Analysis
-
max time kernel
153s -
max time network
199s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-08-2021 13:56
Static task
static1
Behavioral task
behavioral1
Sample
863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe
Resource
win10v20210408
General
-
Target
863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe
-
Size
282KB
-
MD5
c53f5ca1fc3606b4412ca6bb5cf4b14c
-
SHA1
352d2571b1dbd4d4da5f53873b74cb9501216c47
-
SHA256
863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342
-
SHA512
1f0b50c4dd1fd3214e929ab861d1036cb51ebf43d8b2367f5f617bb2ad4d960b7330bbd0a802f736bc0008cab2816d68bf383b62b4b123a74dabe5a477b97a0d
Malware Config
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Extracted
redline
185.215.113.29:8678
Extracted
vidar
40.1
517
https://eduarroma.tumblr.com/
-
profile_id
517
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1020-77-0x0000000003EC0000-0x0000000003EDD000-memory.dmp family_redline behavioral1/memory/1020-78-0x0000000003F30000-0x0000000003F4C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/908-107-0x0000000000320000-0x00000000003BE000-memory.dmp family_vidar behavioral1/memory/676-108-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral1/memory/676-109-0x000000000046B77D-mapping.dmp family_vidar behavioral1/memory/676-112-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
9981.exe9981.exeA48A.exe9981.exe9981.exebuild2.exebuild2.exebuild3.exebuild3.exepid process 304 9981.exe 1056 9981.exe 1020 A48A.exe 1728 9981.exe 1804 9981.exe 908 build2.exe 676 build2.exe 1700 build3.exe 1576 build3.exe -
Deletes itself 1 IoCs
Processes:
pid process 1256 -
Loads dropped DLL 12 IoCs
Processes:
9981.exe9981.exe9981.exe9981.exebuild2.exepid process 304 9981.exe 1056 9981.exe 1056 9981.exe 1728 9981.exe 1804 9981.exe 1804 9981.exe 1804 9981.exe 1804 9981.exe 676 build2.exe 676 build2.exe 676 build2.exe 676 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9981.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\638f501a-3627-4170-868b-5b613f7c2c7a\\9981.exe\" --AutoStart" 9981.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 api.2ip.ua 20 api.2ip.ua 32 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
Processes:
9981.exe9981.exebuild2.exebuild3.exedescription pid process target process PID 304 set thread context of 1056 304 9981.exe 9981.exe PID 1728 set thread context of 1804 1728 9981.exe 9981.exe PID 908 set thread context of 676 908 build2.exe build2.exe PID 1700 set thread context of 1576 1700 build3.exe build3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
9981.exe9981.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 9981.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 9981.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 9981.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 9981.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 9981.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exepid process 1216 863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe 1216 863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1256 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exepid process 1216 863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
A48A.exedescription pid process Token: SeShutdownPrivilege 1256 Token: SeShutdownPrivilege 1256 Token: SeDebugPrivilege 1020 A48A.exe Token: SeShutdownPrivilege 1256 -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
pid process 1256 1256 1256 1256 1256 1256 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 1256 1256 1256 1256 1256 1256 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9981.exe9981.exe9981.exe9981.exebuild2.exebuild3.exedescription pid process target process PID 1256 wrote to memory of 304 1256 9981.exe PID 1256 wrote to memory of 304 1256 9981.exe PID 1256 wrote to memory of 304 1256 9981.exe PID 1256 wrote to memory of 304 1256 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 304 wrote to memory of 1056 304 9981.exe 9981.exe PID 1256 wrote to memory of 1020 1256 A48A.exe PID 1256 wrote to memory of 1020 1256 A48A.exe PID 1256 wrote to memory of 1020 1256 A48A.exe PID 1256 wrote to memory of 1020 1256 A48A.exe PID 1056 wrote to memory of 1860 1056 9981.exe icacls.exe PID 1056 wrote to memory of 1860 1056 9981.exe icacls.exe PID 1056 wrote to memory of 1860 1056 9981.exe icacls.exe PID 1056 wrote to memory of 1860 1056 9981.exe icacls.exe PID 1056 wrote to memory of 1728 1056 9981.exe 9981.exe PID 1056 wrote to memory of 1728 1056 9981.exe 9981.exe PID 1056 wrote to memory of 1728 1056 9981.exe 9981.exe PID 1056 wrote to memory of 1728 1056 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1728 wrote to memory of 1804 1728 9981.exe 9981.exe PID 1804 wrote to memory of 908 1804 9981.exe build2.exe PID 1804 wrote to memory of 908 1804 9981.exe build2.exe PID 1804 wrote to memory of 908 1804 9981.exe build2.exe PID 1804 wrote to memory of 908 1804 9981.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 908 wrote to memory of 676 908 build2.exe build2.exe PID 1804 wrote to memory of 1700 1804 9981.exe build3.exe PID 1804 wrote to memory of 1700 1804 9981.exe build3.exe PID 1804 wrote to memory of 1700 1804 9981.exe build3.exe PID 1804 wrote to memory of 1700 1804 9981.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe PID 1700 wrote to memory of 1576 1700 build3.exe build3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe"C:\Users\Admin\AppData\Local\Temp\863842faf56e4baa908875007919fae85b968d574453a72ccea51ef0c7b97342.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\9981.exeC:\Users\Admin\AppData\Local\Temp\9981.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9981.exeC:\Users\Admin\AppData\Local\Temp\9981.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\638f501a-3627-4170-868b-5b613f7c2c7a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\9981.exe"C:\Users\Admin\AppData\Local\Temp\9981.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9981.exe"C:\Users\Admin\AppData\Local\Temp\9981.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exe"C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exe"C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exe"C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exe"C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\A48A.exeC:\Users\Admin\AppData\Local\Temp\A48A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
963d1db9f126c1eb996607fb3eb2597f
SHA16c5081d894644e99f3839cad4b5464b82e2c1576
SHA256a4d77d674dff77c53515cd14631449b33ae373296f58ed62d38bc4cb3a2b2866
SHA51213ada4d9774bc9771421257d43ab462fd1418dc49d1523ef025e1677af243fb095265d30666faac23d5534fdcddc60b9c52fee92bd2f3f09fe04f222dbca669f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
2902de11e30dcc620b184e3bb0f0c1cb
SHA15d11d14a2558801a2688dc2d6dfad39ac294f222
SHA256e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544
SHA512efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
46e56db83743835a5a523c0714070a87
SHA128e43123d05c08d45f60164246d4c98b084c3891
SHA256f48d883230e3d4b59b4c63cfa18546e971222852fd4dffc78de373c7ccfc3a10
SHA512f8c6b87a711a31adba9029def9b9023f5d3ae50f3992e9a843c23844c8d612fd84a5dac987c47c06386a2a46e9d15efea097b3a7b965d6f75102d9daef72c22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
170d0df545ffc1ce74b15e9a0012213b
SHA13767473f81812506c995596e127e6bb22d92e0f9
SHA256612e918726fe71e8884ddcada56e6cf701ccfb7f58d719c75c5b73bab1de4a09
SHA5125e95f4ea6d726b5537cc0ccd12b2156260c392c743b64aded3be3573de57f6572dd15b88beb98b72eece6c75f2b8e3c31a885645a9f0e1207c69b4b334712708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
6236bf927e78664c5213ed0d49133b17
SHA1fbdf68735d5b2658db99054f317037ebc24f334e
SHA2560fe3a2ba4f0d708696dd673448c40494f4b5ebdf2cb769bb13b339c41655b0ad
SHA51261ac5e926a3982080b955e955f772a013cc85dd65f5e53cff536ff1e5b93919d6c465495f5747058180453fe60f73ad28f72c86ce2df728fec3df683528e6b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
d9ced97123243b61d540bde358daad57
SHA1b5aa53d4f10580bb381209929887abe014bdd0ba
SHA2567f25fb9ae00774e339f77da45da1da5a9f110902e3e436a21ed76b7c739b8713
SHA512c5ffe36e9b82d1396a63bb713d76cee2edfe592ccae8fe00af9c39df77084c8acfc7b6336580224b8e04c857de42ebb5874fe6713ee279715c359cf01cd9e08c
-
C:\Users\Admin\AppData\Local\638f501a-3627-4170-868b-5b613f7c2c7a\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
C:\Users\Admin\AppData\Local\Temp\A48A.exeMD5
193232121f2548d05f4915cc583fbed6
SHA1b19662c7d6c8618fbc88cb9d67aa9241a64264dc
SHA256ca2714547361d26fbd3908a0a323d4bd34a2901249d1cb2aeb801104f0f88eac
SHA5122a801e59bbe03e73d76bb4560b8eb7780833cdf5970e227ae09cc8c3dbccdd2fc76559fcf63521dbd9baea659040756cd04ce2770536d583e6185c8d92ba8d95
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\msvcp140.dllMD5
109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\vcruntime140.dllMD5
7587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
\Users\Admin\AppData\Local\Temp\9981.exeMD5
8c6fb9cb13d5dd7abcc7bc57574424e8
SHA1592328dfe419419a0bb8c56c6fc2aee6673d7a4e
SHA25638a7352cdccefcc0f701faeb7be1cc32fb7d4f5ed30e1d67a49e539ca16b58be
SHA512bc973ad165a9c6c4bcfa76010b0dd4cfff0722e8c8b858d52f832d411e27afdad79f29c0a4611b7212c0c77f2ce6a561cb9a4dbd88244aa4e2d5818de2151088
-
\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build2.exeMD5
18c960230dd536a0d62f98d6ec723ff0
SHA1ab8b12d852f35deb702a0e92c18099fa08af04e1
SHA256381b93b17fc27fb2e22ed16f1ed5724b1b8adc5be8cbe996950949c01c6fa3b4
SHA5123de9421f26c1aa7120bb5740ea50599c473e3b7f1e76e1a201505c57908320690643c65d0f971a30c992984b28ade9a6fad7f4bc3a34a9e954ac888995404fd4
-
\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
\Users\Admin\AppData\Local\a13eb43e-9332-4380-9382-4c4283bcebae\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
memory/304-72-0x0000000002430000-0x000000000254B000-memory.dmpFilesize
1.1MB
-
memory/304-64-0x0000000000000000-mapping.dmp
-
memory/676-112-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/676-109-0x000000000046B77D-mapping.dmp
-
memory/676-108-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/908-104-0x0000000000000000-mapping.dmp
-
memory/908-107-0x0000000000320000-0x00000000003BE000-memory.dmpFilesize
632KB
-
memory/1020-79-0x0000000000400000-0x00000000023C1000-memory.dmpFilesize
31.8MB
-
memory/1020-82-0x0000000006833000-0x0000000006834000-memory.dmpFilesize
4KB
-
memory/1020-81-0x0000000006832000-0x0000000006833000-memory.dmpFilesize
4KB
-
memory/1020-77-0x0000000003EC0000-0x0000000003EDD000-memory.dmpFilesize
116KB
-
memory/1020-83-0x0000000006834000-0x0000000006836000-memory.dmpFilesize
8KB
-
memory/1020-80-0x0000000006831000-0x0000000006832000-memory.dmpFilesize
4KB
-
memory/1020-78-0x0000000003F30000-0x0000000003F4C000-memory.dmpFilesize
112KB
-
memory/1020-74-0x0000000000000000-mapping.dmp
-
memory/1020-76-0x0000000000230000-0x0000000000260000-memory.dmpFilesize
192KB
-
memory/1056-73-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1056-69-0x0000000000424141-mapping.dmp
-
memory/1056-68-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1216-60-0x0000000075A71000-0x0000000075A73000-memory.dmpFilesize
8KB
-
memory/1216-61-0x0000000000020000-0x0000000000029000-memory.dmpFilesize
36KB
-
memory/1216-62-0x0000000000400000-0x00000000023B1000-memory.dmpFilesize
31.7MB
-
memory/1256-63-0x0000000002C20000-0x0000000002C36000-memory.dmpFilesize
88KB
-
memory/1576-118-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1576-119-0x0000000000401AFA-mapping.dmp
-
memory/1576-128-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1700-115-0x0000000000000000-mapping.dmp
-
memory/1700-127-0x0000000000220000-0x0000000000224000-memory.dmpFilesize
16KB
-
memory/1728-88-0x0000000000000000-mapping.dmp
-
memory/1804-101-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1804-92-0x0000000000424141-mapping.dmp
-
memory/1860-84-0x0000000000000000-mapping.dmp
-
memory/2032-126-0x0000000000000000-mapping.dmp