Analysis
-
max time kernel
2302s -
max time network
2720s -
platform
windows10_x64 -
resource
win10-ja-20211014 -
submitted
20-10-2021 15:46
Static task
static1
Behavioral task
behavioral1
Sample
OpenSea-App_v2.1-setup.exe
Resource
win7-ja-20211014
Behavioral task
behavioral2
Sample
OpenSea-App_v2.1-setup.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
OpenSea-App_v2.1-setup.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
OpenSea-App_v2.1-setup.exe
Resource
win11
Behavioral task
behavioral5
Sample
OpenSea-App_v2.1-setup.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
OpenSea-App_v2.1-setup.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
OpenSea-App_v2.1-setup.exe
Resource
win10-de-20210920
General
-
Target
OpenSea-App_v2.1-setup.exe
-
Size
116.4MB
-
MD5
b188206887e0f25a50c50e1955413442
-
SHA1
3f4fcd1debd12586f712d694218339a7fd40c50b
-
SHA256
de644e637da7cd117517b1bb96ee0f58131515013a322366d680f613afa31bc4
-
SHA512
94391442364c2e6a16a2fd0bd2384d0f21a56cd5a67faa7998511ebb55feb3e5a7915c603c2caaa8da79f8bdfc1490eb2a8f559546193977b239a2d133bf3624
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
OpenSea-App_v2.1-setup.tmpOpenSea-App_v2.1-setup.tmpuniconverter.exepid process 4768 OpenSea-App_v2.1-setup.tmp 4976 OpenSea-App_v2.1-setup.tmp 828 uniconverter.exe -
Drops startup file 1 IoCs
Processes:
uniconverter.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xltconfigurator.lnk uniconverter.exe -
Loads dropped DLL 5 IoCs
Processes:
uniconverter.exehelper.exepid process 828 uniconverter.exe 828 uniconverter.exe 3968 helper.exe 3968 helper.exe 3968 helper.exe -
Processes:
OpenSea-App_v2.1-setup.tmpdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OpenSea-App_v2.1-setup.tmp -
Drops file in System32 directory 8 IoCs
Processes:
OfficeC2RClient.exeOfficeC2RClient.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-shm OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-wal OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-shm OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db OfficeC2RClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.db-wal OfficeC2RClient.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
uniconverter.exepid process 828 uniconverter.exe 828 uniconverter.exe 828 uniconverter.exe 828 uniconverter.exe 828 uniconverter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SystemSettings.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 SystemSettings.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5000 timeout.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
OfficeC2RClient.exeOfficeC2RClient.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,39965824,7153487,17110988,17962391,17962392,3702920,3462423,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,17110988,7153487,39965824,17962391,17962392,3702920,3462423,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,941 10,1329 15,941 15,941 6,1329 100,1329 6" OfficeC2RClient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,941 10,1329 15,941 15,1329 100,941 6,1329 6" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry\Volatile OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe\ULSMonitor OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry OfficeC2RClient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officec2rclient.exe OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeC2RClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeC2RClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeC2RClient.exe -
Modifies registry class 46 IoCs
Processes:
FileSyncConfig.exefirefox.exeSystemSettings.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32 FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\Attributes = "4034920525" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\TargetKnownFolder = "{a52bba46-e9e1-435f-b3d9-28daa648c0f6}" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\FolderValueFlags = "40" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DEFAULTICON FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INSTANCE\INITPROPERTYBAG FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\CLSID = "{0E5AAE11-A475-4c5b-AB00-C66DE400274E}" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32 FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SHELLFOLDER FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SHELLFOLDER FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\Attributes = "17" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe,0" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings firefox.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DEFAULTICON FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ = "OneDrive" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32\ = "%systemroot%\\system32\\shell32.dll" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings SystemSettings.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INSTANCE\INITPROPERTYBAG FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SortOrderIndex = "66" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\CLSID = "{0E5AAE11-A475-4c5b-AB00-C66DE400274E}" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\TargetKnownFolder = "{a52bba46-e9e1-435f-b3d9-28daa648c0f6}" FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\WOW6432NODE\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INPROCSERVER32 FileSyncConfig.exe Key deleted \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_CLASSES\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\INPROCSERVER32 FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ = "OneDrive" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\System.IsPinnedToNameSpaceTree = "1" FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe,0" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag\Attributes = "17" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6} FileSyncConfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\InProcServer32\ = "%systemroot%\\SysWow64\\shell32.dll" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\FolderValueFlags = "40" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\System.IsPinnedToNameSpaceTree = "1" FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\SortOrderIndex = "66" FileSyncConfig.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\InitPropertyBag FileSyncConfig.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder\Attributes = "4034920525" FileSyncConfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
OpenSea-App_v2.1-setup.tmppid process 4976 OpenSea-App_v2.1-setup.tmp 4976 OpenSea-App_v2.1-setup.tmp -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
uniconverter.exehelper.exedescription pid process Token: SeShutdownPrivilege 828 uniconverter.exe Token: SeDebugPrivilege 3968 helper.exe Token: SeDebugPrivilege 3968 helper.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
OpenSea-App_v2.1-setup.tmpfirefox.exepid process 4976 OpenSea-App_v2.1-setup.tmp 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
uniconverter.exeOfficeC2RClient.exefirefox.exeOfficeC2RClient.exepid process 828 uniconverter.exe 828 uniconverter.exe 1772 OfficeC2RClient.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 5100 firefox.exe 1248 OfficeC2RClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
OpenSea-App_v2.1-setup.exeOpenSea-App_v2.1-setup.tmpOpenSea-App_v2.1-setup.exeOpenSea-App_v2.1-setup.tmpuniconverter.execmd.exefirefox.exefirefox.exedescription pid process target process PID 4452 wrote to memory of 4768 4452 OpenSea-App_v2.1-setup.exe OpenSea-App_v2.1-setup.tmp PID 4452 wrote to memory of 4768 4452 OpenSea-App_v2.1-setup.exe OpenSea-App_v2.1-setup.tmp PID 4452 wrote to memory of 4768 4452 OpenSea-App_v2.1-setup.exe OpenSea-App_v2.1-setup.tmp PID 4768 wrote to memory of 4876 4768 OpenSea-App_v2.1-setup.tmp OpenSea-App_v2.1-setup.exe PID 4768 wrote to memory of 4876 4768 OpenSea-App_v2.1-setup.tmp OpenSea-App_v2.1-setup.exe PID 4768 wrote to memory of 4876 4768 OpenSea-App_v2.1-setup.tmp OpenSea-App_v2.1-setup.exe PID 4876 wrote to memory of 4976 4876 OpenSea-App_v2.1-setup.exe OpenSea-App_v2.1-setup.tmp PID 4876 wrote to memory of 4976 4876 OpenSea-App_v2.1-setup.exe OpenSea-App_v2.1-setup.tmp PID 4876 wrote to memory of 4976 4876 OpenSea-App_v2.1-setup.exe OpenSea-App_v2.1-setup.tmp PID 4976 wrote to memory of 828 4976 OpenSea-App_v2.1-setup.tmp uniconverter.exe PID 4976 wrote to memory of 828 4976 OpenSea-App_v2.1-setup.tmp uniconverter.exe PID 4976 wrote to memory of 828 4976 OpenSea-App_v2.1-setup.tmp uniconverter.exe PID 828 wrote to memory of 4972 828 uniconverter.exe cmd.exe PID 828 wrote to memory of 4972 828 uniconverter.exe cmd.exe PID 4972 wrote to memory of 5000 4972 cmd.exe timeout.exe PID 4972 wrote to memory of 5000 4972 cmd.exe timeout.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 4040 wrote to memory of 5100 4040 firefox.exe firefox.exe PID 5100 wrote to memory of 3036 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 3036 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe PID 5100 wrote to memory of 4324 5100 firefox.exe firefox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OpenSea-App_v2.1-setup.exe"C:\Users\Admin\AppData\Local\Temp\OpenSea-App_v2.1-setup.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-H941B.tmp\OpenSea-App_v2.1-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-H941B.tmp\OpenSea-App_v2.1-setup.tmp" /SL5="$201BE,121164526,934400,C:\Users\Admin\AppData\Local\Temp\OpenSea-App_v2.1-setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\OpenSea-App_v2.1-setup.exe"C:\Users\Admin\AppData\Local\Temp\OpenSea-App_v2.1-setup.exe" /VERYSILENT /NORESTART3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-HVUSO.tmp\OpenSea-App_v2.1-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-HVUSO.tmp\OpenSea-App_v2.1-setup.tmp" /SL5="$A0058,121164526,934400,C:\Users\Admin\AppData\Local\Temp\OpenSea-App_v2.1-setup.exe" /VERYSILENT /NORESTART4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Network UniConverter Management 13\uniconverter.exe"C:\Users\Admin\AppData\Roaming\Network UniConverter Management 13\uniconverter.exe"5⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5Q2zfz07.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak7⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.180.0905.0007\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.180.0905.0007\FileSyncConfig.exe"1⤵
- Modifies registry class
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /frequentupdate SCHEDULEDTASK displaylevel=False1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5100.0.1456314301\1515616280" -parentBuildID 20200403170909 -prefsHandle 1532 -prefMapHandle 1512 -prefsLen 1 -prefMapSize 219631 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5100 "\\.\pipe\gecko-crash-server-pipe.5100" 1612 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5100.3.1600024868\1322643326" -childID 1 -isForBrowser -prefsHandle 2376 -prefMapHandle 2372 -prefsLen 122 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5100 "\\.\pipe\gecko-crash-server-pipe.5100" 2232 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5100.13.1877312079\2104409712" -childID 2 -isForBrowser -prefsHandle 3376 -prefMapHandle 3372 -prefsLen 6979 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5100 "\\.\pipe\gecko-crash-server-pipe.5100" 3392 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5100.20.194318521\1933619341" -childID 3 -isForBrowser -prefsHandle 4644 -prefMapHandle 4820 -prefsLen 7684 -prefMapSize 219631 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 5100 "\\.\pipe\gecko-crash-server-pipe.5100" 4216 tab3⤵
-
C:\Program Files\Mozilla Firefox\uninstall\helper.exe"C:\Program Files\Mozilla Firefox\uninstall\helper.exe" /SetAsDefaultAppUser3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
- Checks SCSI registry key(s)
- Modifies registry class
-
C:\Windows\System32\IME\SHARED\imebroker.exeC:\Windows\System32\IME\SHARED\imebroker.exe -Embedding1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /frequentupdate SCHEDULEDTASK displaylevel=False1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5Q2zfz07.batMD5
9c6bd7712c4446c29a65c92b3b57bec2
SHA10f89c24c21de2a218329de75725351337809b39e
SHA25693b71a61024ebee283f4e119e31b10cde7fab59aabda55e535d55e28c38dc698
SHA512d2920602df75424122883aecf815b4e12e0bb9e6879c36d0dc89b02e04d396aa3612224d93537e757a6d6f2781cd3ecc312f5abe9fdc17f74757d436c7e1cc07
-
C:\Users\Admin\AppData\Local\Temp\is-H941B.tmp\OpenSea-App_v2.1-setup.tmpMD5
1d58a53221a0e00ae086d5727f5e97a8
SHA1425d12467917bb82dd3f67f43e0c7178b0993aa3
SHA2563865953f354379ea7e66e28ae265915deffcda296048430027e0e6931ffa657d
SHA5128afd7f6f114125d32a3724f0a0a51b9b7a7eae12f8844b59d74a61bde886055c7db5f043ed33263521adb0847f8523f1b2b183fd848b098c57d7ad328fe818e8
-
C:\Users\Admin\AppData\Local\Temp\is-HVUSO.tmp\OpenSea-App_v2.1-setup.tmpMD5
1d58a53221a0e00ae086d5727f5e97a8
SHA1425d12467917bb82dd3f67f43e0c7178b0993aa3
SHA2563865953f354379ea7e66e28ae265915deffcda296048430027e0e6931ffa657d
SHA5128afd7f6f114125d32a3724f0a0a51b9b7a7eae12f8844b59d74a61bde886055c7db5f043ed33263521adb0847f8523f1b2b183fd848b098c57d7ad328fe818e8
-
C:\Users\Admin\AppData\Local\Temp\is-HVUSO.tmp\OpenSea-App_v2.1-setup.tmpMD5
1d58a53221a0e00ae086d5727f5e97a8
SHA1425d12467917bb82dd3f67f43e0c7178b0993aa3
SHA2563865953f354379ea7e66e28ae265915deffcda296048430027e0e6931ffa657d
SHA5128afd7f6f114125d32a3724f0a0a51b9b7a7eae12f8844b59d74a61bde886055c7db5f043ed33263521adb0847f8523f1b2b183fd848b098c57d7ad328fe818e8
-
C:\Users\Admin\AppData\Roaming\Network UniConverter Management 13\JdbcOdbc.dllMD5
791791c0e466eb0a6af462a265074c9d
SHA1db4e66209bd211ddc0378c0f62e644eb466cde0e
SHA256187d0a87805102aaacfdb0e18ea84a90af1540529e92430f84e3f46736383fc7
SHA512badbe604c1e99b848dbb184a1d081560a31749a89573a4c6202abec1c6aa670ca248a0e5cd9330a7c3fc90193f3f95cde6a9d44c881568ca1a9b3b063da68566
-
C:\Users\Admin\AppData\Roaming\Network UniConverter Management 13\libtfs2.0.dllMD5
f551e738c23336e2f614b6e21f1627cf
SHA11c4832665ad7f203b6ab13e02cb2f64805a6c269
SHA25638b13d85f93f4c0e1283bc55d8e54244fa01d6d60aaa00b7bfb49f489333b1e6
SHA512bca914e0bb7f3dc18019b4457bc870f94dcb5afdf13b7f463e506c2c30fc99f2b22392c69e3c626b8bea7d248ef26d534a06f03c27340744040efe476c53db01
-
C:\Users\Admin\AppData\Roaming\Network UniConverter Management 13\menMD5
a6448d8d59e1745612001ce13359bb30
SHA140715399ee65505ae77adf615cc8ea0921e44956
SHA2562739158b312b0c2185c3481586d3e9498cf1f9440ad8144deae3ffad9a491e85
SHA5123eb5cadf18f31c059cb3335c7a7e07eda947760d37b424c60ea296c05c57e285caed879773d9ab901eaab48e3732a58bb9acb627d26d79a7e32836cb1078acc7
-
C:\Users\Admin\AppData\Roaming\Network UniConverter Management 13\uniconverter.exeMD5
7c874ddc2e0689786d7635aa25326b4c
SHA1f7654000b1d39b8f88d4b98159c54e124cbb00d6
SHA256445c90f61dd0d7897475a7675d213b5d2819487f7bf665751fd4d352ba4a8752
SHA512bd4a786a1b4f9fa552991e90ce0bfcb0951a01bbecd5c0b579c0b6804a978e4285695cbad48975979f9b8cdb56e2b28fb5d27a3aa21760aa9bd09c23fa2b64f3
-
C:\Users\Admin\AppData\Roaming\Network UniConverter Management 13\uniconverter.exeMD5
7c874ddc2e0689786d7635aa25326b4c
SHA1f7654000b1d39b8f88d4b98159c54e124cbb00d6
SHA256445c90f61dd0d7897475a7675d213b5d2819487f7bf665751fd4d352ba4a8752
SHA512bd4a786a1b4f9fa552991e90ce0bfcb0951a01bbecd5c0b579c0b6804a978e4285695cbad48975979f9b8cdb56e2b28fb5d27a3aa21760aa9bd09c23fa2b64f3
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\OTele\officec2rclient.exe.dbMD5
8665de22b67e46648a5a147c1ed296ca
SHA1b289a96fee9fa77dd8e045ae8fd161debd376f48
SHA256b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f
SHA512bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da
-
\Users\Admin\AppData\Local\Temp\nsh1770.tmp\CityHash.dllMD5
737379945745bb94f8a0dadcc18cad8d
SHA16a1f497b4dc007f5935b66ec83b00e5a394332c6
SHA256d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a
SHA512c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22
-
\Users\Admin\AppData\Local\Temp\nsh1770.tmp\CityHash.dllMD5
737379945745bb94f8a0dadcc18cad8d
SHA16a1f497b4dc007f5935b66ec83b00e5a394332c6
SHA256d3d7b3d7a7941d66c7f75257be90b12ac76f787af42cd58f019ce0280972598a
SHA512c4a43b3ca42483cbd117758791d4333ddf38fa45eb3377f7b71ce74ec6e4d8b5ef2bfbe48c249d4eaf57ab929f4301138e53c79e0fa4be94dcbcd69c8046bc22
-
\Users\Admin\AppData\Local\Temp\nsh1770.tmp\System.dllMD5
17ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
\Users\Admin\AppData\Roaming\Network UniConverter Management 13\JdbcOdbc.dllMD5
791791c0e466eb0a6af462a265074c9d
SHA1db4e66209bd211ddc0378c0f62e644eb466cde0e
SHA256187d0a87805102aaacfdb0e18ea84a90af1540529e92430f84e3f46736383fc7
SHA512badbe604c1e99b848dbb184a1d081560a31749a89573a4c6202abec1c6aa670ca248a0e5cd9330a7c3fc90193f3f95cde6a9d44c881568ca1a9b3b063da68566
-
\Users\Admin\AppData\Roaming\Network UniConverter Management 13\libtfs2.0.dllMD5
f551e738c23336e2f614b6e21f1627cf
SHA11c4832665ad7f203b6ab13e02cb2f64805a6c269
SHA25638b13d85f93f4c0e1283bc55d8e54244fa01d6d60aaa00b7bfb49f489333b1e6
SHA512bca914e0bb7f3dc18019b4457bc870f94dcb5afdf13b7f463e506c2c30fc99f2b22392c69e3c626b8bea7d248ef26d534a06f03c27340744040efe476c53db01
-
memory/828-129-0x0000000000000000-mapping.dmp
-
memory/3968-144-0x0000000000630000-0x000000000063F000-memory.dmpFilesize
60KB
-
memory/3968-140-0x0000000000000000-mapping.dmp
-
memory/4452-117-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/4768-120-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/4768-118-0x0000000000000000-mapping.dmp
-
memory/4876-124-0x0000000000400000-0x00000000004F1000-memory.dmpFilesize
964KB
-
memory/4876-121-0x0000000000000000-mapping.dmp
-
memory/4972-137-0x0000000000000000-mapping.dmp
-
memory/4976-127-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/4976-125-0x0000000000000000-mapping.dmp
-
memory/5000-139-0x0000000000000000-mapping.dmp