Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 05:36
Static task
static1
Behavioral task
behavioral1
Sample
e159d860d0cfa59816c686e4a9914113.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
e159d860d0cfa59816c686e4a9914113.exe
Resource
win10-en-20210920
General
-
Target
e159d860d0cfa59816c686e4a9914113.exe
-
Size
21.6MB
-
MD5
e159d860d0cfa59816c686e4a9914113
-
SHA1
484539b10b659fb4ab48e79bb0de0d0879153426
-
SHA256
6b6fc62a294d5ef1c619d623f1cf6d735d9f191df9ef5c745b0881b1e01b8565
-
SHA512
63c8fd0c70c18406909d914af5f0c8ab0708bbeee7e896d54c77b80e32b0fbb413e87d9e93498ddbbbaacf24a98cacabac81b861982749d6671ae7a05b1fbab2
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
MsiExec.exepowershell.exeflow pid process 15 3112 MsiExec.exe 23 1332 powershell.exe -
Loads dropped DLL 17 IoCs
Processes:
MsiExec.exerundll32.exepid process 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe 3112 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e159d860d0cfa59816c686e4a9914113.exemsiexec.exedescription ioc process File opened (read-only) \??\I: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\M: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\T: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\L: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\Q: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\U: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\F: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\Y: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\K: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\G: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\H: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\W: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\X: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\Z: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\S: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\N: e159d860d0cfa59816c686e4a9914113.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: e159d860d0cfa59816c686e4a9914113.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
e159d860d0cfa59816c686e4a9914113.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 e159d860d0cfa59816c686e4a9914113.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e159d860d0cfa59816c686e4a9914113.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e159d860d0cfa59816c686e4a9914113.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e159d860d0cfa59816c686e4a9914113.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e159d860d0cfa59816c686e4a9914113.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepowershell.exepid process 4052 rundll32.exe 1332 powershell.exe 1332 powershell.exe 1332 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exee159d860d0cfa59816c686e4a9914113.exedescription pid process Token: SeSecurityPrivilege 1184 msiexec.exe Token: SeCreateTokenPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeAssignPrimaryTokenPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeLockMemoryPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeIncreaseQuotaPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeMachineAccountPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeTcbPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSecurityPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeTakeOwnershipPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeLoadDriverPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSystemProfilePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSystemtimePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeProfSingleProcessPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeIncBasePriorityPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreatePagefilePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreatePermanentPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeBackupPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeRestorePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeShutdownPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeDebugPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeAuditPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSystemEnvironmentPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeChangeNotifyPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeRemoteShutdownPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeUndockPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSyncAgentPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeEnableDelegationPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeManageVolumePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeImpersonatePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreateGlobalPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreateTokenPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeAssignPrimaryTokenPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeLockMemoryPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeIncreaseQuotaPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeMachineAccountPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeTcbPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSecurityPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeTakeOwnershipPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeLoadDriverPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSystemProfilePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSystemtimePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeProfSingleProcessPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeIncBasePriorityPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreatePagefilePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreatePermanentPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeBackupPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeRestorePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeShutdownPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeDebugPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeAuditPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSystemEnvironmentPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeChangeNotifyPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeRemoteShutdownPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeUndockPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeSyncAgentPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeEnableDelegationPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeManageVolumePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeImpersonatePrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreateGlobalPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeCreateTokenPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeAssignPrimaryTokenPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeLockMemoryPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeIncreaseQuotaPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe Token: SeMachineAccountPrivilege 2396 e159d860d0cfa59816c686e4a9914113.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
e159d860d0cfa59816c686e4a9914113.exepid process 2396 e159d860d0cfa59816c686e4a9914113.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
msiexec.exeMsiExec.exedescription pid process target process PID 1184 wrote to memory of 3112 1184 msiexec.exe MsiExec.exe PID 1184 wrote to memory of 3112 1184 msiexec.exe MsiExec.exe PID 1184 wrote to memory of 3112 1184 msiexec.exe MsiExec.exe PID 3112 wrote to memory of 4052 3112 MsiExec.exe rundll32.exe PID 3112 wrote to memory of 4052 3112 MsiExec.exe rundll32.exe PID 3112 wrote to memory of 4052 3112 MsiExec.exe rundll32.exe PID 3112 wrote to memory of 1332 3112 MsiExec.exe powershell.exe PID 3112 wrote to memory of 1332 3112 MsiExec.exe powershell.exe PID 3112 wrote to memory of 1332 3112 MsiExec.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e159d860d0cfa59816c686e4a9914113.exe"C:\Users\Admin\AppData\Local\Temp\e159d860d0cfa59816c686e4a9914113.exe"1⤵
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B71A919C840EAB167D5F580FD02F36D2 C2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIC374.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259376046 468 GameCustomActions!GameCustomActions.CustomActions.GetFileNameFromProcessCustomAction3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssC8C2.ps1"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSIBBFF.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
C:\Users\Admin\AppData\Local\Temp\MSIBEFD.tmpMD5
c47a0f58475fb02a7dde24dbfecbb30a
SHA1947c50a5820e640b85b323ff3c7b967280388738
SHA25642cf8a3b2212460dee10e913eb579b2a7f24360d00ad41455d4759dd9e2393be
SHA512d576cc16777fcab3bc7e30830f27000b96b79a94bc5a6eefbee3b7585c621a6aa466b14d7038ccc18d76b5c30f2dd99d5220757c4a14b7ecb65cef5d2e0f52cf
-
C:\Users\Admin\AppData\Local\Temp\MSIC17F.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
C:\Users\Admin\AppData\Local\Temp\MSIC374.tmpMD5
e426b263923488b1b1eb0ad1dd6f0c66
SHA11a1f529243bf17c258d121fb123163d3629548f1
SHA25694e4e2b6c64d322acbf97e3a5f3dfd5567190624f1d9154f308b66d1aca91de4
SHA512c54ebfc0f30af1e5355381e85efcc4f5c4a9246ee2ed17f484f099226f3c7663e96601362f4f10ce31d027b7ddfe6d8227f85437575c7cd7179aeb158e2f72f7
-
C:\Users\Admin\AppData\Local\Temp\MSIC895.tmpMD5
882e26bce2987a04b0e50ef204466cbe
SHA1a5b675e9030da9d63dcdfb9fe0ba622684da933e
SHA256e50a65d4c06f025e07860d535ee73ffbd6eef209599d26b8e0be1e624f65c1b3
SHA512339142bbfaf48846ec1ba0ec7cc20caedd1b77d73c8e04adc01aea06ba351f5639504d121a06c23faab1a855e9ef07354c71593a94847e7596f027fea6c358b6
-
C:\Users\Admin\AppData\Local\Temp\MSIC896.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
C:\Users\Admin\AppData\Local\Temp\MSIC934.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
C:\Users\Admin\AppData\Local\Temp\MSIC9C1.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
C:\Users\Admin\AppData\Local\Temp\MSICA20.tmpMD5
c47a0f58475fb02a7dde24dbfecbb30a
SHA1947c50a5820e640b85b323ff3c7b967280388738
SHA25642cf8a3b2212460dee10e913eb579b2a7f24360d00ad41455d4759dd9e2393be
SHA512d576cc16777fcab3bc7e30830f27000b96b79a94bc5a6eefbee3b7585c621a6aa466b14d7038ccc18d76b5c30f2dd99d5220757c4a14b7ecb65cef5d2e0f52cf
-
C:\Users\Admin\AppData\Local\Temp\MSICA7F.tmpMD5
85cb050d57d631fbed862aef48c50d8b
SHA1fe15e935e871c640196d20db1d4681bb60d55add
SHA2568b190f2dd956572773f4c9927e3137227e46f5907651d00103bcea09e50c3bef
SHA512d09e3b09d7a66833693f12dfee844ba0db85132b8da3499dc0e0c7ab9c3d8221bf8cb5a97bc0190544670bdaf4e4e3917c0cefd75cbbca8ff0e0f11e5619f38e
-
C:\Users\Admin\AppData\Local\Temp\MSICB3B.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
C:\Users\Admin\AppData\Local\Temp\MSICD21.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
C:\Users\Admin\AppData\Local\Temp\msiC8C0.txtMD5
b026e6ffa279860878010f72b6e7c2be
SHA1c1625517b7ad6867dbf4d190bfa4381d94a0f658
SHA2565586c7abaee86e3fd8950e22c4de531b8096ade1b3710e249a04d8a4c1c507e1
SHA512a557c2f2450f9c3c09d0eebf7ac4818c30491f00bcdc7e4766a0670fdc6d5e58625fb92b6931a882cc1792623afc3c6dfbd3f0d2c8c7152d2046f2b590ac2210
-
C:\Users\Admin\AppData\Local\Temp\msiC8C0.txtMD5
dfa99ac36809a794d030465436bd41da
SHA17c2aa2237a3b874a2f60386bc15b0b73245db90e
SHA256bee2a0d6a22c7c5af101efebcaccaa73d64782127adaf1ed4c5f8cbd7890329c
SHA5124c0afd13df6110a938a2884ab5c35f5043f67d8f5809abc7c59e44a55cabf48bb821bfb0cc77aa6477d1b604a926f1b13233aadf1ae0666d56ad03a05c4690de
-
C:\Users\Admin\AppData\Local\Temp\pssC8C1.ps1MD5
1a812dac9ffe0b3084f63fe3af5ca161
SHA166f5c31e76cdbe8f134197643f292f96b25db88c
SHA256a81d18eb6979f92385096dfac368f99c533c94e671ca4a609d11a06143bbd7b6
SHA5120e0447b771d006c9697360c24dded3ae7f5b3833ee29d74076b89122f2bdfe66dfb0316f7f0f8223ce8b9868fe921d814d6f4c1ff5e60f83c2d55d7781827503
-
C:\Users\Admin\AppData\Local\Temp\pssC8C2.ps1MD5
6873b38cd0dc6f90fc6b9665b83e6360
SHA1d62020ca9d8adae33b01911795bb1df7288e55b2
SHA2562996ea936e7b3e0366468b7b50934d7f8ce1fa1cfee6e4e3179a885b5ae6a3a4
SHA512669f1365321689c61a6b4088b64b3d8be3b1719643d9fd9ad5db60efccd7259a382497ab7595f0c7445fd52773f5c1ff10b7fb54aeda9ba3e3bc7590c040c245
-
\Users\Admin\AppData\Local\Temp\MSIBBFF.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
\Users\Admin\AppData\Local\Temp\MSIBEFD.tmpMD5
c47a0f58475fb02a7dde24dbfecbb30a
SHA1947c50a5820e640b85b323ff3c7b967280388738
SHA25642cf8a3b2212460dee10e913eb579b2a7f24360d00ad41455d4759dd9e2393be
SHA512d576cc16777fcab3bc7e30830f27000b96b79a94bc5a6eefbee3b7585c621a6aa466b14d7038ccc18d76b5c30f2dd99d5220757c4a14b7ecb65cef5d2e0f52cf
-
\Users\Admin\AppData\Local\Temp\MSIC17F.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
\Users\Admin\AppData\Local\Temp\MSIC374.tmpMD5
e426b263923488b1b1eb0ad1dd6f0c66
SHA11a1f529243bf17c258d121fb123163d3629548f1
SHA25694e4e2b6c64d322acbf97e3a5f3dfd5567190624f1d9154f308b66d1aca91de4
SHA512c54ebfc0f30af1e5355381e85efcc4f5c4a9246ee2ed17f484f099226f3c7663e96601362f4f10ce31d027b7ddfe6d8227f85437575c7cd7179aeb158e2f72f7
-
\Users\Admin\AppData\Local\Temp\MSIC374.tmpMD5
e426b263923488b1b1eb0ad1dd6f0c66
SHA11a1f529243bf17c258d121fb123163d3629548f1
SHA25694e4e2b6c64d322acbf97e3a5f3dfd5567190624f1d9154f308b66d1aca91de4
SHA512c54ebfc0f30af1e5355381e85efcc4f5c4a9246ee2ed17f484f099226f3c7663e96601362f4f10ce31d027b7ddfe6d8227f85437575c7cd7179aeb158e2f72f7
-
\Users\Admin\AppData\Local\Temp\MSIC374.tmp-\GameCustomActions.dllMD5
ccd9b809f2872daa15629c9710838d72
SHA16816c884b2565fa06a22c2d2758b8d790f8251bb
SHA256ee53e4994bfa838de7934d3c64e3fb52783168f6db323e3cc202b14176335da3
SHA512bda1797ddcabc330468bf067c1c5cacb4c61ff92b4110ab3f8177d601c9b24ca217cf173170552b050772d69ee1109f41600404cc738b0a0cfc86d602207da9c
-
\Users\Admin\AppData\Local\Temp\MSIC374.tmp-\GameCustomActions.dllMD5
ccd9b809f2872daa15629c9710838d72
SHA16816c884b2565fa06a22c2d2758b8d790f8251bb
SHA256ee53e4994bfa838de7934d3c64e3fb52783168f6db323e3cc202b14176335da3
SHA512bda1797ddcabc330468bf067c1c5cacb4c61ff92b4110ab3f8177d601c9b24ca217cf173170552b050772d69ee1109f41600404cc738b0a0cfc86d602207da9c
-
\Users\Admin\AppData\Local\Temp\MSIC374.tmp-\Microsoft.Deployment.WindowsInstaller.dllMD5
4e04a4cb2cf220aecc23ea1884c74693
SHA1a828c986d737f89ee1d9b50e63c540d48096957f
SHA256cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a
SHA512c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4
-
\Users\Admin\AppData\Local\Temp\MSIC374.tmp-\Microsoft.Deployment.WindowsInstaller.dllMD5
4e04a4cb2cf220aecc23ea1884c74693
SHA1a828c986d737f89ee1d9b50e63c540d48096957f
SHA256cfed1841c76c9731035ebb61d5dc5656babf1beff6ed395e1c6b85bb9c74f85a
SHA512c0b850fbc24efad8207a3fcca11217cb52f1d08b14deb16b8e813903fecd90714eb1a4b91b329cf779afff3d90963380f7cfd1555ffc27bd4ac6598c709443c4
-
\Users\Admin\AppData\Local\Temp\MSIC895.tmpMD5
882e26bce2987a04b0e50ef204466cbe
SHA1a5b675e9030da9d63dcdfb9fe0ba622684da933e
SHA256e50a65d4c06f025e07860d535ee73ffbd6eef209599d26b8e0be1e624f65c1b3
SHA512339142bbfaf48846ec1ba0ec7cc20caedd1b77d73c8e04adc01aea06ba351f5639504d121a06c23faab1a855e9ef07354c71593a94847e7596f027fea6c358b6
-
\Users\Admin\AppData\Local\Temp\MSIC896.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
\Users\Admin\AppData\Local\Temp\MSIC934.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
\Users\Admin\AppData\Local\Temp\MSIC9C1.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
\Users\Admin\AppData\Local\Temp\MSICA20.tmpMD5
c47a0f58475fb02a7dde24dbfecbb30a
SHA1947c50a5820e640b85b323ff3c7b967280388738
SHA25642cf8a3b2212460dee10e913eb579b2a7f24360d00ad41455d4759dd9e2393be
SHA512d576cc16777fcab3bc7e30830f27000b96b79a94bc5a6eefbee3b7585c621a6aa466b14d7038ccc18d76b5c30f2dd99d5220757c4a14b7ecb65cef5d2e0f52cf
-
\Users\Admin\AppData\Local\Temp\MSICA7F.tmpMD5
85cb050d57d631fbed862aef48c50d8b
SHA1fe15e935e871c640196d20db1d4681bb60d55add
SHA2568b190f2dd956572773f4c9927e3137227e46f5907651d00103bcea09e50c3bef
SHA512d09e3b09d7a66833693f12dfee844ba0db85132b8da3499dc0e0c7ab9c3d8221bf8cb5a97bc0190544670bdaf4e4e3917c0cefd75cbbca8ff0e0f11e5619f38e
-
\Users\Admin\AppData\Local\Temp\MSICB3B.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
\Users\Admin\AppData\Local\Temp\MSICD21.tmpMD5
f0e3167159d38491b01a23bae32647ca
SHA16c385f0ceaaa591b40497ee522316a7987846ed1
SHA25615fb0bda4e4644d5769b90108c87a469cc75f74113d03240236f272396aa49fb
SHA512dce7ebec5f1a101805467536972f08505f7ebf0e01a276af1228ed6b2a0e424f17faf402fd3c0ae5e93cda95b8c78f1d5fe163dfe8d4ed2012da4491e1498b90
-
memory/1184-116-0x000002725C5F0000-0x000002725C5F2000-memory.dmpFilesize
8KB
-
memory/1184-115-0x000002725C5F0000-0x000002725C5F2000-memory.dmpFilesize
8KB
-
memory/1332-202-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/1332-165-0x00000000077B0000-0x00000000077B1000-memory.dmpFilesize
4KB
-
memory/1332-153-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/1332-154-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/1332-182-0x0000000009590000-0x0000000009591000-memory.dmpFilesize
4KB
-
memory/1332-201-0x0000000009C10000-0x0000000009C11000-memory.dmpFilesize
4KB
-
memory/1332-157-0x0000000007840000-0x0000000007841000-memory.dmpFilesize
4KB
-
memory/1332-200-0x000000000B0A0000-0x000000000B0A1000-memory.dmpFilesize
4KB
-
memory/1332-199-0x0000000009CC0000-0x0000000009CC1000-memory.dmpFilesize
4KB
-
memory/1332-161-0x0000000007200000-0x0000000007201000-memory.dmpFilesize
4KB
-
memory/1332-190-0x000000000AA20000-0x000000000AA21000-memory.dmpFilesize
4KB
-
memory/1332-163-0x0000000007202000-0x0000000007203000-memory.dmpFilesize
4KB
-
memory/1332-181-0x0000000009610000-0x0000000009611000-memory.dmpFilesize
4KB
-
memory/1332-152-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/1332-166-0x00000000080C0000-0x00000000080C1000-memory.dmpFilesize
4KB
-
memory/1332-167-0x0000000007EE0000-0x0000000007EE1000-memory.dmpFilesize
4KB
-
memory/1332-168-0x0000000008190000-0x0000000008191000-memory.dmpFilesize
4KB
-
memory/1332-184-0x0000000009EA0000-0x0000000009EA1000-memory.dmpFilesize
4KB
-
memory/1332-204-0x0000000007203000-0x0000000007204000-memory.dmpFilesize
4KB
-
memory/1332-183-0x00000000095E0000-0x00000000095E1000-memory.dmpFilesize
4KB
-
memory/1332-149-0x0000000000000000-mapping.dmp
-
memory/1332-170-0x0000000008070000-0x0000000008071000-memory.dmpFilesize
4KB
-
memory/1332-173-0x0000000008A40000-0x0000000008A41000-memory.dmpFilesize
4KB
-
memory/1332-174-0x0000000008840000-0x0000000008841000-memory.dmpFilesize
4KB
-
memory/1332-177-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/3112-119-0x0000000000BF0000-0x0000000000BF1000-memory.dmpFilesize
4KB
-
memory/3112-118-0x0000000000BF0000-0x0000000000BF1000-memory.dmpFilesize
4KB
-
memory/3112-117-0x0000000000000000-mapping.dmp
-
memory/4052-137-0x0000000006B63000-0x0000000006B64000-memory.dmpFilesize
4KB
-
memory/4052-128-0x0000000000000000-mapping.dmp
-
memory/4052-131-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/4052-130-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/4052-134-0x0000000001190000-0x0000000001191000-memory.dmpFilesize
4KB
-
memory/4052-136-0x0000000006B61000-0x0000000006B62000-memory.dmpFilesize
4KB
-
memory/4052-144-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/4052-138-0x0000000006B64000-0x0000000006B66000-memory.dmpFilesize
8KB
-
memory/4052-139-0x0000000006B66000-0x0000000006B67000-memory.dmpFilesize
4KB
-
memory/4052-135-0x0000000006B60000-0x0000000006B61000-memory.dmpFilesize
4KB
-
memory/4052-142-0x00000000011C0000-0x00000000011C1000-memory.dmpFilesize
4KB