Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
05-11-2021 06:04
Static task
static1
Behavioral task
behavioral1
Sample
iu35ryECDcB7YnmA9O.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
iu35ryECDcB7YnmA9O.exe
Resource
win10-en-20211104
General
-
Target
iu35ryECDcB7YnmA9O.exe
-
Size
854KB
-
MD5
6160d9cc6de5bd6d63abf3a90492f72b
-
SHA1
b37c3ef6fc4c4af664ba0b8dbaaeb065988980d5
-
SHA256
6542a64376516f4aa87b9dd2cb2978b6e83441964110aa291d7a04bceb511d97
-
SHA512
f5ef576b2b5de73b6287be8b49454072744afae2e233e3efaf6666f8509472339eb8d9123220b8b1fbe4100b76f51777294551afa3dab8c095b71e2f51414c08
Malware Config
Extracted
redline
031121
m360li.info:81
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/960-60-0x0000000000380000-0x00000000003AE000-memory.dmp family_redline behavioral1/memory/960-66-0x0000000000800000-0x0000000000819000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Skype.exeWinRar.execlient32.exepid process 960 Skype.exe 1772 WinRar.exe 608 client32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1200 cmd.exe -
Drops startup file 1 IoCs
Processes:
WinRar.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autorunings.ini.lnk WinRar.exe -
Loads dropped DLL 11 IoCs
Processes:
iu35ryECDcB7YnmA9O.exeWinRar.execlient32.exepid process 304 iu35ryECDcB7YnmA9O.exe 304 iu35ryECDcB7YnmA9O.exe 304 iu35ryECDcB7YnmA9O.exe 1772 WinRar.exe 1772 WinRar.exe 608 client32.exe 608 client32.exe 608 client32.exe 608 client32.exe 608 client32.exe 608 client32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C96E1A1-3E07-11EC-8589-7AE8C0FDC340} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005bf5749d3a275447873d564a46cb193600000000020000000000106600000001000020000000aca819ad3846f700c8be0079da91be0c7a34a506a55ee1bb02cf262f86b12aef000000000e8000000002000020000000a010f7ed9bfed3ac15f1b18e4749f4924f70707e315be9009688c7409585906c20000000a7d04989cd8f8b01b53c2e5b11cd26b2755e48dfeadec917f4010429c652f09a40000000b8c6bccc0143026aa498e93d1cf55dd59dcc3a4aa2d472f9b046080dc2560f1ccb9c804786f451ac09f305a585629f868dba018ab678fa0b4172fa0ca1417123 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d96b2614d2d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "342861136" iexplore.exe -
Processes:
iu35ryECDcB7YnmA9O.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 iu35ryECDcB7YnmA9O.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 iu35ryECDcB7YnmA9O.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 iu35ryECDcB7YnmA9O.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Skype.execlient32.exedescription pid process Token: SeDebugPrivilege 960 Skype.exe Token: SeSecurityPrivilege 608 client32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
client32.exeiexplore.exepid process 608 client32.exe 1072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1072 iexplore.exe 1072 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
iu35ryECDcB7YnmA9O.exeWinRar.execmd.exeiexplore.exedescription pid process target process PID 304 wrote to memory of 960 304 iu35ryECDcB7YnmA9O.exe Skype.exe PID 304 wrote to memory of 960 304 iu35ryECDcB7YnmA9O.exe Skype.exe PID 304 wrote to memory of 960 304 iu35ryECDcB7YnmA9O.exe Skype.exe PID 304 wrote to memory of 960 304 iu35ryECDcB7YnmA9O.exe Skype.exe PID 304 wrote to memory of 1772 304 iu35ryECDcB7YnmA9O.exe WinRar.exe PID 304 wrote to memory of 1772 304 iu35ryECDcB7YnmA9O.exe WinRar.exe PID 304 wrote to memory of 1772 304 iu35ryECDcB7YnmA9O.exe WinRar.exe PID 304 wrote to memory of 1772 304 iu35ryECDcB7YnmA9O.exe WinRar.exe PID 304 wrote to memory of 1772 304 iu35ryECDcB7YnmA9O.exe WinRar.exe PID 304 wrote to memory of 1772 304 iu35ryECDcB7YnmA9O.exe WinRar.exe PID 304 wrote to memory of 1772 304 iu35ryECDcB7YnmA9O.exe WinRar.exe PID 1772 wrote to memory of 608 1772 WinRar.exe client32.exe PID 1772 wrote to memory of 608 1772 WinRar.exe client32.exe PID 1772 wrote to memory of 608 1772 WinRar.exe client32.exe PID 1772 wrote to memory of 608 1772 WinRar.exe client32.exe PID 1772 wrote to memory of 608 1772 WinRar.exe client32.exe PID 1772 wrote to memory of 608 1772 WinRar.exe client32.exe PID 1772 wrote to memory of 608 1772 WinRar.exe client32.exe PID 304 wrote to memory of 1072 304 iu35ryECDcB7YnmA9O.exe iexplore.exe PID 304 wrote to memory of 1072 304 iu35ryECDcB7YnmA9O.exe iexplore.exe PID 304 wrote to memory of 1072 304 iu35ryECDcB7YnmA9O.exe iexplore.exe PID 304 wrote to memory of 1072 304 iu35ryECDcB7YnmA9O.exe iexplore.exe PID 304 wrote to memory of 1200 304 iu35ryECDcB7YnmA9O.exe cmd.exe PID 304 wrote to memory of 1200 304 iu35ryECDcB7YnmA9O.exe cmd.exe PID 304 wrote to memory of 1200 304 iu35ryECDcB7YnmA9O.exe cmd.exe PID 304 wrote to memory of 1200 304 iu35ryECDcB7YnmA9O.exe cmd.exe PID 1200 wrote to memory of 1968 1200 cmd.exe PING.EXE PID 1200 wrote to memory of 1968 1200 cmd.exe PING.EXE PID 1200 wrote to memory of 1968 1200 cmd.exe PING.EXE PID 1200 wrote to memory of 1968 1200 cmd.exe PING.EXE PID 1072 wrote to memory of 1788 1072 iexplore.exe IEXPLORE.EXE PID 1072 wrote to memory of 1788 1072 iexplore.exe IEXPLORE.EXE PID 1072 wrote to memory of 1788 1072 iexplore.exe IEXPLORE.EXE PID 1072 wrote to memory of 1788 1072 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\iu35ryECDcB7YnmA9O.exe"C:\Users\Admin\AppData\Local\Temp\iu35ryECDcB7YnmA9O.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Skype.exeC:\Users\Admin\AppData\Local\Temp\Skype.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\WinRar.exeC:\Users\Admin\AppData\Local\Temp\WinRar.exe2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinSup\client32.exe"C:\Users\Admin\AppData\Roaming\WinSup\client32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.binance.com/en/register?ref=WDA8929C2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\iu35ryECDcB7YnmA9O.exe & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 03⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
acaeda60c79c6bcac925eeb3653f45e0
SHA12aaae490bcdaccc6172240ff1697753b37ac5578
SHA2566b0ceccf0103afd89844761417c1d23acc41f8aebf3b7230765209b61eee5658
SHA512feaa6e7ed7dda1583739b3e531ab5c562a222ee6ecd042690ae7dcff966717c6e968469a7797265a11f6e899479ae0f3031e8cf5bebe1492d5205e9c59690900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
f79b1aba622998646960a5620939297f
SHA1bd4f08856e4ba71eeda385e863a2ef4f19da9311
SHA256db798f47b40fc1e1a99333eb9f0e366af23694756d1bbdb80d8d5398af833161
SHA512b4132264d83c63d0ae6ce587f0ac0d141541e295f4ab3aba9da323f9e82a0c97f2615aacbd49b8c8f163de04b207315316a7f601330d2cfa2485793048c2233e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
de9bc5a6c1f410524c94287e73756a4d
SHA1ea0397ee750e5beb93d93776a33cd07fd7502c7b
SHA256caf1c8fe7aa1bdca3916438288d77c9a2689ef1e6c717c9700257e79f4d9cedb
SHA5123bc2d1ba2cb62d79f4f8906c1e4dc1d4bc58997a6882cf83fef0dee0ee7899de45f0047f2ca6dc7570ac11a9ac529e8ff52c77dfe8563afdf5a943bdddee85c4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\r32q9i9\imagestore.datMD5
226c980862125950ce9095486307f961
SHA127a83fb9016f41ccb6a73a9fc6721a28df377fd9
SHA256bd6fffa33a3504355b5d16726dad0b76c4f75088e9e5b3776a09a3af03bd2324
SHA512470a53eb67646258629c089c46aef5b88ad2d64403752ee94a7f42e58af925f22bc50d5ab7546e582051184c6d6c8c75ccda0b09cdf691ed81faf68c6455a37b
-
C:\Users\Admin\AppData\Local\Temp\Skype.exeMD5
21eac16294ef9ac3a75775be71d7549b
SHA131b25f77abb0edfcd1fa6a6432b780e865df6bce
SHA256634d3655e595ce29d36051ce297f6a28ad93bc620b030b0ac0d1345fb7fd505a
SHA5128f1e4498f7eb46bccd20da995fc7c76607f400e81b88a5e7a08bc74e0345f8898a63feaa9f1ae01140aef4321cb29ae8fddcd152b2b1789e8f581fca1ddd0f5a
-
C:\Users\Admin\AppData\Local\Temp\WinRar.exeMD5
3a4a597fb97793b774baca24094fa9bc
SHA1f143c5cffb22a1c49d52b446966df19f9196918e
SHA2567c7d0cb1027501458bae61f641a5b2ccd97df0b2f0635ec9c545fd31d3e438d0
SHA5124d8bbce1d8790be564672723f58216d1be023a248ad163af274b5f210ad227f151767394b3d04413112b5d24c90cdfe357f3b879fd1ceefffd426fe3136f3f0c
-
C:\Users\Admin\AppData\Local\Temp\WinRar.exeMD5
3a4a597fb97793b774baca24094fa9bc
SHA1f143c5cffb22a1c49d52b446966df19f9196918e
SHA2567c7d0cb1027501458bae61f641a5b2ccd97df0b2f0635ec9c545fd31d3e438d0
SHA5124d8bbce1d8790be564672723f58216d1be023a248ad163af274b5f210ad227f151767394b3d04413112b5d24c90cdfe357f3b879fd1ceefffd426fe3136f3f0c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VX0LIJVL.txtMD5
52ab0f111b152b8983f6466b534d0a0d
SHA1325db4789b1309f8071b3b5a001eaedc49983b7e
SHA2563494f78b9dbab84e57ac453142a7edcb753e549a87f0fb95517e82e224070547
SHA5123bb38967906e6acd6ef174df18bb6cac0d8d0044e9280763461cde56248965584305e072ab5718a781d27e529175f981d5af4aee3aa12ccb7fae8664fae11660
-
C:\Users\Admin\AppData\Roaming\WinSup\HTCTL32.DLLMD5
2d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
C:\Users\Admin\AppData\Roaming\WinSup\MSVCR100.dllMD5
0e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
C:\Users\Admin\AppData\Roaming\WinSup\NSM.LICMD5
8614c2008044a081e9d26d8db1571f4a
SHA11b007f05c289d0b71d542520b25fe65c6b6fcbe3
SHA256df622fc8bc605023730d3ad952d69fcbd8383ce5440d63da0df20fb139355ec9
SHA512449244a508daaacde53078b826f7b482650acc3f61e8235fa892a737bebbecb178061d0aa1e99cd74da7885c86cebb2727d6e85384ecd68187d7e6e94f018ae9
-
C:\Users\Admin\AppData\Roaming\WinSup\PCICL32.dllMD5
00587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
C:\Users\Admin\AppData\Roaming\WinSup\TCCTL32.DLLMD5
eab603d12705752e3d268d86dff74ed4
SHA101873977c871d3346d795cf7e3888685de9f0b16
SHA2566795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
SHA51277de0d9c93ccba967db70b280a85a770b3d8bea3b707b1abb037b2826b48898fec87924e1a6cce218c43478e5209e9eb9781051b4c3b450bea3cd27dbd32c7f3
-
C:\Users\Admin\AppData\Roaming\WinSup\client32.exeMD5
f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880
-
C:\Users\Admin\AppData\Roaming\WinSup\client32.iniMD5
a92b98b93eb9300863341b02a9c10b86
SHA173df28c26d7dfa9b663afbe556b5c318a28b474d
SHA2562bbbfcbc30c0bb04fa94a9dbdc842ec7c9e6f5fee0bdbe22776460496cfc13bd
SHA51282f18a84babb91cf4aa9db27972a2ad6be1f33cd687499e4de76bd264f0ad1fe6df8fa216f9328fd33ad0ad558516638b9c2f515ec4c7c88c642cd6e53f0a198
-
C:\Users\Admin\AppData\Roaming\WinSup\pcicapi.dllMD5
dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
C:\Users\Admin\AppData\Roaming\WinSup\pcichek.dllMD5
a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
\Users\Admin\AppData\Local\Temp\Skype.exeMD5
21eac16294ef9ac3a75775be71d7549b
SHA131b25f77abb0edfcd1fa6a6432b780e865df6bce
SHA256634d3655e595ce29d36051ce297f6a28ad93bc620b030b0ac0d1345fb7fd505a
SHA5128f1e4498f7eb46bccd20da995fc7c76607f400e81b88a5e7a08bc74e0345f8898a63feaa9f1ae01140aef4321cb29ae8fddcd152b2b1789e8f581fca1ddd0f5a
-
\Users\Admin\AppData\Local\Temp\Skype.exeMD5
21eac16294ef9ac3a75775be71d7549b
SHA131b25f77abb0edfcd1fa6a6432b780e865df6bce
SHA256634d3655e595ce29d36051ce297f6a28ad93bc620b030b0ac0d1345fb7fd505a
SHA5128f1e4498f7eb46bccd20da995fc7c76607f400e81b88a5e7a08bc74e0345f8898a63feaa9f1ae01140aef4321cb29ae8fddcd152b2b1789e8f581fca1ddd0f5a
-
\Users\Admin\AppData\Local\Temp\WinRar.exeMD5
3a4a597fb97793b774baca24094fa9bc
SHA1f143c5cffb22a1c49d52b446966df19f9196918e
SHA2567c7d0cb1027501458bae61f641a5b2ccd97df0b2f0635ec9c545fd31d3e438d0
SHA5124d8bbce1d8790be564672723f58216d1be023a248ad163af274b5f210ad227f151767394b3d04413112b5d24c90cdfe357f3b879fd1ceefffd426fe3136f3f0c
-
\Users\Admin\AppData\Roaming\WinSup\HTCTL32.DLLMD5
2d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
\Users\Admin\AppData\Roaming\WinSup\PCICHEK.DLLMD5
a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
\Users\Admin\AppData\Roaming\WinSup\PCICL32.DLLMD5
00587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
\Users\Admin\AppData\Roaming\WinSup\TCCTL32.DLLMD5
eab603d12705752e3d268d86dff74ed4
SHA101873977c871d3346d795cf7e3888685de9f0b16
SHA2566795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
SHA51277de0d9c93ccba967db70b280a85a770b3d8bea3b707b1abb037b2826b48898fec87924e1a6cce218c43478e5209e9eb9781051b4c3b450bea3cd27dbd32c7f3
-
\Users\Admin\AppData\Roaming\WinSup\client32.exeMD5
f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880
-
\Users\Admin\AppData\Roaming\WinSup\client32.exeMD5
f76954b68cc390f8009f1a052283a740
SHA13112a39aad950045d6422fb2abe98bed05931e6c
SHA25663315df7981130853d75dc753e5776bdf371811bcfce351557c1e45afdd1ebfb
SHA512d3aea0867b488161f62e43e7c250ad3917713b8b183139fb6e06c71594fb0cec769e1494b7cc257117992ae4aa891e056f99c25431ae19f032b1ba779051a880
-
\Users\Admin\AppData\Roaming\WinSup\msvcr100.dllMD5
0e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
\Users\Admin\AppData\Roaming\WinSup\pcicapi.dllMD5
dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
memory/304-55-0x0000000075B71000-0x0000000075B73000-memory.dmpFilesize
8KB
-
memory/608-78-0x0000000000000000-mapping.dmp
-
memory/960-69-0x0000000004D92000-0x0000000004D93000-memory.dmpFilesize
4KB
-
memory/960-70-0x0000000004D94000-0x0000000004D95000-memory.dmpFilesize
4KB
-
memory/960-68-0x0000000004D91000-0x0000000004D92000-memory.dmpFilesize
4KB
-
memory/960-66-0x0000000000800000-0x0000000000819000-memory.dmpFilesize
100KB
-
memory/960-60-0x0000000000380000-0x00000000003AE000-memory.dmpFilesize
184KB
-
memory/960-58-0x0000000000000000-mapping.dmp
-
memory/1072-92-0x0000000000000000-mapping.dmp
-
memory/1200-96-0x0000000000000000-mapping.dmp
-
memory/1772-72-0x0000000000000000-mapping.dmp
-
memory/1788-98-0x0000000000000000-mapping.dmp
-
memory/1968-97-0x0000000000000000-mapping.dmp