Analysis
-
max time kernel
152s -
max time network
179s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-08-2021 13:56
Static task
static1
Behavioral task
behavioral1
Sample
9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe
Resource
win10v20210408
General
-
Target
9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe
-
Size
236KB
-
MD5
5c65af376bff0067a2109686755b36db
-
SHA1
97fe279e6107f0b1b8a6b34073f21b85b71e9a38
-
SHA256
9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1
-
SHA512
97d71490c89c1218fede0ab9f8b3bc859649c676348e992faee297fa7f7f4693d5d260a879111243f9b3e2c51b27f2c40b6b531d991de41055ebaa0cf7098a1c
Malware Config
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
185.215.113.29:8678
Extracted
vidar
40.1
517
https://eduarroma.tumblr.com/
-
profile_id
517
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1828-77-0x0000000000320000-0x000000000033D000-memory.dmp family_redline behavioral1/memory/1828-78-0x00000000003E0000-0x00000000003FC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/360-107-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral1/memory/360-108-0x000000000046B77D-mapping.dmp family_vidar behavioral1/memory/1548-111-0x0000000000310000-0x00000000003AE000-memory.dmp family_vidar behavioral1/memory/360-112-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
6BFC.exe6BFC.exe7975.exe6BFC.exe6BFC.exebuild2.exebuild2.exebuild3.exebuild3.exepid process 268 6BFC.exe 336 6BFC.exe 1828 7975.exe 1752 6BFC.exe 1644 6BFC.exe 1548 build2.exe 360 build2.exe 1752 build3.exe 1084 build3.exe -
Deletes itself 1 IoCs
Processes:
pid process 1256 -
Loads dropped DLL 12 IoCs
Processes:
6BFC.exe6BFC.exe6BFC.exe6BFC.exebuild2.exepid process 268 6BFC.exe 336 6BFC.exe 336 6BFC.exe 1752 6BFC.exe 1644 6BFC.exe 1644 6BFC.exe 1644 6BFC.exe 1644 6BFC.exe 360 build2.exe 360 build2.exe 360 build2.exe 360 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6BFC.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\2105e841-cb89-4a79-bcc9-1607d3f3f2ce\\6BFC.exe\" --AutoStart" 6BFC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 api.2ip.ua 19 api.2ip.ua 20 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
Processes:
6BFC.exe6BFC.exebuild2.exebuild3.exedescription pid process target process PID 268 set thread context of 336 268 6BFC.exe 6BFC.exe PID 1752 set thread context of 1644 1752 6BFC.exe 6BFC.exe PID 1548 set thread context of 360 1548 build2.exe build2.exe PID 1752 set thread context of 1084 1752 build3.exe build3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1184 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1804 taskkill.exe -
Processes:
6BFC.exe6BFC.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 6BFC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 6BFC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 6BFC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 6BFC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 6BFC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exepid process 1652 9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe 1652 9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1256 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exepid process 1652 9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
7975.exetaskkill.exedescription pid process Token: SeShutdownPrivilege 1256 Token: SeShutdownPrivilege 1256 Token: SeDebugPrivilege 1828 7975.exe Token: SeShutdownPrivilege 1256 Token: SeDebugPrivilege 1804 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1256 1256 1256 1256 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1256 1256 1256 1256 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6BFC.exe6BFC.exe6BFC.exe6BFC.exebuild2.exebuild3.exedescription pid process target process PID 1256 wrote to memory of 268 1256 6BFC.exe PID 1256 wrote to memory of 268 1256 6BFC.exe PID 1256 wrote to memory of 268 1256 6BFC.exe PID 1256 wrote to memory of 268 1256 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 268 wrote to memory of 336 268 6BFC.exe 6BFC.exe PID 1256 wrote to memory of 1828 1256 7975.exe PID 1256 wrote to memory of 1828 1256 7975.exe PID 1256 wrote to memory of 1828 1256 7975.exe PID 1256 wrote to memory of 1828 1256 7975.exe PID 336 wrote to memory of 876 336 6BFC.exe icacls.exe PID 336 wrote to memory of 876 336 6BFC.exe icacls.exe PID 336 wrote to memory of 876 336 6BFC.exe icacls.exe PID 336 wrote to memory of 876 336 6BFC.exe icacls.exe PID 336 wrote to memory of 1752 336 6BFC.exe 6BFC.exe PID 336 wrote to memory of 1752 336 6BFC.exe 6BFC.exe PID 336 wrote to memory of 1752 336 6BFC.exe 6BFC.exe PID 336 wrote to memory of 1752 336 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1752 wrote to memory of 1644 1752 6BFC.exe 6BFC.exe PID 1644 wrote to memory of 1548 1644 6BFC.exe build2.exe PID 1644 wrote to memory of 1548 1644 6BFC.exe build2.exe PID 1644 wrote to memory of 1548 1644 6BFC.exe build2.exe PID 1644 wrote to memory of 1548 1644 6BFC.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1548 wrote to memory of 360 1548 build2.exe build2.exe PID 1644 wrote to memory of 1752 1644 6BFC.exe build3.exe PID 1644 wrote to memory of 1752 1644 6BFC.exe build3.exe PID 1644 wrote to memory of 1752 1644 6BFC.exe build3.exe PID 1644 wrote to memory of 1752 1644 6BFC.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe PID 1752 wrote to memory of 1084 1752 build3.exe build3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe"C:\Users\Admin\AppData\Local\Temp\9ecbf71bf0f2833437b61948eb635a404d5d835fadc13669ccc433bc6e9954c1.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeC:\Users\Admin\AppData\Local\Temp\6BFC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeC:\Users\Admin\AppData\Local\Temp\6BFC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\2105e841-cb89-4a79-bcc9-1607d3f3f2ce" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exe"C:\Users\Admin\AppData\Local\Temp\6BFC.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exe"C:\Users\Admin\AppData\Local\Temp\6BFC.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exe"C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exe"C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exe"C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exe"C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\7975.exeC:\Users\Admin\AppData\Local\Temp\7975.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
963d1db9f126c1eb996607fb3eb2597f
SHA16c5081d894644e99f3839cad4b5464b82e2c1576
SHA256a4d77d674dff77c53515cd14631449b33ae373296f58ed62d38bc4cb3a2b2866
SHA51213ada4d9774bc9771421257d43ab462fd1418dc49d1523ef025e1677af243fb095265d30666faac23d5534fdcddc60b9c52fee92bd2f3f09fe04f222dbca669f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
2902de11e30dcc620b184e3bb0f0c1cb
SHA15d11d14a2558801a2688dc2d6dfad39ac294f222
SHA256e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544
SHA512efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
46e56db83743835a5a523c0714070a87
SHA128e43123d05c08d45f60164246d4c98b084c3891
SHA256f48d883230e3d4b59b4c63cfa18546e971222852fd4dffc78de373c7ccfc3a10
SHA512f8c6b87a711a31adba9029def9b9023f5d3ae50f3992e9a843c23844c8d612fd84a5dac987c47c06386a2a46e9d15efea097b3a7b965d6f75102d9daef72c22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
61b6b1e205ae198d8f6c9e3cafd6918e
SHA166ed869e6935e02fb339831296ac04997fcce914
SHA2566bcaed6acf9f96368355be3a0566b32c751744cb55e6a0efc85494d26c1bc0d2
SHA512054c09b37237fcebede91d9fdc9ef6b818d6e9294e3f575e594d9680daad24022a15f7f29b8d3f5e5f3345b1afea407969eecbd19e8b828d2e3585ad39ad6ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
6857233496636aaff4856275a3ac7309
SHA135ef5ea95468c170dc798246cdf6eb1e29d4e5d6
SHA2562c1d6f532ee6f9582eb55547f7cbf4909cbc928ed52b039dfa72f4aad040b159
SHA51239164b2bff17e3970b7bcb4049f7ed3e49cd62b7ef477f51f8e588c31cae8c10d1ddf5bc6fef9eac07bdc62265f5be532c132ea2981dcabbc73d22ef817eab77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
88d2ef9caddea298b568ffd5976180eb
SHA186bbc21333d93aa1904ee8f51bad0ced7eeb946c
SHA25642931d71348e5e7e2c2868682959337404429c14aa9a21393fa00dc4b877a6d1
SHA512a4337f2eddd9f00ca100f043121482e67131b343418fb47e63e17d375f59e49df10f9d9a09bdf46cd519ac30e62af18acfa574d57f5afdbb8c835c8119d3daff
-
C:\Users\Admin\AppData\Local\2105e841-cb89-4a79-bcc9-1607d3f3f2ce\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\7975.exeMD5
193232121f2548d05f4915cc583fbed6
SHA1b19662c7d6c8618fbc88cb9d67aa9241a64264dc
SHA256ca2714547361d26fbd3908a0a323d4bd34a2901249d1cb2aeb801104f0f88eac
SHA5122a801e59bbe03e73d76bb4560b8eb7780833cdf5970e227ae09cc8c3dbccdd2fc76559fcf63521dbd9baea659040756cd04ce2770536d583e6185c8d92ba8d95
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\msvcp140.dllMD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\vcruntime140.dllMD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
\Users\Admin\AppData\Local\26ade3e6-612c-425b-acee-374361b4fd6c\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
\Users\Admin\AppData\Local\Temp\6BFC.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
memory/268-68-0x0000000003D40000-0x0000000003E5B000-memory.dmpFilesize
1.1MB
-
memory/268-64-0x0000000000000000-mapping.dmp
-
memory/336-69-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/336-70-0x0000000000424141-mapping.dmp
-
memory/336-73-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/360-107-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/360-112-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/360-108-0x000000000046B77D-mapping.dmp
-
memory/876-84-0x0000000000000000-mapping.dmp
-
memory/1084-123-0x0000000000401AFA-mapping.dmp
-
memory/1084-122-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1084-128-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1100-129-0x0000000000000000-mapping.dmp
-
memory/1184-131-0x0000000000000000-mapping.dmp
-
memory/1256-63-0x00000000029B0000-0x00000000029C6000-memory.dmpFilesize
88KB
-
memory/1336-126-0x0000000000000000-mapping.dmp
-
memory/1548-104-0x0000000000000000-mapping.dmp
-
memory/1548-111-0x0000000000310000-0x00000000003AE000-memory.dmpFilesize
632KB
-
memory/1644-92-0x0000000000424141-mapping.dmp
-
memory/1644-95-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1652-60-0x0000000075561000-0x0000000075563000-memory.dmpFilesize
8KB
-
memory/1652-61-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/1652-62-0x0000000000400000-0x00000000023A5000-memory.dmpFilesize
31.6MB
-
memory/1752-127-0x0000000000220000-0x0000000000224000-memory.dmpFilesize
16KB
-
memory/1752-115-0x0000000000000000-mapping.dmp
-
memory/1752-88-0x0000000000000000-mapping.dmp
-
memory/1804-130-0x0000000000000000-mapping.dmp
-
memory/1828-79-0x0000000000400000-0x00000000023C1000-memory.dmpFilesize
31.8MB
-
memory/1828-78-0x00000000003E0000-0x00000000003FC000-memory.dmpFilesize
112KB
-
memory/1828-77-0x0000000000320000-0x000000000033D000-memory.dmpFilesize
116KB
-
memory/1828-76-0x0000000000250000-0x0000000000280000-memory.dmpFilesize
192KB
-
memory/1828-82-0x0000000004413000-0x0000000004414000-memory.dmpFilesize
4KB
-
memory/1828-74-0x0000000000000000-mapping.dmp
-
memory/1828-83-0x0000000004414000-0x0000000004416000-memory.dmpFilesize
8KB
-
memory/1828-81-0x0000000004412000-0x0000000004413000-memory.dmpFilesize
4KB
-
memory/1828-80-0x0000000004411000-0x0000000004412000-memory.dmpFilesize
4KB