Certificate

                          1
                          T1130

                          Credential Access

                          Credentials in Files

                          3
                          T1081

                          Discovery

                          Query Registry

                          4
                          T1012

                          System Information Discovery

                          4
                          T1082

                          Peripheral Device Discovery

                          1
                          T1120

                          Collection

                          Data from Local System

                          3
                          T1005

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\freebl3.dll
                            MD5

                            ef2834ac4ee7d6724f255beaf527e635

                            SHA1

                            5be8c1e73a21b49f353c2ecfa4108e43a883cb7b

                            SHA256

                            a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba

                            SHA512

                            c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2

                          • C:\ProgramData\mozglue.dll
                            MD5

                            8f73c08a9660691143661bf7332c3c27

                            SHA1

                            37fa65dd737c50fda710fdbde89e51374d0c204a

                            SHA256

                            3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                            SHA512

                            0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                          • C:\ProgramData\msvcp140.dll
                            MD5

                            109f0f02fd37c84bfc7508d4227d7ed5

                            SHA1

                            ef7420141bb15ac334d3964082361a460bfdb975

                            SHA256

                            334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                            SHA512

                            46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                          • C:\ProgramData\nss3.dll
                            MD5

                            bfac4e3c5908856ba17d41edcd455a51

                            SHA1

                            8eec7e888767aa9e4cca8ff246eb2aacb9170428

                            SHA256

                            e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                            SHA512

                            2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                          • C:\ProgramData\softokn3.dll
                            MD5

                            a2ee53de9167bf0d6c019303b7ca84e5

                            SHA1

                            2a3c737fa1157e8483815e98b666408a18c0db42

                            SHA256

                            43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

                            SHA512

                            45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

                          • C:\ProgramData\vcruntime140.dll
                            MD5

                            7587bf9cb4147022cd5681b015183046

                            SHA1

                            f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                            SHA256

                            c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                            SHA512

                            0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                          • C:\Users\Admin\AppData\Local\Temp\4F2.exe
                            MD5

                            42c33b9a16b4942491702076b3688598

                            SHA1

                            fd931689d541d3b82ce38622ef60cff25f2eea3f

                            SHA256

                            22cfe61a2ee0f1f0cba957fb313ca979e7fc41a2f9a1b5dddf8d9af798113389

                            SHA512

                            cd0cfc3a68ff9e84d71b776f187b906bd10e4eb89190ee5b2587ff3ac340b4a5c9516966339c064141b064b9bcd3e354aeb2ec7c6cba424affd5cd886bacb366

                          • C:\Users\Admin\AppData\Local\Temp\4F2.exe
                            MD5

                            42c33b9a16b4942491702076b3688598

                            SHA1

                            fd931689d541d3b82ce38622ef60cff25f2eea3f

                            SHA256

                            22cfe61a2ee0f1f0cba957fb313ca979e7fc41a2f9a1b5dddf8d9af798113389

                            SHA512

                            cd0cfc3a68ff9e84d71b776f187b906bd10e4eb89190ee5b2587ff3ac340b4a5c9516966339c064141b064b9bcd3e354aeb2ec7c6cba424affd5cd886bacb366

                          • C:\Users\Admin\AppData\Local\Temp\4F2.exe
                            MD5

                            42c33b9a16b4942491702076b3688598

                            SHA1

                            fd931689d541d3b82ce38622ef60cff25f2eea3f

                            SHA256

                            22cfe61a2ee0f1f0cba957fb313ca979e7fc41a2f9a1b5dddf8d9af798113389

                            SHA512

                            cd0cfc3a68ff9e84d71b776f187b906bd10e4eb89190ee5b2587ff3ac340b4a5c9516966339c064141b064b9bcd3e354aeb2ec7c6cba424affd5cd886bacb366

                          • C:\Users\Admin\AppData\Local\Temp\590.exe
                            MD5

                            ed20a01ec2d93943bd0664fafb76daa6

                            SHA1

                            4736f0170c32b4757e062eb6b1d47d46c7d5ab29

                            SHA256

                            5bc02ebc009910c9625991d64f2170d0c1ddd2b403d34674e3b48e8fd0f22242

                            SHA512

                            b22360f22bb48529b2b986f7ef37eb9d1cdb42eaaea7fa44b93fc48a0f2b02ee4d4029d1d0e80867ce0a8d8a322f9c463182910c83cc36d4b53fb2c50c470ccf

                          • C:\Users\Admin\AppData\Local\Temp\590.exe
                            MD5

                            ed20a01ec2d93943bd0664fafb76daa6

                            SHA1

                            4736f0170c32b4757e062eb6b1d47d46c7d5ab29

                            SHA256

                            5bc02ebc009910c9625991d64f2170d0c1ddd2b403d34674e3b48e8fd0f22242

                            SHA512

                            b22360f22bb48529b2b986f7ef37eb9d1cdb42eaaea7fa44b93fc48a0f2b02ee4d4029d1d0e80867ce0a8d8a322f9c463182910c83cc36d4b53fb2c50c470ccf

                          • C:\Users\Admin\AppData\Local\Temp\794.exe
                            MD5

                            5d7a2f3127f3faa3777e4b61c6d3a650

                            SHA1

                            5d1ee1d08f62309d55f7a9be5d0cbe048455f5aa

                            SHA256

                            0c94e48c304317df32d5a06e21d350ae528276ead8da38b7e33649cfa21f438f

                            SHA512

                            2332d62b943465e2b1409c5d4c1aa2dfe8e3808bd2ec6ad22b3e4136a94ff9d2c90776e74b84226e280e27ef0b36b69eb3a0ddfdc8115540e1f7e50dce6eb7df

                          • C:\Users\Admin\AppData\Local\Temp\794.exe
                            MD5

                            5d7a2f3127f3faa3777e4b61c6d3a650

                            SHA1

                            5d1ee1d08f62309d55f7a9be5d0cbe048455f5aa

                            SHA256

                            0c94e48c304317df32d5a06e21d350ae528276ead8da38b7e33649cfa21f438f

                            SHA512

                            2332d62b943465e2b1409c5d4c1aa2dfe8e3808bd2ec6ad22b3e4136a94ff9d2c90776e74b84226e280e27ef0b36b69eb3a0ddfdc8115540e1f7e50dce6eb7df

                          • C:\Users\Admin\AppData\Local\Temp\90C.exe
                            MD5

                            627fc88e4e32885ef3eb655f353d3d73

                            SHA1

                            d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                            SHA256

                            789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                            SHA512

                            c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                          • C:\Users\Admin\AppData\Local\Temp\90C.exe
                            MD5

                            627fc88e4e32885ef3eb655f353d3d73

                            SHA1

                            d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                            SHA256

                            789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                            SHA512

                            c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                          • C:\Users\Admin\AppData\Local\Temp\A65.exe
                            MD5

                            627fc88e4e32885ef3eb655f353d3d73

                            SHA1

                            d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                            SHA256

                            789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                            SHA512

                            c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                          • C:\Users\Admin\AppData\Local\Temp\A65.exe
                            MD5

                            627fc88e4e32885ef3eb655f353d3d73

                            SHA1

                            d41f2cd39501c8df8f71e64cf0b45d0ff6931ec6

                            SHA256

                            789a247aac003f6562a3809a60d214843d77f8c0e0fa24ba479a229a4b86cf69

                            SHA512

                            c5113af91da5df84108ffb14af33167a54b793789a0eb1aa2ec03d7282dcd05b8a6d10ebe3646102c9d430a2f785fd7bccf58fd22b45d73c1e74bbc93677d4f4

                          • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
                            MD5

                            39d6ec1892af37c0fd5c5c2ea89ea782

                            SHA1

                            8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                            SHA256

                            439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                            SHA512

                            fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                          • C:\Users\Admin\AppData\Local\Temp\hhhhhhhhhhh.exe
                            MD5

                            39d6ec1892af37c0fd5c5c2ea89ea782

                            SHA1

                            8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                            SHA256

                            439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                            SHA512

                            fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                          • C:\Users\Admin\Windows Application Manager\winappmgr.exe
                            MD5

                            39d6ec1892af37c0fd5c5c2ea89ea782

                            SHA1

                            8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                            SHA256

                            439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                            SHA512

                            fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                          • C:\Users\Admin\Windows Application Manager\winappmgr.exe
                            MD5

                            39d6ec1892af37c0fd5c5c2ea89ea782

                            SHA1

                            8ec2c72146cbb96c940b6b1d1057b2eb72fc36d0

                            SHA256

                            439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7

                            SHA512

                            fd6260b87cfe54a1d81d88d57a49754c6c39bc9c11cd6dbe515fe845958f97a9a2abb3ecd08ed65e8eaec541056b4a7dfe50598b5bd2c807270617a94bec6102

                          • \ProgramData\mozglue.dll
                            MD5

                            8f73c08a9660691143661bf7332c3c27

                            SHA1

                            37fa65dd737c50fda710fdbde89e51374d0c204a

                            SHA256

                            3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                            SHA512

                            0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                          • \ProgramData\nss3.dll
                            MD5

                            bfac4e3c5908856ba17d41edcd455a51

                            SHA1

                            8eec7e888767aa9e4cca8ff246eb2aacb9170428

                            SHA256

                            e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                            SHA512

                            2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                          • memory/572-145-0x0000000000400000-0x0000000002D01000-memory.dmp
                            Filesize

                            41.0MB

                          • memory/572-135-0x0000000002E00000-0x0000000002F4A000-memory.dmp
                            Filesize

                            1.3MB

                          • memory/572-121-0x0000000000000000-mapping.dmp
                          • memory/636-153-0x0000000000000000-mapping.dmp
                          • memory/636-159-0x0000000000500000-0x0000000000507000-memory.dmp
                            Filesize

                            28KB

                          • memory/636-160-0x00000000004F0000-0x00000000004FC000-memory.dmp
                            Filesize

                            48KB

                          • memory/828-132-0x0000000000000000-mapping.dmp
                          • memory/1456-116-0x0000000002EA0000-0x0000000002EAA000-memory.dmp
                            Filesize

                            40KB

                          • memory/1512-178-0x0000000000A10000-0x0000000000A1C000-memory.dmp
                            Filesize

                            48KB

                          • memory/1512-175-0x0000000000000000-mapping.dmp
                          • memory/1512-177-0x0000000000A20000-0x0000000000A26000-memory.dmp
                            Filesize

                            24KB

                          • memory/1516-182-0x00000000003F0000-0x00000000003F9000-memory.dmp
                            Filesize

                            36KB

                          • memory/1516-180-0x0000000000600000-0x0000000000604000-memory.dmp
                            Filesize

                            16KB

                          • memory/1516-179-0x0000000000000000-mapping.dmp
                          • memory/1600-141-0x0000000000000000-mapping.dmp
                          • memory/1600-157-0x0000000000870000-0x00000000008E4000-memory.dmp
                            Filesize

                            464KB

                          • memory/1600-158-0x0000000000800000-0x000000000086B000-memory.dmp
                            Filesize

                            428KB

                          • memory/1620-188-0x0000000000000000-mapping.dmp
                          • memory/2052-173-0x0000000000B10000-0x0000000000B1F000-memory.dmp
                            Filesize

                            60KB

                          • memory/2052-171-0x0000000000B20000-0x0000000000B29000-memory.dmp
                            Filesize

                            36KB

                          • memory/2052-169-0x0000000000000000-mapping.dmp
                          • memory/2264-187-0x0000000000A70000-0x0000000000A79000-memory.dmp
                            Filesize

                            36KB

                          • memory/2264-184-0x0000000000000000-mapping.dmp
                          • memory/2264-186-0x0000000000A80000-0x0000000000A85000-memory.dmp
                            Filesize

                            20KB

                          • memory/2284-143-0x0000000005010000-0x00000000050AC000-memory.dmp
                            Filesize

                            624KB

                          • memory/2284-154-0x0000000005640000-0x0000000005658000-memory.dmp
                            Filesize

                            96KB

                          • memory/2284-200-0x0000000008880000-0x000000000896F000-memory.dmp
                            Filesize

                            956KB

                          • memory/2284-201-0x000000000ADA0000-0x000000000AE3D000-memory.dmp
                            Filesize

                            628KB

                          • memory/2284-127-0x0000000005660000-0x0000000005661000-memory.dmp
                            Filesize

                            4KB

                          • memory/2284-118-0x0000000000000000-mapping.dmp
                          • memory/2284-140-0x0000000005320000-0x0000000005321000-memory.dmp
                            Filesize

                            4KB

                          • memory/2284-139-0x0000000005030000-0x0000000005031000-memory.dmp
                            Filesize

                            4KB

                          • memory/2284-124-0x0000000000690000-0x0000000000691000-memory.dmp
                            Filesize

                            4KB

                          • memory/2284-129-0x0000000005160000-0x0000000005161000-memory.dmp
                            Filesize

                            4KB

                          • memory/2284-126-0x00000000050C0000-0x00000000050C1000-memory.dmp
                            Filesize

                            4KB

                          • memory/2292-166-0x0000000000CE0000-0x0000000000CEB000-memory.dmp
                            Filesize

                            44KB

                          • memory/2292-161-0x0000000000000000-mapping.dmp
                          • memory/2292-164-0x0000000000CF0000-0x0000000000CF7000-memory.dmp
                            Filesize

                            28KB

                          • memory/3008-117-0x0000000000C90000-0x0000000000CA6000-memory.dmp
                            Filesize

                            88KB

                          • memory/3020-172-0x0000000000000000-mapping.dmp
                          • memory/3020-174-0x0000000000F40000-0x0000000000F45000-memory.dmp
                            Filesize

                            20KB

                          • memory/3020-176-0x0000000000F30000-0x0000000000F39000-memory.dmp
                            Filesize

                            36KB

                          • memory/3156-183-0x0000000000680000-0x0000000000685000-memory.dmp
                            Filesize

                            20KB

                          • memory/3156-181-0x0000000000000000-mapping.dmp
                          • memory/3156-185-0x00000000003F0000-0x00000000003F9000-memory.dmp
                            Filesize

                            36KB

                          • memory/3164-114-0x0000000000400000-0x0000000000409000-memory.dmp
                            Filesize

                            36KB

                          • memory/3164-115-0x0000000000402E1A-mapping.dmp
                          • memory/3192-197-0x0000000000000000-mapping.dmp
                          • memory/3252-198-0x0000000000000000-mapping.dmp
                          • memory/3256-196-0x0000000009AF0000-0x0000000009AF1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-151-0x0000000007413000-0x0000000007414000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-152-0x0000000007920000-0x0000000007921000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-191-0x0000000008CD0000-0x0000000008CD1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-192-0x0000000008EA0000-0x0000000008EA1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-193-0x00000000094D0000-0x00000000094D1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-194-0x0000000009830000-0x0000000009831000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-156-0x00000000072E0000-0x00000000072E1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-162-0x0000000007340000-0x0000000007341000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-163-0x0000000007414000-0x0000000007416000-memory.dmp
                            Filesize

                            8KB

                          • memory/3256-142-0x0000000004A50000-0x0000000004A6C000-memory.dmp
                            Filesize

                            112KB

                          • memory/3256-144-0x0000000002CE0000-0x0000000002D8E000-memory.dmp
                            Filesize

                            696KB

                          • memory/3256-148-0x0000000004AF0000-0x0000000004B0A000-memory.dmp
                            Filesize

                            104KB

                          • memory/3256-155-0x0000000004E70000-0x0000000004E71000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-170-0x0000000007FF0000-0x0000000007FF1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-150-0x0000000007412000-0x0000000007413000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-128-0x0000000000000000-mapping.dmp
                          • memory/3256-149-0x0000000007410000-0x0000000007411000-memory.dmp
                            Filesize

                            4KB

                          • memory/3256-147-0x0000000000400000-0x0000000002CD5000-memory.dmp
                            Filesize

                            40.8MB

                          • memory/3868-165-0x0000000000000000-mapping.dmp
                          • memory/3928-136-0x0000000000000000-mapping.dmp
                          • memory/4104-199-0x0000000000000000-mapping.dmp
                          • memory/4188-202-0x0000000000400000-0x00000000004A1000-memory.dmp
                            Filesize

                            644KB

                          • memory/4188-205-0x0000000000400000-0x00000000004A1000-memory.dmp
                            Filesize

                            644KB

                          • memory/4188-203-0x000000000046B77D-mapping.dmp
                          • memory/4300-208-0x0000000000000000-mapping.dmp
                          • memory/4348-209-0x0000000000000000-mapping.dmp
                          • memory/4396-210-0x0000000000000000-mapping.dmp