Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    19-10-2021 14:05

General

  • Target

    Rambox-0.7.9-win.exe

  • Size

    112.3MB

  • MD5

    d3b36737818f47270c788fae167446d2

  • SHA1

    5a5e09c9365325ac640ada70e97d060d8984360c

  • SHA256

    2aa345f263242d17215171ee9355dbe4f73096f29a76c23adfd272f6fe659649

  • SHA512

    fe080ee14053a2e9cbb092b2bf9eace7e471ed357653ef776662d8d4f95da8cdc9cfa2ba872e5142ed47b4a49a48d4220cd6a126766f100789fe7e00e5f5eb48

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Sets service image path in registry 2 TTPs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\System32\Upfc.exe
    C:\Windows\System32\Upfc.exe /launchtype periodic /cv Yd2Gyko5vU6cPK8AfXz9Tg.0
    1⤵
      PID:4988
      • C:\Windows\System32\sihclient.exe
        C:\Windows\System32\sihclient.exe /cv Yd2Gyko5vU6cPK8AfXz9Tg.0.2
        2⤵
          PID:4616
      • C:\Users\Admin\AppData\Local\Temp\Rambox-0.7.9-win.exe
        "C:\Users\Admin\AppData\Local\Temp\Rambox-0.7.9-win.exe"
        1⤵
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3860
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -s W32Time
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3496
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
        1⤵
        • Modifies data under HKEY_USERS
        PID:4956
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
        1⤵
          PID:888
        • C:\Windows\System32\WaaSMedicAgent.exe
          C:\Windows\System32\WaaSMedicAgent.exe bf8c6a2c6dd37701056bf90c17a79ac7 Yd2Gyko5vU6cPK8AfXz9Tg.0.1.0.3.0
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:3376
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
          1⤵
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:880
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
          1⤵
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
            C:\Windows\uus\AMD64\MoUsoCoreWorker.exe
            2⤵
              PID:2436
          • C:\Program Files\Rambox\Rambox.exe
            "C:\Program Files\Rambox\Rambox.exe"
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Windows\system32\reg.exe
              C:\Windows\system32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Rambox /t REG_SZ /d "\"C:\Program Files\Rambox\Rambox.exe\"" /f
              2⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:3216
            • C:\Program Files\Rambox\Rambox.exe
              "C:\Program Files\Rambox\Rambox.exe" --type=gpu-process --field-trial-handle=1552,7918748924136235214,14603270463187756903,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,CrossOriginOpenerPolicy,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1560 /prefetch:2
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3780
            • C:\Program Files\Rambox\Rambox.exe
              "C:\Program Files\Rambox\Rambox.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1552,7918748924136235214,14603270463187756903,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,CrossOriginOpenerPolicy,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1984 /prefetch:8
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:4556
            • C:\Program Files\Rambox\Rambox.exe
              "C:\Program Files\Rambox\Rambox.exe" --type=renderer --field-trial-handle=1552,7918748924136235214,14603270463187756903,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,CrossOriginOpenerPolicy,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-user-model-id=com.grupovrs.ramboxce --app-path="C:\Program Files\Rambox\resources\app.asar" --enable-plugins --node-integration --webview-tag --no-sandbox --no-zygote --enable-remote-module --background-color=#FFF --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:1
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:4468
            • C:\Program Files\Rambox\Rambox.exe
              "C:\Program Files\Rambox\Rambox.exe" --type=renderer --field-trial-handle=1552,7918748924136235214,14603270463187756903,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,CrossOriginOpenerPolicy,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-compositing --lang=en-US --app-user-model-id=com.grupovrs.ramboxce --app-path="C:\Program Files\Rambox\resources\app.asar" --enable-plugins --no-sandbox --no-zygote --native-window-open --preload="C:\Program Files\Rambox\resources\app.asar\resources\js\rambox-service-api.js" --enable-remote-module --background-color=#fff --guest-instance-id=2 --enable-blink-features --disable-blink-features --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:1
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:1028
            • C:\Program Files\Rambox\Rambox.exe
              "C:\Program Files\Rambox\Rambox.exe" --type=renderer --field-trial-handle=1552,7918748924136235214,14603270463187756903,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,CrossOriginOpenerPolicy,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-compositing --lang=en-US --app-user-model-id=com.grupovrs.ramboxce --app-path="C:\Program Files\Rambox\resources\app.asar" --enable-plugins --no-sandbox --no-zygote --native-window-open --preload="C:\Program Files\Rambox\resources\app.asar\resources\js\rambox-service-api.js" --enable-remote-module --background-color=#fff --guest-instance-id=2 --enable-blink-features --disable-blink-features --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2700 /prefetch:1
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:1240
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:2088
            • C:\Windows\System32\WaaSMedicAgent.exe
              C:\Windows\System32\WaaSMedicAgent.exe bf8c6a2c6dd37701056bf90c17a79ac7 Yd2Gyko5vU6cPK8AfXz9Tg.0.1.0.3.0
              1⤵
              • Modifies data under HKEY_USERS
              PID:2912

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Rambox\D3DCompiler_47.dll
              MD5

              7641e39b7da4077084d2afe7c31032e0

              SHA1

              2256644f69435ff2fee76deb04d918083960d1eb

              SHA256

              44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47

              SHA512

              8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

            • C:\Program Files\Rambox\Rambox.exe
              MD5

              3c7933385b18471bb8916ad64d302af5

              SHA1

              ee3d04c6e3cc415fe66349baf970ed5d574f4665

              SHA256

              243018da9f22e10e4779a3e97133d33af83328d18d95e816c9ae4463247d0e14

              SHA512

              279a7271f60beb1fe3a893bbb133850ec5c3445ae18d9c5ab16e0e9cafffa1a3b42bd126f055287836ed542a86b764d428417e437ac2b28c4186bf6f64cbad63

            • C:\Program Files\Rambox\Rambox.exe
              MD5

              3c7933385b18471bb8916ad64d302af5

              SHA1

              ee3d04c6e3cc415fe66349baf970ed5d574f4665

              SHA256

              243018da9f22e10e4779a3e97133d33af83328d18d95e816c9ae4463247d0e14

              SHA512

              279a7271f60beb1fe3a893bbb133850ec5c3445ae18d9c5ab16e0e9cafffa1a3b42bd126f055287836ed542a86b764d428417e437ac2b28c4186bf6f64cbad63

            • C:\Program Files\Rambox\Rambox.exe
              MD5

              3c7933385b18471bb8916ad64d302af5

              SHA1

              ee3d04c6e3cc415fe66349baf970ed5d574f4665

              SHA256

              243018da9f22e10e4779a3e97133d33af83328d18d95e816c9ae4463247d0e14

              SHA512

              279a7271f60beb1fe3a893bbb133850ec5c3445ae18d9c5ab16e0e9cafffa1a3b42bd126f055287836ed542a86b764d428417e437ac2b28c4186bf6f64cbad63

            • C:\Program Files\Rambox\Rambox.exe
              MD5

              3c7933385b18471bb8916ad64d302af5

              SHA1

              ee3d04c6e3cc415fe66349baf970ed5d574f4665

              SHA256

              243018da9f22e10e4779a3e97133d33af83328d18d95e816c9ae4463247d0e14

              SHA512

              279a7271f60beb1fe3a893bbb133850ec5c3445ae18d9c5ab16e0e9cafffa1a3b42bd126f055287836ed542a86b764d428417e437ac2b28c4186bf6f64cbad63

            • C:\Program Files\Rambox\Rambox.exe
              MD5

              3c7933385b18471bb8916ad64d302af5

              SHA1

              ee3d04c6e3cc415fe66349baf970ed5d574f4665

              SHA256

              243018da9f22e10e4779a3e97133d33af83328d18d95e816c9ae4463247d0e14

              SHA512

              279a7271f60beb1fe3a893bbb133850ec5c3445ae18d9c5ab16e0e9cafffa1a3b42bd126f055287836ed542a86b764d428417e437ac2b28c4186bf6f64cbad63

            • C:\Program Files\Rambox\Rambox.exe
              MD5

              0068883fde532753db3a7da897ab0dc2

              SHA1

              97f3e26b22d1d15ce11c040689929341631b6ec8

              SHA256

              886debcc51361883c55121ad574e389bf4a11578f0572f4145f784d94a178a71

              SHA512

              4c300760ad133282623a4d97255bb87a686ffa07a25551a9a757ec5b3ca2ac7f396f7f5c3c0505a21f07457eda9ac80b6ab5a3fe236ebac96e9b548da7d5a766

            • C:\Program Files\Rambox\Rambox.exe
              MD5

              a1978b0c942a4125433f02d70de2eab0

              SHA1

              0dc38cbc6cafc6fa99a450039bc029f1c207949e

              SHA256

              11dcbfd1ef777521ef6714c2b091b1c97ca194cf8d6023f7cd2d9303941156d5

              SHA512

              d5962415be7017a9701148178f4ce175f4f1e702ede462ae619f22d3d0e49d0cf4b3f703299a7571388cf4a0553f97973949b7f6847fbe15fa4fdd85521888df

            • C:\Program Files\Rambox\chrome_100_percent.pak
              MD5

              06baf0ad34e0231bd76651203dba8326

              SHA1

              a5f99ecdcc06dec9d7f9ce0a8c66e46969117391

              SHA256

              5ae14147992a92548bcad76867dd88cdfcdb69d951c8720920cce6fb135e3189

              SHA512

              aff6616e56781ebb925a0ca146245ad3b2827250b32261c0c7c0d5b10b20a343a17fc3761c95d93104163e77b2eae3f1f9cbd3cb2b377f49b42bea39bdd09b91

            • C:\Program Files\Rambox\chrome_200_percent.pak
              MD5

              57c27201e7cd33471da7ec205fe9973c

              SHA1

              a8e7bce09c4cbdae2797611b2be8aeb5491036f9

              SHA256

              dd8146b2ee289e4d54a4a0f1fd3b2f61b979c6a2baaba96a406d96c3f4fdb33b

              SHA512

              57258aa169bec66abf0f45a3e026bb68751fb970b74bd0cb465607fa3b2a89967e832d92d8f675f0449bb6662fcb7786d05f0597124cc8e18bb99a47245779b4

            • C:\Program Files\Rambox\d3dcompiler_47.dll
              MD5

              7641e39b7da4077084d2afe7c31032e0

              SHA1

              2256644f69435ff2fee76deb04d918083960d1eb

              SHA256

              44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47

              SHA512

              8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

            • C:\Program Files\Rambox\ffmpeg.dll
              MD5

              4f3f7ba723c5e8b617407c7a57e568ba

              SHA1

              7aa11a45e1c1826ee58dabd2773256a6df5da262

              SHA256

              b08d2a9076f65a83420cabcb42bb0ed8364683c77f8ff608e16acd0f8615b0c6

              SHA512

              2a0b61d6223a6e7e105558ac52e128ed7bf0050f6ddd1fd80de6ce0ac89157b0c9d6de696349a8c95b7b3afe54fa555d34993a5b17eb68db51cdbb0443e84241

            • C:\Program Files\Rambox\ffmpeg.dll
              MD5

              4f3f7ba723c5e8b617407c7a57e568ba

              SHA1

              7aa11a45e1c1826ee58dabd2773256a6df5da262

              SHA256

              b08d2a9076f65a83420cabcb42bb0ed8364683c77f8ff608e16acd0f8615b0c6

              SHA512

              2a0b61d6223a6e7e105558ac52e128ed7bf0050f6ddd1fd80de6ce0ac89157b0c9d6de696349a8c95b7b3afe54fa555d34993a5b17eb68db51cdbb0443e84241

            • C:\Program Files\Rambox\ffmpeg.dll
              MD5

              4f3f7ba723c5e8b617407c7a57e568ba

              SHA1

              7aa11a45e1c1826ee58dabd2773256a6df5da262

              SHA256

              b08d2a9076f65a83420cabcb42bb0ed8364683c77f8ff608e16acd0f8615b0c6

              SHA512

              2a0b61d6223a6e7e105558ac52e128ed7bf0050f6ddd1fd80de6ce0ac89157b0c9d6de696349a8c95b7b3afe54fa555d34993a5b17eb68db51cdbb0443e84241

            • C:\Program Files\Rambox\ffmpeg.dll
              MD5

              4f3f7ba723c5e8b617407c7a57e568ba

              SHA1

              7aa11a45e1c1826ee58dabd2773256a6df5da262

              SHA256

              b08d2a9076f65a83420cabcb42bb0ed8364683c77f8ff608e16acd0f8615b0c6

              SHA512

              2a0b61d6223a6e7e105558ac52e128ed7bf0050f6ddd1fd80de6ce0ac89157b0c9d6de696349a8c95b7b3afe54fa555d34993a5b17eb68db51cdbb0443e84241

            • C:\Program Files\Rambox\ffmpeg.dll
              MD5

              4f3f7ba723c5e8b617407c7a57e568ba

              SHA1

              7aa11a45e1c1826ee58dabd2773256a6df5da262

              SHA256

              b08d2a9076f65a83420cabcb42bb0ed8364683c77f8ff608e16acd0f8615b0c6

              SHA512

              2a0b61d6223a6e7e105558ac52e128ed7bf0050f6ddd1fd80de6ce0ac89157b0c9d6de696349a8c95b7b3afe54fa555d34993a5b17eb68db51cdbb0443e84241

            • C:\Program Files\Rambox\ffmpeg.dll
              MD5

              4f3f7ba723c5e8b617407c7a57e568ba

              SHA1

              7aa11a45e1c1826ee58dabd2773256a6df5da262

              SHA256

              b08d2a9076f65a83420cabcb42bb0ed8364683c77f8ff608e16acd0f8615b0c6

              SHA512

              2a0b61d6223a6e7e105558ac52e128ed7bf0050f6ddd1fd80de6ce0ac89157b0c9d6de696349a8c95b7b3afe54fa555d34993a5b17eb68db51cdbb0443e84241

            • C:\Program Files\Rambox\ffmpeg.dll
              MD5

              4f3f7ba723c5e8b617407c7a57e568ba

              SHA1

              7aa11a45e1c1826ee58dabd2773256a6df5da262

              SHA256

              b08d2a9076f65a83420cabcb42bb0ed8364683c77f8ff608e16acd0f8615b0c6

              SHA512

              2a0b61d6223a6e7e105558ac52e128ed7bf0050f6ddd1fd80de6ce0ac89157b0c9d6de696349a8c95b7b3afe54fa555d34993a5b17eb68db51cdbb0443e84241

            • C:\Program Files\Rambox\icudtl.dat
              MD5

              ad2988770b8cb3281a28783ad833a201

              SHA1

              94b7586ee187d9b58405485f4c551b55615f11b5

              SHA256

              df876c7af43ed93eec6aea4d2d55c805009c219653cdeb368f1d048f4922b108

              SHA512

              f27e542a9c6c60fa28c5b7cc2818079341ef93aef3bbcadecad2dc11aff5b1592b19c7ebfa543ea42a3cbfec26a668641b255545fb0912056e25e852c2dedd01

            • C:\Program Files\Rambox\locales\en-US.pak
              MD5

              bd8f7b719110342b7cefb16ddd05ec55

              SHA1

              82a79aeaa1dd4b1464b67053ba1766a4498c13e7

              SHA256

              d1d3f892be16329c79f9a8ee8c5fa1c9fb46d17edfeb56a3d9407f9d7587a0de

              SHA512

              7cd1493e59e87c70927e66769eb200f79a57e1eb1223af4eb4064088571893d3e32cbc4b5ece568fd308992aad65684aa280dc9834f2b5d327bdee514b046e5e

            • C:\Program Files\Rambox\resources.pak
              MD5

              d13873f6fb051266deb3599b14535806

              SHA1

              143782c0ce5a5773ae0aae7a22377c8a6d18a5b2

              SHA256

              7b953443e3cd54a0a4775528b52fbfe5ebecbc2c71731600ed0999d227969506

              SHA512

              1ab38fcb70d1958c74da2493459532b52a04b884009509a1ac8dd39f6e9e670658a52f4d19ef57f1bc71dccfdd6ceedbc18034bbcad0b500d75a97c74aac6939

            • C:\Program Files\Rambox\resources\app.asar
              MD5

              d517d3cca304a39bf86197d94ef35954

              SHA1

              c371c5800707fd39f9964b3b1eb4af0b4f28c2d2

              SHA256

              a70b371b38206d1d19feffd674b23dc202aed98b5d05fae6a8f400606b1f8359

              SHA512

              0d49a83aeac93d3541a53abcc1d0e81b712d745a5f65057e2645230b8a2e7e18ef01c482f55efe7f7f34a9a029d15d318e181bfc428c3cbbc1c000080041a641

            • C:\Program Files\Rambox\swiftshader\libEGL.dll
              MD5

              0bca9efb4be44d8987760e3b1ff76032

              SHA1

              7b99640f857e4c0108a593fa05a4b03d35dd5dc6

              SHA256

              6d6b066929f7621800a61b53d4cafc6f7962b88b601bb9e8859416efaf3b0a1f

              SHA512

              2b1dc34e88ed0e91cc229bf2da383ebe18aae2e89f69a56ed494b836d6752e415f14ac27e49aa40784dafaa481065a8a35202645a15f5cbefc31725082417d10

            • C:\Program Files\Rambox\swiftshader\libGLESv2.dll
              MD5

              dbd413214ce785796914d79dbe0b3ee7

              SHA1

              3a2d86aa4562a05d601aed131e797c003365c03f

              SHA256

              bec01a8fe41898656204d5397de04089d0cee5a3fb9f0bcbc1753af8a6a526a8

              SHA512

              acf5d65616d280e133f9ec8d84dcc07f012e5305e6b8b368a3db113b7aeb113bdfbaf1cd8813c368699d5964a6983fba3e96a12c05d92c90f1df43a68c93fe4e

            • C:\Program Files\Rambox\swiftshader\libegl.dll
              MD5

              0bca9efb4be44d8987760e3b1ff76032

              SHA1

              7b99640f857e4c0108a593fa05a4b03d35dd5dc6

              SHA256

              6d6b066929f7621800a61b53d4cafc6f7962b88b601bb9e8859416efaf3b0a1f

              SHA512

              2b1dc34e88ed0e91cc229bf2da383ebe18aae2e89f69a56ed494b836d6752e415f14ac27e49aa40784dafaa481065a8a35202645a15f5cbefc31725082417d10

            • C:\Program Files\Rambox\swiftshader\libglesv2.dll
              MD5

              dbd413214ce785796914d79dbe0b3ee7

              SHA1

              3a2d86aa4562a05d601aed131e797c003365c03f

              SHA256

              bec01a8fe41898656204d5397de04089d0cee5a3fb9f0bcbc1753af8a6a526a8

              SHA512

              acf5d65616d280e133f9ec8d84dcc07f012e5305e6b8b368a3db113b7aeb113bdfbaf1cd8813c368699d5964a6983fba3e96a12c05d92c90f1df43a68c93fe4e

            • C:\Program Files\Rambox\v8_context_snapshot.bin
              MD5

              c2208c06c8ff81bca3c092cc42b8df1b

              SHA1

              f7b9faa9ba0e72d062f68642a02cc8f3fed49910

              SHA256

              4a67de195878d290f49b503b83e415917b8bbcbd9936b07a5d33b48e9bc6e0a3

              SHA512

              6c3c370dd086a976c44d4059a315bd3bcbb50961aa34734e65a40d861cffca9090d47cec74575afe23952e394e4845bda2d8798eebe01fb54a7a6288bce238f5

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\StdUtils.dll
              MD5

              c6a6e03f77c313b267498515488c5740

              SHA1

              3d49fc2784b9450962ed6b82b46e9c3c957d7c15

              SHA256

              b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

              SHA512

              9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\System.dll
              MD5

              0d7ad4f45dc6f5aa87f606d0331c6901

              SHA1

              48df0911f0484cbe2a8cdd5362140b63c41ee457

              SHA256

              3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

              SHA512

              c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\UAC.dll
              MD5

              adb29e6b186daa765dc750128649b63d

              SHA1

              160cbdc4cb0ac2c142d361df138c537aa7e708c9

              SHA256

              2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

              SHA512

              b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\WinShell.dll
              MD5

              1cc7c37b7e0c8cd8bf04b6cc283e1e56

              SHA1

              0b9519763be6625bd5abce175dcc59c96d100d4c

              SHA256

              9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

              SHA512

              7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\WinShell.dll
              MD5

              1cc7c37b7e0c8cd8bf04b6cc283e1e56

              SHA1

              0b9519763be6625bd5abce175dcc59c96d100d4c

              SHA256

              9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

              SHA512

              7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\WinShell.dll
              MD5

              1cc7c37b7e0c8cd8bf04b6cc283e1e56

              SHA1

              0b9519763be6625bd5abce175dcc59c96d100d4c

              SHA256

              9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

              SHA512

              7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\WinShell.dll
              MD5

              1cc7c37b7e0c8cd8bf04b6cc283e1e56

              SHA1

              0b9519763be6625bd5abce175dcc59c96d100d4c

              SHA256

              9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

              SHA512

              7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\nsDialogs.dll
              MD5

              466179e1c8ee8a1ff5e4427dbb6c4a01

              SHA1

              eb607467009074278e4bd50c7eab400e95ae48f7

              SHA256

              1e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172

              SHA512

              7508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\nsProcess.dll
              MD5

              f0438a894f3a7e01a4aae8d1b5dd0289

              SHA1

              b058e3fcfb7b550041da16bf10d8837024c38bf6

              SHA256

              30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

              SHA512

              f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\nsProcess.dll
              MD5

              f0438a894f3a7e01a4aae8d1b5dd0289

              SHA1

              b058e3fcfb7b550041da16bf10d8837024c38bf6

              SHA256

              30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

              SHA512

              f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

            • C:\Users\Admin\AppData\Local\Temp\nssDC13.tmp\nsis7z.dll
              MD5

              80e44ce4895304c6a3a831310fbf8cd0

              SHA1

              36bd49ae21c460be5753a904b4501f1abca53508

              SHA256

              b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

              SHA512

              c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

            • memory/880-155-0x000001E5C7F70000-0x000001E5C7F74000-memory.dmp
              Filesize

              16KB

            • memory/1028-217-0x000001F690600000-0x000001F690602000-memory.dmp
              Filesize

              8KB

            • memory/1028-210-0x000001F690600000-0x000001F690602000-memory.dmp
              Filesize

              8KB

            • memory/1028-211-0x000001F690600000-0x000001F690602000-memory.dmp
              Filesize

              8KB

            • memory/1028-207-0x0000000000000000-mapping.dmp
            • memory/1028-218-0x000001F690600000-0x000001F690602000-memory.dmp
              Filesize

              8KB

            • memory/1240-213-0x000001B1E9D90000-0x000001B1E9D92000-memory.dmp
              Filesize

              8KB

            • memory/1240-209-0x0000000000000000-mapping.dmp
            • memory/1240-221-0x000001B1E9D90000-0x000001B1E9D92000-memory.dmp
              Filesize

              8KB

            • memory/1240-215-0x000001B1E9D90000-0x000001B1E9D92000-memory.dmp
              Filesize

              8KB

            • memory/1240-222-0x000001B1E9D90000-0x000001B1E9D92000-memory.dmp
              Filesize

              8KB

            • memory/1240-219-0x000001B1E9D90000-0x000001B1E9D92000-memory.dmp
              Filesize

              8KB

            • memory/1240-223-0x000001B1E9D90000-0x000001B1E9D92000-memory.dmp
              Filesize

              8KB

            • memory/1240-220-0x000001B1E9D90000-0x000001B1E9D92000-memory.dmp
              Filesize

              8KB

            • memory/2436-156-0x0000000000000000-mapping.dmp
            • memory/3056-172-0x0000018E804A0000-0x0000018E804A2000-memory.dmp
              Filesize

              8KB

            • memory/3056-166-0x0000018E804A0000-0x0000018E804A2000-memory.dmp
              Filesize

              8KB

            • memory/3056-167-0x0000018E804A0000-0x0000018E804A2000-memory.dmp
              Filesize

              8KB

            • memory/3216-174-0x0000000000000000-mapping.dmp
            • memory/3780-193-0x0000028115A70000-0x0000028115A72000-memory.dmp
              Filesize

              8KB

            • memory/3780-198-0x0000028115A70000-0x0000028115A72000-memory.dmp
              Filesize

              8KB

            • memory/3780-180-0x0000000000000000-mapping.dmp
            • memory/3780-184-0x0000028115A70000-0x0000028115A72000-memory.dmp
              Filesize

              8KB

            • memory/3780-187-0x0000028115A70000-0x0000028115A72000-memory.dmp
              Filesize

              8KB

            • memory/3780-179-0x00000281159C9000-0x00000281159CA000-memory.dmp
              Filesize

              4KB

            • memory/3780-182-0x00007FF887000000-0x00007FF887001000-memory.dmp
              Filesize

              4KB

            • memory/4468-195-0x0000022AFC6E0000-0x0000022AFC6E2000-memory.dmp
              Filesize

              8KB

            • memory/4468-200-0x0000022AFC6E0000-0x0000022AFC6E2000-memory.dmp
              Filesize

              8KB

            • memory/4468-196-0x0000022AFC6E0000-0x0000022AFC6E2000-memory.dmp
              Filesize

              8KB

            • memory/4468-191-0x0000000000000000-mapping.dmp
            • memory/4468-205-0x0000022AFC6E0000-0x0000022AFC6E2000-memory.dmp
              Filesize

              8KB

            • memory/4556-188-0x000001C701BC0000-0x000001C701BC2000-memory.dmp
              Filesize

              8KB

            • memory/4556-183-0x0000000000000000-mapping.dmp
            • memory/4556-186-0x000001C701BC0000-0x000001C701BC2000-memory.dmp
              Filesize

              8KB

            • memory/4616-164-0x0000000000000000-mapping.dmp
            • memory/4956-147-0x000002A778AA0000-0x000002A778AB0000-memory.dmp
              Filesize

              64KB

            • memory/4956-148-0x000002A77AEB0000-0x000002A77AEB4000-memory.dmp
              Filesize

              16KB

            • memory/4956-146-0x000002A778860000-0x000002A778870000-memory.dmp
              Filesize

              64KB

            • memory/4956-224-0x000002A77B180000-0x000002A77B184000-memory.dmp
              Filesize

              16KB

            • memory/4956-225-0x000002A77B140000-0x000002A77B141000-memory.dmp
              Filesize

              4KB

            • memory/4956-226-0x000002A77AEE0000-0x000002A77AEE4000-memory.dmp
              Filesize

              16KB

            • memory/4956-227-0x000002A77AED0000-0x000002A77AED1000-memory.dmp
              Filesize

              4KB

            • memory/4956-228-0x000002A77AED0000-0x000002A77AED4000-memory.dmp
              Filesize

              16KB

            • memory/4956-229-0x000002A778BB0000-0x000002A778BB1000-memory.dmp
              Filesize

              4KB