Analysis
-
max time kernel
4294189s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
10-03-2022 15:58
Static task
static1
Behavioral task
behavioral1
Sample
59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe
Resource
win10v2004-en-20220112
General
-
Target
59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe
-
Size
3.1MB
-
MD5
ce8375a1cfb7839c7d515db56e6fc6e1
-
SHA1
6e4e59d0ca42c5799097b5e46a5c2dfc62d776c0
-
SHA256
59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec
-
SHA512
8011092e225dcd0640ad4a95ca76544b0a71c971fa6a476b48d6731180a3d7535a6e42cad5f020fd7f64d11e1c9ddaa6dafe605e70af990d11ecb830fc21baba
Malware Config
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com/
-
profile_id
706
Extracted
redline
ServAni
87.251.71.195:82
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Extracted
redline
dadad123
86.107.197.196:63065
-
auth_value
dd4834614a3ac04a7b90791c224626a2
Extracted
vidar
50.6
937
https://mas.to/@s4msalo
https://koyu.space/@samsa2l
-
profile_id
937
Signatures
-
DcRat 14 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeV0PDXF8DQXJg2Rgzk22_GRLx.exearnatic_2.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2700 schtasks.exe 2240 schtasks.exe 2828 schtasks.exe 2516 schtasks.exe 1168 schtasks.exe 1700 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Users\\Default\\Pictures\\cmd.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe 2112 schtasks.exe 1044 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\moGCi53vEI8IvA8t0fXpMEaH = "\"C:\\Windows\\PLA\\Templates\\moGCi53vEI8IvA8t0fXpMEaH.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe 2660 schtasks.exe 2664 schtasks.exe 2488 schtasks.exe -
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
Process spawned unexpected child process 9 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2112 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2660 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 2888 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2888 schtasks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-168-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2024-170-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2024-172-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2024-175-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2024-177-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2228-203-0x0000000000110000-0x0000000000130000-memory.dmp family_redline behavioral1/memory/1388-221-0x0000000000E50000-0x0000000001195000-memory.dmp family_redline behavioral1/memory/1388-223-0x0000000000E50000-0x0000000001195000-memory.dmp family_redline behavioral1/memory/2252-217-0x0000000001360000-0x00000000016C2000-memory.dmp family_redline behavioral1/memory/2252-213-0x0000000001360000-0x00000000016C2000-memory.dmp family_redline behavioral1/memory/1388-212-0x0000000000E50000-0x0000000001195000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE DCRAT Activity (GET)
-
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
OnlyLogger Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2340-231-0x0000000000400000-0x0000000000492000-memory.dmp family_onlylogger -
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1192-159-0x0000000000A20000-0x0000000000ABD000-memory.dmp family_vidar behavioral1/memory/1192-162-0x0000000000400000-0x000000000094C000-memory.dmp family_vidar behavioral1/memory/1512-260-0x0000000000340000-0x00000000003EC000-memory.dmp family_vidar behavioral1/memory/1512-261-0x0000000000400000-0x00000000004CD000-memory.dmp family_vidar -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 32 IoCs
Processes:
setup_install.exearnatic_5.exearnatic_1.exearnatic_7.exearnatic_6.exearnatic_4.exearnatic_3.exearnatic_2.exejfiag3g_gg.exearnatic_7.exejfiag3g_gg.exejR8mr6MBTuX502Vuyd5RLtIF.exexbEAAsgsFSu4NIqHlocQUCyA.exeW7sxWPvwKvQwiP40t455aKkz.exeGiwkXfE5qkAoyVcMGZIOtN9f.exeJhvelAfvZZXWV7pSE6X9QY4K.exeCVPl_YRpYqmLR8EQJRwtGufs.exeVodcVWrtAgZfYG5THO1O1urg.exedM8lPPoZMPoebrMh4m_K51KD.exeJTfJyEF4r7W5OX92fRKy9en3.exe9ggnJ8fQMF1KfB7oKxauHGCO.exe9U3kGKi7CW8FaZEWMxAoUzKP.exep_7HteI1s4CRGWpaKA1jxg7M.exeV0PDXF8DQXJg2Rgzk22_GRLx.exeDL1d0edHmchYdwfWeIcW6aPH.exeNiboX_EWbkULW3J8jn4EcrFk.exemoGCi53vEI8IvA8t0fXpMEaH.exeBCDxWVBKKz4MQrm3Al6BPYtv.exeInstall.exeInstall.exeAccostarmi.exe.pifWmiPrvSE.exepid process 1100 setup_install.exe 1804 arnatic_5.exe 1192 arnatic_1.exe 1680 arnatic_7.exe 1484 arnatic_6.exe 732 arnatic_4.exe 1712 arnatic_3.exe 1644 arnatic_2.exe 824 jfiag3g_gg.exe 2024 arnatic_7.exe 736 jfiag3g_gg.exe 1900 jR8mr6MBTuX502Vuyd5RLtIF.exe 1512 xbEAAsgsFSu4NIqHlocQUCyA.exe 1064 W7sxWPvwKvQwiP40t455aKkz.exe 1120 GiwkXfE5qkAoyVcMGZIOtN9f.exe 1388 JhvelAfvZZXWV7pSE6X9QY4K.exe 1544 CVPl_YRpYqmLR8EQJRwtGufs.exe 1136 VodcVWrtAgZfYG5THO1O1urg.exe 2168 dM8lPPoZMPoebrMh4m_K51KD.exe 2228 JTfJyEF4r7W5OX92fRKy9en3.exe 2080 9ggnJ8fQMF1KfB7oKxauHGCO.exe 2244 9U3kGKi7CW8FaZEWMxAoUzKP.exe 2180 p_7HteI1s4CRGWpaKA1jxg7M.exe 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe 2236 DL1d0edHmchYdwfWeIcW6aPH.exe 2252 NiboX_EWbkULW3J8jn4EcrFk.exe 2276 moGCi53vEI8IvA8t0fXpMEaH.exe 2340 BCDxWVBKKz4MQrm3Al6BPYtv.exe 2764 Install.exe 2988 Install.exe 2224 Accostarmi.exe.pif 596 WmiPrvSE.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
arnatic_6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Control Panel\International\Geo\Nation arnatic_6.exe -
Loads dropped DLL 64 IoCs
Processes:
59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exesetup_install.execmd.execmd.execmd.execmd.execmd.exearnatic_1.execmd.exearnatic_7.exearnatic_4.exearnatic_6.execmd.exearnatic_2.exejfiag3g_gg.exearnatic_7.exejfiag3g_gg.exeWerFault.exexbEAAsgsFSu4NIqHlocQUCyA.exeW7sxWPvwKvQwiP40t455aKkz.exeGiwkXfE5qkAoyVcMGZIOtN9f.exeCVPl_YRpYqmLR8EQJRwtGufs.exepid process 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe 1100 setup_install.exe 1100 setup_install.exe 1100 setup_install.exe 1100 setup_install.exe 1100 setup_install.exe 1100 setup_install.exe 1100 setup_install.exe 1100 setup_install.exe 1568 cmd.exe 1568 cmd.exe 468 cmd.exe 1976 cmd.exe 1976 cmd.exe 1984 cmd.exe 1472 cmd.exe 1192 arnatic_1.exe 1192 arnatic_1.exe 1964 cmd.exe 1680 arnatic_7.exe 1680 arnatic_7.exe 732 arnatic_4.exe 732 arnatic_4.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1544 cmd.exe 1544 cmd.exe 1644 arnatic_2.exe 1644 arnatic_2.exe 732 arnatic_4.exe 732 arnatic_4.exe 824 jfiag3g_gg.exe 824 jfiag3g_gg.exe 1680 arnatic_7.exe 1644 arnatic_2.exe 2024 arnatic_7.exe 2024 arnatic_7.exe 732 arnatic_4.exe 732 arnatic_4.exe 736 jfiag3g_gg.exe 736 jfiag3g_gg.exe 824 WerFault.exe 824 WerFault.exe 824 WerFault.exe 824 WerFault.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1484 arnatic_6.exe 1512 xbEAAsgsFSu4NIqHlocQUCyA.exe 1484 arnatic_6.exe 1512 xbEAAsgsFSu4NIqHlocQUCyA.exe 1064 W7sxWPvwKvQwiP40t455aKkz.exe 1120 GiwkXfE5qkAoyVcMGZIOtN9f.exe 1120 GiwkXfE5qkAoyVcMGZIOtN9f.exe 1064 W7sxWPvwKvQwiP40t455aKkz.exe 1544 CVPl_YRpYqmLR8EQJRwtGufs.exe 1544 CVPl_YRpYqmLR8EQJRwtGufs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
V0PDXF8DQXJg2Rgzk22_GRLx.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\ServiceModel\\WmiPrvSE.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\PerfLogs\\Admin\\dllhost.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\arnatic_3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7zS034C9926\\arnatic_3\\arnatic_3.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\arnatic_3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7zS034C9926\\libcurlpp\\arnatic_3.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Users\\Default\\Pictures\\cmd.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\moGCi53vEI8IvA8t0fXpMEaH = "\"C:\\Windows\\PLA\\Templates\\moGCi53vEI8IvA8t0fXpMEaH.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\textvaluelist\\WmiPrvSE.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\cmd.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\api-ms-win-crt-private-l1-1-0\\dllhost.exe\"" V0PDXF8DQXJg2Rgzk22_GRLx.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com 53 ipinfo.io 54 ipinfo.io -
Drops file in System32 directory 7 IoCs
Processes:
V0PDXF8DQXJg2Rgzk22_GRLx.exeInstall.exedescription ioc process File created C:\Windows\SysWOW64\wbem\textvaluelist\24dbde2999530e V0PDXF8DQXJg2Rgzk22_GRLx.exe File created C:\Windows\SysWOW64\wbem\ServiceModel\WmiPrvSE.exe V0PDXF8DQXJg2Rgzk22_GRLx.exe File created C:\Windows\SysWOW64\wbem\ServiceModel\24dbde2999530e V0PDXF8DQXJg2Rgzk22_GRLx.exe File created C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0\dllhost.exe V0PDXF8DQXJg2Rgzk22_GRLx.exe File created C:\Windows\SysWOW64\api-ms-win-crt-private-l1-1-0\5940a34987c991 V0PDXF8DQXJg2Rgzk22_GRLx.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\wbem\textvaluelist\WmiPrvSE.exe V0PDXF8DQXJg2Rgzk22_GRLx.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
JhvelAfvZZXWV7pSE6X9QY4K.exeNiboX_EWbkULW3J8jn4EcrFk.exeV0PDXF8DQXJg2Rgzk22_GRLx.exeWmiPrvSE.exepid process 1388 JhvelAfvZZXWV7pSE6X9QY4K.exe 2252 NiboX_EWbkULW3J8jn4EcrFk.exe 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe 596 WmiPrvSE.exe 596 WmiPrvSE.exe 596 WmiPrvSE.exe 596 WmiPrvSE.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
arnatic_7.exedescription pid process target process PID 1680 set thread context of 2024 1680 arnatic_7.exe arnatic_7.exe -
Drops file in Program Files directory 2 IoCs
Processes:
V0PDXF8DQXJg2Rgzk22_GRLx.exedescription ioc process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\cmd.exe V0PDXF8DQXJg2Rgzk22_GRLx.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\ebf1f9fa8afd6d V0PDXF8DQXJg2Rgzk22_GRLx.exe -
Drops file in Windows directory 2 IoCs
Processes:
V0PDXF8DQXJg2Rgzk22_GRLx.exedescription ioc process File created C:\Windows\PLA\Templates\moGCi53vEI8IvA8t0fXpMEaH.exe V0PDXF8DQXJg2Rgzk22_GRLx.exe File created C:\Windows\PLA\Templates\aee3fcf7aac5e9 V0PDXF8DQXJg2Rgzk22_GRLx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 824 1192 WerFault.exe arnatic_1.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
arnatic_2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
xbEAAsgsFSu4NIqHlocQUCyA.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xbEAAsgsFSu4NIqHlocQUCyA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString xbEAAsgsFSu4NIqHlocQUCyA.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2700 schtasks.exe 2112 schtasks.exe 2240 schtasks.exe 2660 schtasks.exe 1168 schtasks.exe 2664 schtasks.exe 1044 schtasks.exe 2488 schtasks.exe 2828 schtasks.exe 1700 schtasks.exe 2516 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1980 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 3044 tasklist.exe 2712 tasklist.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 2832 taskkill.exe 432 taskkill.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACB832C1-A0AA-11EC-8B9A-46E3FC26E5EF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACAEAD41-A0AA-11EC-8B9A-46E3FC26E5EF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Processes:
arnatic_1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 arnatic_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 arnatic_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 arnatic_1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 arnatic_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 arnatic_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 arnatic_1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
arnatic_2.exejfiag3g_gg.exepid process 1644 arnatic_2.exe 1644 arnatic_2.exe 736 jfiag3g_gg.exe 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1396 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
arnatic_2.exepid process 1644 arnatic_2.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
arnatic_5.exearnatic_7.exeforfiles.exetaskkill.exeV0PDXF8DQXJg2Rgzk22_GRLx.exetasklist.exeJTfJyEF4r7W5OX92fRKy9en3.exetaskkill.exeWmiPrvSE.exedescription pid process Token: SeDebugPrivilege 1804 arnatic_5.exe Token: SeShutdownPrivilege 1396 Token: SeDebugPrivilege 2024 arnatic_7.exe Token: SeDebugPrivilege 2712 forfiles.exe Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeDebugPrivilege 2832 taskkill.exe Token: SeDebugPrivilege 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe Token: SeDebugPrivilege 3044 tasklist.exe Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeDebugPrivilege 2228 JTfJyEF4r7W5OX92fRKy9en3.exe Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeDebugPrivilege 432 taskkill.exe Token: SeDebugPrivilege 596 WmiPrvSE.exe Token: SeShutdownPrivilege 1396 -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
Accostarmi.exe.pifiexplore.exeiexplore.exepid process 2224 Accostarmi.exe.pif 1396 1396 1396 1396 2224 Accostarmi.exe.pif 2224 Accostarmi.exe.pif 1396 1396 972 iexplore.exe 2580 iexplore.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Accostarmi.exe.pifpid process 2224 Accostarmi.exe.pif 2224 Accostarmi.exe.pif 2224 Accostarmi.exe.pif -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
V0PDXF8DQXJg2Rgzk22_GRLx.exeWmiPrvSE.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2260 V0PDXF8DQXJg2Rgzk22_GRLx.exe 596 WmiPrvSE.exe 972 iexplore.exe 972 iexplore.exe 2580 iexplore.exe 2580 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 596 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exesetup_install.execmd.execmd.exedescription pid process target process PID 1072 wrote to memory of 1100 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe setup_install.exe PID 1072 wrote to memory of 1100 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe setup_install.exe PID 1072 wrote to memory of 1100 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe setup_install.exe PID 1072 wrote to memory of 1100 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe setup_install.exe PID 1072 wrote to memory of 1100 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe setup_install.exe PID 1072 wrote to memory of 1100 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe setup_install.exe PID 1072 wrote to memory of 1100 1072 59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe setup_install.exe PID 1100 wrote to memory of 1568 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1568 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1568 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1568 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1568 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1568 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1568 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1544 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1544 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1544 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1544 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1544 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1544 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1544 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1472 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1472 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1472 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1472 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1472 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1472 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1472 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1964 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1964 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1964 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1964 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1964 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1964 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1964 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 468 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 468 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 468 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 468 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 468 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 468 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 468 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1984 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1984 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1984 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1984 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1984 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1984 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1984 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1976 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1976 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1976 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1976 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1976 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1976 1100 setup_install.exe cmd.exe PID 1100 wrote to memory of 1976 1100 setup_install.exe cmd.exe PID 1568 wrote to memory of 1192 1568 cmd.exe arnatic_1.exe PID 1568 wrote to memory of 1192 1568 cmd.exe arnatic_1.exe PID 1568 wrote to memory of 1192 1568 cmd.exe arnatic_1.exe PID 1568 wrote to memory of 1192 1568 cmd.exe arnatic_1.exe PID 1568 wrote to memory of 1192 1568 cmd.exe arnatic_1.exe PID 1568 wrote to memory of 1192 1568 cmd.exe arnatic_1.exe PID 1568 wrote to memory of 1192 1568 cmd.exe arnatic_1.exe PID 468 wrote to memory of 1804 468 cmd.exe arnatic_5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe"C:\Users\Admin\AppData\Local\Temp\59510cccbf45b3b2167896a7cc4d8ad806a483474be90879ce65e5801224deec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_1.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_1.exearnatic_1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 9525⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_2.exe3⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_2.exearnatic_2.exe4⤵
- DcRat
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_7.exe3⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exearnatic_7.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeC:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_6.exe3⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_6.exearnatic_6.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Users\Admin\Documents\JhvelAfvZZXWV7pSE6X9QY4K.exe"C:\Users\Admin\Documents\JhvelAfvZZXWV7pSE6X9QY4K.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=JhvelAfvZZXWV7pSE6X9QY4K.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.06⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Documents\jR8mr6MBTuX502Vuyd5RLtIF.exe"C:\Users\Admin\Documents\jR8mr6MBTuX502Vuyd5RLtIF.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\W7sxWPvwKvQwiP40t455aKkz.exe"C:\Users\Admin\Documents\W7sxWPvwKvQwiP40t455aKkz.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Documents\GiwkXfE5qkAoyVcMGZIOtN9f.exe"C:\Users\Admin\Documents\GiwkXfE5qkAoyVcMGZIOtN9f.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Documents\CVPl_YRpYqmLR8EQJRwtGufs.exe"C:\Users\Admin\Documents\CVPl_YRpYqmLR8EQJRwtGufs.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Documents\VodcVWrtAgZfYG5THO1O1urg.exe"C:\Users\Admin\Documents\VodcVWrtAgZfYG5THO1O1urg.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\xbEAAsgsFSu4NIqHlocQUCyA.exe"C:\Users\Admin\Documents\xbEAAsgsFSu4NIqHlocQUCyA.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im xbEAAsgsFSu4NIqHlocQUCyA.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\xbEAAsgsFSu4NIqHlocQUCyA.exe" & del C:\ProgramData\*.dll & exit6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xbEAAsgsFSu4NIqHlocQUCyA.exe /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\9ggnJ8fQMF1KfB7oKxauHGCO.exe"C:\Users\Admin\Documents\9ggnJ8fQMF1KfB7oKxauHGCO.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\DL1d0edHmchYdwfWeIcW6aPH.exe"C:\Users\Admin\Documents\DL1d0edHmchYdwfWeIcW6aPH.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\moGCi53vEI8IvA8t0fXpMEaH.exe"C:\Users\Admin\Documents\moGCi53vEI8IvA8t0fXpMEaH.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\BCDxWVBKKz4MQrm3Al6BPYtv.exe"C:\Users\Admin\Documents\BCDxWVBKKz4MQrm3Al6BPYtv.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "BCDxWVBKKz4MQrm3Al6BPYtv.exe" /f & erase "C:\Users\Admin\Documents\BCDxWVBKKz4MQrm3Al6BPYtv.exe" & exit6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "BCDxWVBKKz4MQrm3Al6BPYtv.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\V0PDXF8DQXJg2Rgzk22_GRLx.exe"C:\Users\Admin\Documents\V0PDXF8DQXJg2Rgzk22_GRLx.exe"5⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8tcgWrz8n8.bat"6⤵
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵
-
C:\Windows\SysWOW64\wbem\textvaluelist\WmiPrvSE.exe"C:\Windows\System32\wbem\textvaluelist\WmiPrvSE.exe"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Documents\NiboX_EWbkULW3J8jn4EcrFk.exe"C:\Users\Admin\Documents\NiboX_EWbkULW3J8jn4EcrFk.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=NiboX_EWbkULW3J8jn4EcrFk.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.06⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:275457 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Documents\9U3kGKi7CW8FaZEWMxAoUzKP.exe"C:\Users\Admin\Documents\9U3kGKi7CW8FaZEWMxAoUzKP.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\JTfJyEF4r7W5OX92fRKy9en3.exe"C:\Users\Admin\Documents\JTfJyEF4r7W5OX92fRKy9en3.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\p_7HteI1s4CRGWpaKA1jxg7M.exe"C:\Users\Admin\Documents\p_7HteI1s4CRGWpaKA1jxg7M.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSB56.tmp\Install.exe.\Install.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS228E.tmp\Install.exe.\Install.exe /S /site_id "525403"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&9⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3210⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6410⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"8⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&9⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3210⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6410⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gqECXsMNO" /SC once /ST 18:48:02 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="8⤵
- DcRat
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gqECXsMNO"8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gqECXsMNO"8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "booXbIzkEgfNdKvxAC" /SC once /ST 19:47:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\uOvKJyFirsYYYLVYA\GHoNhggtAPCruoj\PIzgjYS.exe\" j6 /site_id 525403 /S" /V1 /F8⤵
- DcRat
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\dM8lPPoZMPoebrMh4m_K51KD.exe"C:\Users\Admin\Documents\dM8lPPoZMPoebrMh4m_K51KD.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_5.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_5.exearnatic_5.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_4.exe3⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_4.exearnatic_4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_3.exe3⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_3.exearnatic_3.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Affaticato.gif1⤵
-
C:\Windows\SysWOW64\cmd.execmd2⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"3⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"3⤵
-
C:\Windows\SysWOW64\find.exefind /I /N "psuaservice.exe"3⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq PSUAService.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^uEDzPzHFCdzewXWMRhXuwzGNjMXXrsYuMnTuDfFnaaWMxrxJAnNdPOrNYPircJBlshdCrQoBHnNIvTzoshbFDH$" Koubbeh.gif3⤵
-
C:\Windows\SysWOW64\waitfor.exewaitfor /t 5 jFjyKdbHiNcpqGHLaDXhhIXfDT3⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Accostarmi.exe.pifAccostarmi.exe.pif N3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Accostarmi.exe.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Accostarmi.exe.pif4⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Default\Pictures\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "moGCi53vEI8IvA8t0fXpMEaH" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\moGCi53vEI8IvA8t0fXpMEaH.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\textvaluelist\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\ServiceModel\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\api-ms-win-crt-private-l1-1-0\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\PerfLogs\Admin\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "arnatic_3" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_3\arnatic_3.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "arnatic_3" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libcurlpp\arnatic_3.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {2B07CD42-32C0-4311-B407-F4C7B0C6B481} S-1-5-21-1405931862-909307831-4085185274-1000:GZAATBZA\Admin:Interactive:[1]1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
4Disabling Security Tools
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_1.exeMD5
0ba1b996e664167e70ad78fa8ef7b709
SHA1a96bf0b21fce59638f9b1d9c6f945abc263b07a9
SHA2569d9fd7328bc54dbc8a0a0905ad3889a4a62dff54bbeec8c2e9ebbf80ad11b3cf
SHA512ddbb1d3f50f21a830e5dd5b7ae95051e4e6674f1ef7c14114eea384487e8e87441194bf0c626ab56931dfd0a3c0fa9e41f0b93a28f0e9c18e7e2ec28dd5135d1
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_1.txtMD5
0ba1b996e664167e70ad78fa8ef7b709
SHA1a96bf0b21fce59638f9b1d9c6f945abc263b07a9
SHA2569d9fd7328bc54dbc8a0a0905ad3889a4a62dff54bbeec8c2e9ebbf80ad11b3cf
SHA512ddbb1d3f50f21a830e5dd5b7ae95051e4e6674f1ef7c14114eea384487e8e87441194bf0c626ab56931dfd0a3c0fa9e41f0b93a28f0e9c18e7e2ec28dd5135d1
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_2.exeMD5
aa2812047e01c74c4b16c047239d8870
SHA1916a14b1d0a0f8c6f86b3c6a44e5419e466a1ee4
SHA2562d17a1ad49145cd04aebcead72ba6e1bd5b97d7f46b7855a1677862569cde9c7
SHA512367fd592402c4107f750c3bf29f94277eae1811da6354fd09c469d1b92ad9cb4bad72cfe28050b42ccc4f61d7475c6dd6a490afc951aba5e30c35034827aaf40
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_2.txtMD5
aa2812047e01c74c4b16c047239d8870
SHA1916a14b1d0a0f8c6f86b3c6a44e5419e466a1ee4
SHA2562d17a1ad49145cd04aebcead72ba6e1bd5b97d7f46b7855a1677862569cde9c7
SHA512367fd592402c4107f750c3bf29f94277eae1811da6354fd09c469d1b92ad9cb4bad72cfe28050b42ccc4f61d7475c6dd6a490afc951aba5e30c35034827aaf40
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_3.exeMD5
7837314688b7989de1e8d94f598eb2dd
SHA1889ae8ce433d5357f8ea2aff64daaba563dc94e3
SHA256d8c28d07c365873b4e8332f057f062e65f2dd0cd4d599fd8b16d82eca5cf4247
SHA5123df0c24a9f51a82716abb8e87ff44fdb6686183423d1f2f7d6bfb4cd03c3a18490f2c7987c29f3e1b2d25c48d428c2e73033998a872b185f70bb68a7aedb3e7c
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_3.txtMD5
7837314688b7989de1e8d94f598eb2dd
SHA1889ae8ce433d5357f8ea2aff64daaba563dc94e3
SHA256d8c28d07c365873b4e8332f057f062e65f2dd0cd4d599fd8b16d82eca5cf4247
SHA5123df0c24a9f51a82716abb8e87ff44fdb6686183423d1f2f7d6bfb4cd03c3a18490f2c7987c29f3e1b2d25c48d428c2e73033998a872b185f70bb68a7aedb3e7c
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_4.txtMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_5.exeMD5
0d7730cfff0b9750c111a0171d8f0a8f
SHA1f3ccb125e9ea1031309de8aabfdad983f3e1c91c
SHA256bb3b64a719b38e6bff37c9596d8e2211992b250aa07b13983d3673f98cb8e6c7
SHA512c6d6af68dd37af4e5b35032cefdb0fbcc17f8a88b915c73733a09428b8f069cf9646093bccb69d693fb36b1b6b84c583e9e0cac15228f355c507a3392079bdc4
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_5.txtMD5
0d7730cfff0b9750c111a0171d8f0a8f
SHA1f3ccb125e9ea1031309de8aabfdad983f3e1c91c
SHA256bb3b64a719b38e6bff37c9596d8e2211992b250aa07b13983d3673f98cb8e6c7
SHA512c6d6af68dd37af4e5b35032cefdb0fbcc17f8a88b915c73733a09428b8f069cf9646093bccb69d693fb36b1b6b84c583e9e0cac15228f355c507a3392079bdc4
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_6.exeMD5
a0b06be5d5272aa4fcf2261ed257ee06
SHA1596c955b854f51f462c26b5eb94e1b6161aad83c
SHA256475d0beeadca13ecdfd905c840297e53ad87731dc911b324293ee95b3d8b700b
SHA5121eb6b9df145b131d03224e9bb7ed3c6cc87044506d848be14d3e4c70438e575dbbd2a0964b176281b1307469872bd6404873974475cd91eb6f7534d16ceff702
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_6.txtMD5
a0b06be5d5272aa4fcf2261ed257ee06
SHA1596c955b854f51f462c26b5eb94e1b6161aad83c
SHA256475d0beeadca13ecdfd905c840297e53ad87731dc911b324293ee95b3d8b700b
SHA5121eb6b9df145b131d03224e9bb7ed3c6cc87044506d848be14d3e4c70438e575dbbd2a0964b176281b1307469872bd6404873974475cd91eb6f7534d16ceff702
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.txtMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
C:\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtMD5
b7161c0845a64ff6d7345b67ff97f3b0
SHA1d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA51298d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_1.exeMD5
0ba1b996e664167e70ad78fa8ef7b709
SHA1a96bf0b21fce59638f9b1d9c6f945abc263b07a9
SHA2569d9fd7328bc54dbc8a0a0905ad3889a4a62dff54bbeec8c2e9ebbf80ad11b3cf
SHA512ddbb1d3f50f21a830e5dd5b7ae95051e4e6674f1ef7c14114eea384487e8e87441194bf0c626ab56931dfd0a3c0fa9e41f0b93a28f0e9c18e7e2ec28dd5135d1
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_1.exeMD5
0ba1b996e664167e70ad78fa8ef7b709
SHA1a96bf0b21fce59638f9b1d9c6f945abc263b07a9
SHA2569d9fd7328bc54dbc8a0a0905ad3889a4a62dff54bbeec8c2e9ebbf80ad11b3cf
SHA512ddbb1d3f50f21a830e5dd5b7ae95051e4e6674f1ef7c14114eea384487e8e87441194bf0c626ab56931dfd0a3c0fa9e41f0b93a28f0e9c18e7e2ec28dd5135d1
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_1.exeMD5
0ba1b996e664167e70ad78fa8ef7b709
SHA1a96bf0b21fce59638f9b1d9c6f945abc263b07a9
SHA2569d9fd7328bc54dbc8a0a0905ad3889a4a62dff54bbeec8c2e9ebbf80ad11b3cf
SHA512ddbb1d3f50f21a830e5dd5b7ae95051e4e6674f1ef7c14114eea384487e8e87441194bf0c626ab56931dfd0a3c0fa9e41f0b93a28f0e9c18e7e2ec28dd5135d1
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_1.exeMD5
0ba1b996e664167e70ad78fa8ef7b709
SHA1a96bf0b21fce59638f9b1d9c6f945abc263b07a9
SHA2569d9fd7328bc54dbc8a0a0905ad3889a4a62dff54bbeec8c2e9ebbf80ad11b3cf
SHA512ddbb1d3f50f21a830e5dd5b7ae95051e4e6674f1ef7c14114eea384487e8e87441194bf0c626ab56931dfd0a3c0fa9e41f0b93a28f0e9c18e7e2ec28dd5135d1
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_2.exeMD5
aa2812047e01c74c4b16c047239d8870
SHA1916a14b1d0a0f8c6f86b3c6a44e5419e466a1ee4
SHA2562d17a1ad49145cd04aebcead72ba6e1bd5b97d7f46b7855a1677862569cde9c7
SHA512367fd592402c4107f750c3bf29f94277eae1811da6354fd09c469d1b92ad9cb4bad72cfe28050b42ccc4f61d7475c6dd6a490afc951aba5e30c35034827aaf40
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_2.exeMD5
aa2812047e01c74c4b16c047239d8870
SHA1916a14b1d0a0f8c6f86b3c6a44e5419e466a1ee4
SHA2562d17a1ad49145cd04aebcead72ba6e1bd5b97d7f46b7855a1677862569cde9c7
SHA512367fd592402c4107f750c3bf29f94277eae1811da6354fd09c469d1b92ad9cb4bad72cfe28050b42ccc4f61d7475c6dd6a490afc951aba5e30c35034827aaf40
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_2.exeMD5
aa2812047e01c74c4b16c047239d8870
SHA1916a14b1d0a0f8c6f86b3c6a44e5419e466a1ee4
SHA2562d17a1ad49145cd04aebcead72ba6e1bd5b97d7f46b7855a1677862569cde9c7
SHA512367fd592402c4107f750c3bf29f94277eae1811da6354fd09c469d1b92ad9cb4bad72cfe28050b42ccc4f61d7475c6dd6a490afc951aba5e30c35034827aaf40
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_2.exeMD5
aa2812047e01c74c4b16c047239d8870
SHA1916a14b1d0a0f8c6f86b3c6a44e5419e466a1ee4
SHA2562d17a1ad49145cd04aebcead72ba6e1bd5b97d7f46b7855a1677862569cde9c7
SHA512367fd592402c4107f750c3bf29f94277eae1811da6354fd09c469d1b92ad9cb4bad72cfe28050b42ccc4f61d7475c6dd6a490afc951aba5e30c35034827aaf40
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_3.exeMD5
7837314688b7989de1e8d94f598eb2dd
SHA1889ae8ce433d5357f8ea2aff64daaba563dc94e3
SHA256d8c28d07c365873b4e8332f057f062e65f2dd0cd4d599fd8b16d82eca5cf4247
SHA5123df0c24a9f51a82716abb8e87ff44fdb6686183423d1f2f7d6bfb4cd03c3a18490f2c7987c29f3e1b2d25c48d428c2e73033998a872b185f70bb68a7aedb3e7c
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_5.exeMD5
0d7730cfff0b9750c111a0171d8f0a8f
SHA1f3ccb125e9ea1031309de8aabfdad983f3e1c91c
SHA256bb3b64a719b38e6bff37c9596d8e2211992b250aa07b13983d3673f98cb8e6c7
SHA512c6d6af68dd37af4e5b35032cefdb0fbcc17f8a88b915c73733a09428b8f069cf9646093bccb69d693fb36b1b6b84c583e9e0cac15228f355c507a3392079bdc4
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_6.exeMD5
a0b06be5d5272aa4fcf2261ed257ee06
SHA1596c955b854f51f462c26b5eb94e1b6161aad83c
SHA256475d0beeadca13ecdfd905c840297e53ad87731dc911b324293ee95b3d8b700b
SHA5121eb6b9df145b131d03224e9bb7ed3c6cc87044506d848be14d3e4c70438e575dbbd2a0964b176281b1307469872bd6404873974475cd91eb6f7534d16ceff702
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_6.exeMD5
a0b06be5d5272aa4fcf2261ed257ee06
SHA1596c955b854f51f462c26b5eb94e1b6161aad83c
SHA256475d0beeadca13ecdfd905c840297e53ad87731dc911b324293ee95b3d8b700b
SHA5121eb6b9df145b131d03224e9bb7ed3c6cc87044506d848be14d3e4c70438e575dbbd2a0964b176281b1307469872bd6404873974475cd91eb6f7534d16ceff702
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_6.exeMD5
a0b06be5d5272aa4fcf2261ed257ee06
SHA1596c955b854f51f462c26b5eb94e1b6161aad83c
SHA256475d0beeadca13ecdfd905c840297e53ad87731dc911b324293ee95b3d8b700b
SHA5121eb6b9df145b131d03224e9bb7ed3c6cc87044506d848be14d3e4c70438e575dbbd2a0964b176281b1307469872bd6404873974475cd91eb6f7534d16ceff702
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\arnatic_7.exeMD5
b35429243cde1ce73e5536800eb7d45e
SHA13053cf91c3db2174e18977e7aa36f9df6321a16e
SHA2569f251d5f05a267eb6ce4a99eb17ed954610604c0a6741c29dc2f53dfb1f08297
SHA512ba8df63416baa5ee89c1b751c27630a6cd4cacf568243dcaf90df18c013a01741ed6502a5a98a32177971a892e538f3cfd0e75148f1d8739f55364acb30bb99b
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
\Users\Admin\AppData\Local\Temp\7zS034C9926\setup_install.exeMD5
42fea37df5633559910d8d6e73585422
SHA1b1f5a5c2619ac8027911bc18968231d282474b56
SHA2567567a9898f22e4948fbd2c49e8d0ccfb068794362abe5fc87d972ac9ed79b7b4
SHA512c8655499ecaab3ecb597956ebe922091f2c13567eee9cc9eb5e09901d8b27cf82d7e781c2e8bc7180e00d8f4a8b55efb3c763a2c6c5d94e736e199847437895a
-
\Users\Admin\AppData\Local\Temp\CC4F.tmpMD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeMD5
7fee8223d6e4f82d6cd115a28f0b6d58
SHA11b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
SHA5123ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4
-
memory/596-341-0x0000000000DF0000-0x000000000129C000-memory.dmpFilesize
4.7MB
-
memory/596-345-0x0000000003060000-0x0000000003061000-memory.dmpFilesize
4KB
-
memory/596-340-0x0000000000DF0000-0x000000000129C000-memory.dmpFilesize
4.7MB
-
memory/596-342-0x0000000073930000-0x000000007401E000-memory.dmpFilesize
6.9MB
-
memory/1064-192-0x0000000000400000-0x00000000005E0000-memory.dmpFilesize
1.9MB
-
memory/1064-193-0x0000000000380000-0x00000000003E0000-memory.dmpFilesize
384KB
-
memory/1072-54-0x00000000753E1000-0x00000000753E3000-memory.dmpFilesize
8KB
-
memory/1100-74-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1100-77-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1100-140-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1100-75-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1100-76-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1100-82-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1100-139-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1100-138-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1100-84-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1100-85-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1100-87-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1100-86-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1100-83-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1100-80-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1100-79-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1100-136-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1100-78-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1100-137-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1100-81-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1136-195-0x0000000000400000-0x00000000005DB000-memory.dmpFilesize
1.9MB
-
memory/1136-199-0x0000000000370000-0x00000000003D0000-memory.dmpFilesize
384KB
-
memory/1192-159-0x0000000000A20000-0x0000000000ABD000-memory.dmpFilesize
628KB
-
memory/1192-162-0x0000000000400000-0x000000000094C000-memory.dmpFilesize
5.3MB
-
memory/1192-143-0x0000000000B10000-0x0000000000B74000-memory.dmpFilesize
400KB
-
memory/1192-157-0x0000000000B10000-0x0000000000B74000-memory.dmpFilesize
400KB
-
memory/1388-212-0x0000000000E50000-0x0000000001195000-memory.dmpFilesize
3.3MB
-
memory/1388-239-0x0000000076930000-0x0000000076977000-memory.dmpFilesize
284KB
-
memory/1388-221-0x0000000000E50000-0x0000000001195000-memory.dmpFilesize
3.3MB
-
memory/1388-204-0x0000000000160000-0x00000000001A6000-memory.dmpFilesize
280KB
-
memory/1388-225-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1388-223-0x0000000000E50000-0x0000000001195000-memory.dmpFilesize
3.3MB
-
memory/1388-205-0x0000000074150000-0x000000007419A000-memory.dmpFilesize
296KB
-
memory/1396-184-0x0000000002670000-0x0000000002686000-memory.dmpFilesize
88KB
-
memory/1512-260-0x0000000000340000-0x00000000003EC000-memory.dmpFilesize
688KB
-
memory/1512-259-0x000000000060F000-0x000000000067B000-memory.dmpFilesize
432KB
-
memory/1512-261-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/1512-191-0x000000000060F000-0x000000000067B000-memory.dmpFilesize
432KB
-
memory/1544-196-0x00000000005F0000-0x0000000000650000-memory.dmpFilesize
384KB
-
memory/1544-194-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1644-163-0x0000000000400000-0x00000000008F7000-memory.dmpFilesize
5.0MB
-
memory/1644-161-0x00000000001D0000-0x00000000001D9000-memory.dmpFilesize
36KB
-
memory/1644-160-0x0000000000340000-0x000000000034F000-memory.dmpFilesize
60KB
-
memory/1644-145-0x0000000000340000-0x000000000034F000-memory.dmpFilesize
60KB
-
memory/1680-142-0x0000000073930000-0x000000007401E000-memory.dmpFilesize
6.9MB
-
memory/1680-141-0x00000000010B0000-0x0000000001116000-memory.dmpFilesize
408KB
-
memory/1804-144-0x00000000002C0000-0x00000000002DC000-memory.dmpFilesize
112KB
-
memory/1804-125-0x0000000001130000-0x0000000001150000-memory.dmpFilesize
128KB
-
memory/1804-155-0x000000001B280000-0x000000001B282000-memory.dmpFilesize
8KB
-
memory/1804-146-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmpFilesize
9.9MB
-
memory/1900-253-0x0000000000400000-0x0000000000529000-memory.dmpFilesize
1.2MB
-
memory/1900-255-0x0000000000AB0000-0x0000000000B10000-memory.dmpFilesize
384KB
-
memory/2024-170-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2024-177-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2024-168-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2024-166-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2024-164-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2024-172-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2024-175-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2024-182-0x0000000001030000-0x0000000001031000-memory.dmpFilesize
4KB
-
memory/2024-181-0x0000000073930000-0x000000007401E000-memory.dmpFilesize
6.9MB
-
memory/2080-220-0x0000000000AB0000-0x0000000000B10000-memory.dmpFilesize
384KB
-
memory/2080-216-0x0000000000400000-0x00000000005DF000-memory.dmpFilesize
1.9MB
-
memory/2228-203-0x0000000000110000-0x0000000000130000-memory.dmpFilesize
128KB
-
memory/2228-292-0x0000000004590000-0x0000000004591000-memory.dmpFilesize
4KB
-
memory/2228-208-0x0000000073930000-0x000000007401E000-memory.dmpFilesize
6.9MB
-
memory/2236-247-0x00000000005DA000-0x00000000005DC000-memory.dmpFilesize
8KB
-
memory/2252-207-0x0000000074150000-0x000000007419A000-memory.dmpFilesize
296KB
-
memory/2252-213-0x0000000001360000-0x00000000016C2000-memory.dmpFilesize
3.4MB
-
memory/2252-217-0x0000000001360000-0x00000000016C2000-memory.dmpFilesize
3.4MB
-
memory/2252-251-0x0000000076930000-0x0000000076977000-memory.dmpFilesize
284KB
-
memory/2252-230-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/2252-209-0x00000000003E0000-0x0000000000426000-memory.dmpFilesize
280KB
-
memory/2260-243-0x0000000001290000-0x000000000173C000-memory.dmpFilesize
4.7MB
-
memory/2260-265-0x00000000055D0000-0x00000000055D1000-memory.dmpFilesize
4KB
-
memory/2260-268-0x0000000000DA0000-0x0000000000DBC000-memory.dmpFilesize
112KB
-
memory/2260-270-0x0000000000BB0000-0x0000000000BC0000-memory.dmpFilesize
64KB
-
memory/2260-272-0x0000000000D20000-0x0000000000D30000-memory.dmpFilesize
64KB
-
memory/2260-282-0x0000000000D40000-0x0000000000D4C000-memory.dmpFilesize
48KB
-
memory/2260-284-0x0000000000D50000-0x0000000000D62000-memory.dmpFilesize
72KB
-
memory/2260-248-0x0000000001290000-0x000000000173C000-memory.dmpFilesize
4.7MB
-
memory/2260-294-0x0000000000E20000-0x0000000000E28000-memory.dmpFilesize
32KB
-
memory/2260-245-0x0000000073930000-0x000000007401E000-memory.dmpFilesize
6.9MB
-
memory/2340-231-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/2340-228-0x0000000000280000-0x0000000000312000-memory.dmpFilesize
584KB
-
memory/2340-226-0x0000000000240000-0x0000000000267000-memory.dmpFilesize
156KB