Analysis
-
max time kernel
4294103s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
15-03-2022 14:22
Static task
static1
Behavioral task
behavioral1
Sample
f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe
Resource
win10v2004-20220310-en
General
-
Target
f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe
-
Size
3.9MB
-
MD5
85a1a5ff3b3bd02ba45c5d11ad7338fe
-
SHA1
f27bf668ec434eec52454913e50e7ecb43821880
-
SHA256
f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12
-
SHA512
132a47426b034ec4446152d43d4e01d4e5c426d447782b36caee7b3a8176990737b51ae22fc947853bca26b2609547ed58f8f21c9a46ae8f4015d10dceaddaaa
Malware Config
Extracted
vidar
39.4
933
https://sergeevih43.tumblr.com/
-
profile_id
933
Extracted
redline
Cana
176.111.174.254:56328
Extracted
redline
Ani
detuyaluro.xyz:80
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1732-185-0x0000000001E30000-0x0000000001E50000-memory.dmp family_redline behavioral1/memory/1732-195-0x0000000001FC0000-0x0000000001FDE000-memory.dmp family_redline behavioral1/memory/832-204-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/832-206-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/832-202-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/832-211-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/832-209-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2360-257-0x00000000010F0000-0x0000000001275000-memory.dmp family_redline behavioral1/memory/2360-258-0x00000000010F0000-0x0000000001275000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/560-182-0x00000000004C0000-0x000000000055D000-memory.dmp family_vidar behavioral1/memory/560-183-0x0000000000400000-0x00000000004B7000-memory.dmp family_vidar -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 23 IoCs
Processes:
setup_installer.exesetup_install.exesahiba_2.exesahiba_1.exesahiba_3.exesahiba_6.exesahiba_9.exesahiba_10.exesahiba_4.exesahiba_8.exesahiba_7.exesahiba_5.exesahiba_5.tmpjfiag3g_gg.exejfiag3g_gg.exesahiba_9.exehZcltiJHJHk7RezcZWR921O7.exeGLkQBbVqWRCOUbvwGGqsHQVH.exeOpME4cD0uUZlQZP4f8Xga3Ji.exe8zS0n6bGnyI9q5JaATn5rER4.exeXVPuX0JZvUGSxMHJCSxCfnN5.exekS0RC3Il5o1xfcQcXF7qIxFC.exe2fFqdlJhnKni1wNkXYmmVZ6T.exepid process 1108 setup_installer.exe 1964 setup_install.exe 796 sahiba_2.exe 524 sahiba_1.exe 560 sahiba_3.exe 1180 sahiba_6.exe 288 sahiba_9.exe 1032 sahiba_10.exe 848 sahiba_4.exe 1732 sahiba_8.exe 1668 sahiba_7.exe 896 sahiba_5.exe 1904 sahiba_5.tmp 324 jfiag3g_gg.exe 1156 jfiag3g_gg.exe 832 sahiba_9.exe 2112 hZcltiJHJHk7RezcZWR921O7.exe 2104 GLkQBbVqWRCOUbvwGGqsHQVH.exe 2164 OpME4cD0uUZlQZP4f8Xga3Ji.exe 2240 8zS0n6bGnyI9q5JaATn5rER4.exe 2232 XVPuX0JZvUGSxMHJCSxCfnN5.exe 2248 kS0RC3Il5o1xfcQcXF7qIxFC.exe 2284 2fFqdlJhnKni1wNkXYmmVZ6T.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
8zS0n6bGnyI9q5JaATn5rER4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8zS0n6bGnyI9q5JaATn5rER4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8zS0n6bGnyI9q5JaATn5rER4.exe -
Loads dropped DLL 64 IoCs
Processes:
f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exesahiba_2.exesahiba_3.exesahiba_9.exesahiba_4.execmd.exesahiba_8.execmd.exesahiba_7.exesahiba_5.exesahiba_5.tmpjfiag3g_gg.exeWerFault.exejfiag3g_gg.exesahiba_9.exepid process 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe 1108 setup_installer.exe 1108 setup_installer.exe 1108 setup_installer.exe 1108 setup_installer.exe 1108 setup_installer.exe 1108 setup_installer.exe 1964 setup_install.exe 1964 setup_install.exe 1964 setup_install.exe 1964 setup_install.exe 1964 setup_install.exe 1964 setup_install.exe 1964 setup_install.exe 1964 setup_install.exe 1896 cmd.exe 1896 cmd.exe 308 cmd.exe 960 cmd.exe 960 cmd.exe 1436 cmd.exe 1332 cmd.exe 1332 cmd.exe 980 cmd.exe 1000 cmd.exe 836 cmd.exe 1000 cmd.exe 796 sahiba_2.exe 796 sahiba_2.exe 560 sahiba_3.exe 560 sahiba_3.exe 288 sahiba_9.exe 288 sahiba_9.exe 848 sahiba_4.exe 848 sahiba_4.exe 792 cmd.exe 1732 sahiba_8.exe 1732 sahiba_8.exe 1564 cmd.exe 1668 sahiba_7.exe 1668 sahiba_7.exe 896 sahiba_5.exe 896 sahiba_5.exe 896 sahiba_5.exe 1904 sahiba_5.tmp 1904 sahiba_5.tmp 1904 sahiba_5.tmp 848 sahiba_4.exe 848 sahiba_4.exe 324 jfiag3g_gg.exe 324 jfiag3g_gg.exe 796 sahiba_2.exe 288 sahiba_9.exe 1592 WerFault.exe 1592 WerFault.exe 1592 WerFault.exe 848 sahiba_4.exe 848 sahiba_4.exe 1156 jfiag3g_gg.exe 1156 jfiag3g_gg.exe 1592 WerFault.exe 832 sahiba_9.exe 832 sahiba_9.exe 1668 sahiba_7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
8zS0n6bGnyI9q5JaATn5rER4.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8zS0n6bGnyI9q5JaATn5rER4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 ip-api.com 4 ipinfo.io 5 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sahiba_9.exedescription pid process target process PID 288 set thread context of 832 288 sahiba_9.exe sahiba_9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1592 560 WerFault.exe sahiba_3.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
sahiba_2.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2896 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2448 taskkill.exe -
Processes:
sahiba_3.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 sahiba_3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 sahiba_3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a sahiba_3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 sahiba_3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e sahiba_3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 sahiba_3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sahiba_2.exejfiag3g_gg.exepid process 796 sahiba_2.exe 796 sahiba_2.exe 1156 jfiag3g_gg.exe 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
sahiba_2.exepid process 796 sahiba_2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
sahiba_10.exesahiba_6.exesahiba_8.exesahiba_9.exedescription pid process Token: SeDebugPrivilege 1032 sahiba_10.exe Token: SeDebugPrivilege 1180 sahiba_6.exe Token: SeShutdownPrivilege 1288 Token: SeDebugPrivilege 1732 sahiba_8.exe Token: SeDebugPrivilege 832 sahiba_9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exesetup_installer.exesetup_install.exedescription pid process target process PID 952 wrote to memory of 1108 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe setup_installer.exe PID 952 wrote to memory of 1108 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe setup_installer.exe PID 952 wrote to memory of 1108 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe setup_installer.exe PID 952 wrote to memory of 1108 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe setup_installer.exe PID 952 wrote to memory of 1108 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe setup_installer.exe PID 952 wrote to memory of 1108 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe setup_installer.exe PID 952 wrote to memory of 1108 952 f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe setup_installer.exe PID 1108 wrote to memory of 1964 1108 setup_installer.exe setup_install.exe PID 1108 wrote to memory of 1964 1108 setup_installer.exe setup_install.exe PID 1108 wrote to memory of 1964 1108 setup_installer.exe setup_install.exe PID 1108 wrote to memory of 1964 1108 setup_installer.exe setup_install.exe PID 1108 wrote to memory of 1964 1108 setup_installer.exe setup_install.exe PID 1108 wrote to memory of 1964 1108 setup_installer.exe setup_install.exe PID 1108 wrote to memory of 1964 1108 setup_installer.exe setup_install.exe PID 1964 wrote to memory of 308 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 308 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 308 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 308 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 308 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 308 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 308 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1896 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1896 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1896 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1896 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1896 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1896 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1896 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 960 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 960 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 960 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 960 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 960 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 960 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 960 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 836 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 836 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 836 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 836 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 836 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 836 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 836 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 792 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 792 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 792 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 792 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 792 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 792 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 792 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1436 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1436 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1436 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1436 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1436 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1436 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1436 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1564 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1564 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1564 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1564 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1564 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1564 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1564 1964 setup_install.exe cmd.exe PID 1964 wrote to memory of 1000 1964 setup_install.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe"C:\Users\Admin\AppData\Local\Temp\f92c41e49e5e9726f48e0577a82640935870c07c5551f0aa7a833d79180a3a12.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_1.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_1.exesahiba_1.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_2.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_2.exesahiba_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_4.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_4.exesahiba_4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_3.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_3.exesahiba_3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 9726⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_10.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_10.exesahiba_10.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_9.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exesahiba_9.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exeC:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_8.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_8.exesahiba_8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_7.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_7.exesahiba_7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Documents\hZcltiJHJHk7RezcZWR921O7.exe"C:\Users\Admin\Documents\hZcltiJHJHk7RezcZWR921O7.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\hZcltiJHJHk7RezcZWR921O7.exe"C:\Users\Admin\Documents\hZcltiJHJHk7RezcZWR921O7.exe"7⤵
-
C:\Users\Admin\Documents\GLkQBbVqWRCOUbvwGGqsHQVH.exe"C:\Users\Admin\Documents\GLkQBbVqWRCOUbvwGGqsHQVH.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\8b1433a8-4fa0-4fa4-b9b5-e7eb405b5fbb\3f36213e-2d8c-4190-bce8-9c07df3d1972.exe"C:\Users\Admin\AppData\Local\Temp\8b1433a8-4fa0-4fa4-b9b5-e7eb405b5fbb\3f36213e-2d8c-4190-bce8-9c07df3d1972.exe" /o /c "Windows-Defender" /r7⤵
-
C:\Users\Admin\AppData\Local\Temp\8b1433a8-4fa0-4fa4-b9b5-e7eb405b5fbb\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\8b1433a8-4fa0-4fa4-b9b5-e7eb405b5fbb\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\8b1433a8-4fa0-4fa4-b9b5-e7eb405b5fbb\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run7⤵
-
C:\Users\Admin\AppData\Local\Temp\8b1433a8-4fa0-4fa4-b9b5-e7eb405b5fbb\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\8b1433a8-4fa0-4fa4-b9b5-e7eb405b5fbb\AdvancedRun.exe" /SpecialRun 4101d8 20248⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\GLkQBbVqWRCOUbvwGGqsHQVH.exe" -Force7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension "exe" -Force7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\GLkQBbVqWRCOUbvwGGqsHQVH.exe" -Force7⤵
-
C:\Users\Admin\Documents\GLkQBbVqWRCOUbvwGGqsHQVH.exe"C:\Users\Admin\Documents\GLkQBbVqWRCOUbvwGGqsHQVH.exe"7⤵
-
C:\Users\Admin\Documents\OpME4cD0uUZlQZP4f8Xga3Ji.exe"C:\Users\Admin\Documents\OpME4cD0uUZlQZP4f8Xga3Ji.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\kS0RC3Il5o1xfcQcXF7qIxFC.exe"C:\Users\Admin\Documents\kS0RC3Il5o1xfcQcXF7qIxFC.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\8zS0n6bGnyI9q5JaATn5rER4.exe"C:\Users\Admin\Documents\8zS0n6bGnyI9q5JaATn5rER4.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Users\Admin\Documents\XVPuX0JZvUGSxMHJCSxCfnN5.exe"C:\Users\Admin\Documents\XVPuX0JZvUGSxMHJCSxCfnN5.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ab9bc5c4-19dc-48af-8c7a-a7a4408970f4.exe"C:\Users\Admin\AppData\Local\Temp\ab9bc5c4-19dc-48af-8c7a-a7a4408970f4.exe"7⤵
-
C:\Users\Admin\Documents\2fFqdlJhnKni1wNkXYmmVZ6T.exe"C:\Users\Admin\Documents\2fFqdlJhnKni1wNkXYmmVZ6T.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\mH2CbisLyGO6jdrCDnNpM1xO.exe"C:\Users\Admin\Documents\mH2CbisLyGO6jdrCDnNpM1xO.exe"6⤵
-
C:\Users\Admin\Documents\rFf1K2dhhkxwNNhWnzXuydLk.exe"C:\Users\Admin\Documents\rFf1K2dhhkxwNNhWnzXuydLk.exe"6⤵
-
C:\Users\Admin\Documents\6kcjq3O0B3sU5zdOnB1k0xKR.exe"C:\Users\Admin\Documents\6kcjq3O0B3sU5zdOnB1k0xKR.exe"6⤵
-
C:\Users\Admin\Documents\OcvvPrJF8oRrxEuRVSkl0q45.exe"C:\Users\Admin\Documents\OcvvPrJF8oRrxEuRVSkl0q45.exe"6⤵
-
C:\Users\Admin\Documents\Pu4zy4rB3AhesvYCvtmUB6Xr.exe"C:\Users\Admin\Documents\Pu4zy4rB3AhesvYCvtmUB6Xr.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Pu4zy4rB3AhesvYCvtmUB6Xr.exe" /f & erase "C:\Users\Admin\Documents\Pu4zy4rB3AhesvYCvtmUB6Xr.exe" & exit7⤵
-
C:\Users\Admin\Documents\MQTVHKHiVBX21yZJSKpIWNsN.exe"C:\Users\Admin\Documents\MQTVHKHiVBX21yZJSKpIWNsN.exe"6⤵
-
C:\Users\Admin\Documents\ccQWgg4sjPXdL_Au3SBhSoDL.exe"C:\Users\Admin\Documents\ccQWgg4sjPXdL_Au3SBhSoDL.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im ccQWgg4sjPXdL_Au3SBhSoDL.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\ccQWgg4sjPXdL_Au3SBhSoDL.exe" & del C:\ProgramData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ccQWgg4sjPXdL_Au3SBhSoDL.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\Documents\_o3uOgBKAKLQvDqMTMDo0Vj_.exe"C:\Users\Admin\Documents\_o3uOgBKAKLQvDqMTMDo0Vj_.exe"6⤵
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Detto.xla7⤵
-
C:\Windows\SysWOW64\cmd.execmd8⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"9⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"9⤵
-
C:\Users\Admin\Documents\Q9hs9qeVRUYB_v7wmVYDi5O9.exe"C:\Users\Admin\Documents\Q9hs9qeVRUYB_v7wmVYDi5O9.exe"6⤵
-
C:\Users\Admin\Documents\YOsw4cUovNqbysyhcSsLxw17.exe"C:\Users\Admin\Documents\YOsw4cUovNqbysyhcSsLxw17.exe"6⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Users\Admin\Documents\jCRqBilzweZDGfphERuQzb9C.exe"C:\Users\Admin\Documents\jCRqBilzweZDGfphERuQzb9C.exe"6⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSCAE.tmp\Install.exe.\Install.exe7⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS423E.tmp\Install.exe.\Install.exe /S /site_id "525403"8⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"9⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&10⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3211⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6411⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gjPsRQinr" /SC once /ST 02:42:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gjPsRQinr"9⤵
-
C:\Users\Admin\Documents\U0Abrwv3VJNsWhDNtiwbCqwn.exe"C:\Users\Admin\Documents\U0Abrwv3VJNsWhDNtiwbCqwn.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_6.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_6.exesahiba_6.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_5.exe4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_5.exesahiba_5.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-H8MCE.tmp\sahiba_5.tmp"C:\Users\Admin\AppData\Local\Temp\is-H8MCE.tmp\sahiba_5.tmp" /SL5="$6011E,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_5.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\taskeng.exetaskeng.exe {290691DF-E9BB-4089-BA17-8A822BDBF841} S-1-5-21-2199625441-3471261906-229485034-1000:DRLQIXCW\Admin:Interactive:[1]1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Defense Evasion
Modify Registry
2Disabling Security Tools
1Virtualization/Sandbox Evasion
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_1.exeMD5
b65276c9e9864815be738ec102f747d4
SHA17b2d710d28b7584a402015b381200af16929a71a
SHA2563f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193
SHA51271af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_1.txtMD5
b65276c9e9864815be738ec102f747d4
SHA17b2d710d28b7584a402015b381200af16929a71a
SHA2563f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193
SHA51271af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_10.exeMD5
15f026de10ed9719180b4ac9cf013060
SHA1126d2fb521d710c93747f30bc4744f920d6543b9
SHA256d5bb1038daf71c40429b13628305b5d10b868325346ca7c611c1dd4f14754636
SHA5125856e492fc68ca7b08ac1fce869ade70a00e790d31f4402e1cd49ff3aee93f3a9dd618cc45288a36f4e32af0debb1f289b8f8f20541cd16bb0754b436891a2e4
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_10.txtMD5
15f026de10ed9719180b4ac9cf013060
SHA1126d2fb521d710c93747f30bc4744f920d6543b9
SHA256d5bb1038daf71c40429b13628305b5d10b868325346ca7c611c1dd4f14754636
SHA5125856e492fc68ca7b08ac1fce869ade70a00e790d31f4402e1cd49ff3aee93f3a9dd618cc45288a36f4e32af0debb1f289b8f8f20541cd16bb0754b436891a2e4
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_2.exeMD5
f24528f915dcd78517baf75519bd8f37
SHA1539cdc98a3fd0fb7b0ea520c013adf0e76ef66e2
SHA2560c6c8e8c2d4a6d4bc2302b8ccc897345556c64b5e0eb231604a969949038cc51
SHA51202c720950466fcbee6d7e6a8facab959c6915a0e5f813c2a932e0bf3eddb8f890ab71843705e632dd9f8b6bcb769604a7a7c40a752c7f518ee628301489ed61e
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_2.txtMD5
f24528f915dcd78517baf75519bd8f37
SHA1539cdc98a3fd0fb7b0ea520c013adf0e76ef66e2
SHA2560c6c8e8c2d4a6d4bc2302b8ccc897345556c64b5e0eb231604a969949038cc51
SHA51202c720950466fcbee6d7e6a8facab959c6915a0e5f813c2a932e0bf3eddb8f890ab71843705e632dd9f8b6bcb769604a7a7c40a752c7f518ee628301489ed61e
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_3.exeMD5
8b8eacc94e94182f764a2707a4fd7b3c
SHA1fb50832681474ad6a813e61b3d23232d508902f6
SHA2561618f410ce4362f38a8c1bc5081f550fa9431f7dea93710f06bd6978ef8b1215
SHA5123567d258389fddcc6156ece44454ea6e11d36ab8fff960a41610de6f9701599a9e8ef85caf9a24088d90087f04d86d27ef14d4e692154127ad793315ebebbb8e
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_3.txtMD5
8b8eacc94e94182f764a2707a4fd7b3c
SHA1fb50832681474ad6a813e61b3d23232d508902f6
SHA2561618f410ce4362f38a8c1bc5081f550fa9431f7dea93710f06bd6978ef8b1215
SHA5123567d258389fddcc6156ece44454ea6e11d36ab8fff960a41610de6f9701599a9e8ef85caf9a24088d90087f04d86d27ef14d4e692154127ad793315ebebbb8e
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_4.txtMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_5.txtMD5
8c4df9d37195987ede03bf8adb495686
SHA1010626025ca791720f85984a842c893b78f439d2
SHA2565207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185
SHA5128fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_6.exeMD5
16c9dde1611731ebe9effd1facec9839
SHA1e5d43d3bfc8fdf9b99e7ae6ee1f820a79909e9b0
SHA2560eeb59191283964857f15bfab13ce4824ff63017334d9b4c70ef038b682b995e
SHA5122d59e2081f9fd4c5593116384b5735f818f6d175855f43448b4fa4938953d3bd394165fa2248b975f3baf921990008972f0faea1d813d23e50b7bff1b0e8ac00
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_6.txtMD5
16c9dde1611731ebe9effd1facec9839
SHA1e5d43d3bfc8fdf9b99e7ae6ee1f820a79909e9b0
SHA2560eeb59191283964857f15bfab13ce4824ff63017334d9b4c70ef038b682b995e
SHA5122d59e2081f9fd4c5593116384b5735f818f6d175855f43448b4fa4938953d3bd394165fa2248b975f3baf921990008972f0faea1d813d23e50b7bff1b0e8ac00
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_7.txtMD5
f8fdccdc4cc17f6781497d69742aeb58
SHA1026edf00ad6a4f77a99a8100060184caeb9a58ba
SHA25697f751d8e067a8ff661e6f4cb0eb7cd3033abdb89d5e87e50581e011ff4f4144
SHA512ee4969810435ab43fd7fe1cfc42667544cdb9766dacca2258cc4a860983b6477a9c8c74e6e41ef6230a89fd016f8f044eb83ca5e96796a6375dacd28e7254ac1
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_8.exeMD5
40d042adff8729d9af2cb5028beba33e
SHA1f24526c84966f1a67eb459f3eecb62ec95f94f29
SHA256a41c0b4f13c1ca772261a32d17ae0911a8df2df3554ccbf736438dd76cbdae20
SHA51204db7a0f430b1e399175d94cca8b93bc1a814f309e10ab4e271fe13dbe63e8088d10a1717c1360813a5b816d51769fd6d2821101783802f7f976b8a49012f960
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_8.txtMD5
40d042adff8729d9af2cb5028beba33e
SHA1f24526c84966f1a67eb459f3eecb62ec95f94f29
SHA256a41c0b4f13c1ca772261a32d17ae0911a8df2df3554ccbf736438dd76cbdae20
SHA51204db7a0f430b1e399175d94cca8b93bc1a814f309e10ab4e271fe13dbe63e8088d10a1717c1360813a5b816d51769fd6d2821101783802f7f976b8a49012f960
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exeMD5
941888d7dc7810199fc9d7fe45b29947
SHA15f384b58763b8d3035a158d6d8d55e001af61c34
SHA256d883da922360a751ea8b780ac7b3a5aedc4b09258fdd2c156bfa60593885071c
SHA5129d0acb24f66115f48a320841f66d1b9efa483f78684d11724541ce650701ac88cf82b5624bae362d036a42b2f177e3d3819926e0bf297502853e5d62302c7967
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.txtMD5
941888d7dc7810199fc9d7fe45b29947
SHA15f384b58763b8d3035a158d6d8d55e001af61c34
SHA256d883da922360a751ea8b780ac7b3a5aedc4b09258fdd2c156bfa60593885071c
SHA5129d0acb24f66115f48a320841f66d1b9efa483f78684d11724541ce650701ac88cf82b5624bae362d036a42b2f177e3d3819926e0bf297502853e5d62302c7967
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
C:\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
77e16d021d55f3effba9d8eb2b3ae843
SHA1af36325b024edd18cdea74ab6a54aa4d5d0cae83
SHA256ab5e7ae7b1b93464bb1dd0aeb0777295de479e6fd434cd273d44d30aadcb0a85
SHA51262dbc57c4eb2d1e42e863a49699151232326e673f0e451dda8271945d1a5ed904dde70618a8c6cae02318967cf9bb3700550a4076dd2bfe3fdba71b3096365c5
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
77e16d021d55f3effba9d8eb2b3ae843
SHA1af36325b024edd18cdea74ab6a54aa4d5d0cae83
SHA256ab5e7ae7b1b93464bb1dd0aeb0777295de479e6fd434cd273d44d30aadcb0a85
SHA51262dbc57c4eb2d1e42e863a49699151232326e673f0e451dda8271945d1a5ed904dde70618a8c6cae02318967cf9bb3700550a4076dd2bfe3fdba71b3096365c5
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\libcurl.dllMD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\libcurlpp.dllMD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\libgcc_s_dw2-1.dllMD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\libstdc++-6.dllMD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\libwinpthread-1.dllMD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_1.exeMD5
b65276c9e9864815be738ec102f747d4
SHA17b2d710d28b7584a402015b381200af16929a71a
SHA2563f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193
SHA51271af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_10.exeMD5
15f026de10ed9719180b4ac9cf013060
SHA1126d2fb521d710c93747f30bc4744f920d6543b9
SHA256d5bb1038daf71c40429b13628305b5d10b868325346ca7c611c1dd4f14754636
SHA5125856e492fc68ca7b08ac1fce869ade70a00e790d31f4402e1cd49ff3aee93f3a9dd618cc45288a36f4e32af0debb1f289b8f8f20541cd16bb0754b436891a2e4
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_2.exeMD5
f24528f915dcd78517baf75519bd8f37
SHA1539cdc98a3fd0fb7b0ea520c013adf0e76ef66e2
SHA2560c6c8e8c2d4a6d4bc2302b8ccc897345556c64b5e0eb231604a969949038cc51
SHA51202c720950466fcbee6d7e6a8facab959c6915a0e5f813c2a932e0bf3eddb8f890ab71843705e632dd9f8b6bcb769604a7a7c40a752c7f518ee628301489ed61e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_2.exeMD5
f24528f915dcd78517baf75519bd8f37
SHA1539cdc98a3fd0fb7b0ea520c013adf0e76ef66e2
SHA2560c6c8e8c2d4a6d4bc2302b8ccc897345556c64b5e0eb231604a969949038cc51
SHA51202c720950466fcbee6d7e6a8facab959c6915a0e5f813c2a932e0bf3eddb8f890ab71843705e632dd9f8b6bcb769604a7a7c40a752c7f518ee628301489ed61e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_2.exeMD5
f24528f915dcd78517baf75519bd8f37
SHA1539cdc98a3fd0fb7b0ea520c013adf0e76ef66e2
SHA2560c6c8e8c2d4a6d4bc2302b8ccc897345556c64b5e0eb231604a969949038cc51
SHA51202c720950466fcbee6d7e6a8facab959c6915a0e5f813c2a932e0bf3eddb8f890ab71843705e632dd9f8b6bcb769604a7a7c40a752c7f518ee628301489ed61e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_2.exeMD5
f24528f915dcd78517baf75519bd8f37
SHA1539cdc98a3fd0fb7b0ea520c013adf0e76ef66e2
SHA2560c6c8e8c2d4a6d4bc2302b8ccc897345556c64b5e0eb231604a969949038cc51
SHA51202c720950466fcbee6d7e6a8facab959c6915a0e5f813c2a932e0bf3eddb8f890ab71843705e632dd9f8b6bcb769604a7a7c40a752c7f518ee628301489ed61e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_3.exeMD5
8b8eacc94e94182f764a2707a4fd7b3c
SHA1fb50832681474ad6a813e61b3d23232d508902f6
SHA2561618f410ce4362f38a8c1bc5081f550fa9431f7dea93710f06bd6978ef8b1215
SHA5123567d258389fddcc6156ece44454ea6e11d36ab8fff960a41610de6f9701599a9e8ef85caf9a24088d90087f04d86d27ef14d4e692154127ad793315ebebbb8e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_3.exeMD5
8b8eacc94e94182f764a2707a4fd7b3c
SHA1fb50832681474ad6a813e61b3d23232d508902f6
SHA2561618f410ce4362f38a8c1bc5081f550fa9431f7dea93710f06bd6978ef8b1215
SHA5123567d258389fddcc6156ece44454ea6e11d36ab8fff960a41610de6f9701599a9e8ef85caf9a24088d90087f04d86d27ef14d4e692154127ad793315ebebbb8e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_3.exeMD5
8b8eacc94e94182f764a2707a4fd7b3c
SHA1fb50832681474ad6a813e61b3d23232d508902f6
SHA2561618f410ce4362f38a8c1bc5081f550fa9431f7dea93710f06bd6978ef8b1215
SHA5123567d258389fddcc6156ece44454ea6e11d36ab8fff960a41610de6f9701599a9e8ef85caf9a24088d90087f04d86d27ef14d4e692154127ad793315ebebbb8e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_3.exeMD5
8b8eacc94e94182f764a2707a4fd7b3c
SHA1fb50832681474ad6a813e61b3d23232d508902f6
SHA2561618f410ce4362f38a8c1bc5081f550fa9431f7dea93710f06bd6978ef8b1215
SHA5123567d258389fddcc6156ece44454ea6e11d36ab8fff960a41610de6f9701599a9e8ef85caf9a24088d90087f04d86d27ef14d4e692154127ad793315ebebbb8e
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_4.exeMD5
5668cb771643274ba2c375ec6403c266
SHA1dd78b03428b99368906fe62fc46aaaf1db07a8b9
SHA256d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
SHA512135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_5.exeMD5
8c4df9d37195987ede03bf8adb495686
SHA1010626025ca791720f85984a842c893b78f439d2
SHA2565207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185
SHA5128fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_6.exeMD5
16c9dde1611731ebe9effd1facec9839
SHA1e5d43d3bfc8fdf9b99e7ae6ee1f820a79909e9b0
SHA2560eeb59191283964857f15bfab13ce4824ff63017334d9b4c70ef038b682b995e
SHA5122d59e2081f9fd4c5593116384b5735f818f6d175855f43448b4fa4938953d3bd394165fa2248b975f3baf921990008972f0faea1d813d23e50b7bff1b0e8ac00
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_8.exeMD5
40d042adff8729d9af2cb5028beba33e
SHA1f24526c84966f1a67eb459f3eecb62ec95f94f29
SHA256a41c0b4f13c1ca772261a32d17ae0911a8df2df3554ccbf736438dd76cbdae20
SHA51204db7a0f430b1e399175d94cca8b93bc1a814f309e10ab4e271fe13dbe63e8088d10a1717c1360813a5b816d51769fd6d2821101783802f7f976b8a49012f960
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_8.exeMD5
40d042adff8729d9af2cb5028beba33e
SHA1f24526c84966f1a67eb459f3eecb62ec95f94f29
SHA256a41c0b4f13c1ca772261a32d17ae0911a8df2df3554ccbf736438dd76cbdae20
SHA51204db7a0f430b1e399175d94cca8b93bc1a814f309e10ab4e271fe13dbe63e8088d10a1717c1360813a5b816d51769fd6d2821101783802f7f976b8a49012f960
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_8.exeMD5
40d042adff8729d9af2cb5028beba33e
SHA1f24526c84966f1a67eb459f3eecb62ec95f94f29
SHA256a41c0b4f13c1ca772261a32d17ae0911a8df2df3554ccbf736438dd76cbdae20
SHA51204db7a0f430b1e399175d94cca8b93bc1a814f309e10ab4e271fe13dbe63e8088d10a1717c1360813a5b816d51769fd6d2821101783802f7f976b8a49012f960
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exeMD5
941888d7dc7810199fc9d7fe45b29947
SHA15f384b58763b8d3035a158d6d8d55e001af61c34
SHA256d883da922360a751ea8b780ac7b3a5aedc4b09258fdd2c156bfa60593885071c
SHA5129d0acb24f66115f48a320841f66d1b9efa483f78684d11724541ce650701ac88cf82b5624bae362d036a42b2f177e3d3819926e0bf297502853e5d62302c7967
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exeMD5
941888d7dc7810199fc9d7fe45b29947
SHA15f384b58763b8d3035a158d6d8d55e001af61c34
SHA256d883da922360a751ea8b780ac7b3a5aedc4b09258fdd2c156bfa60593885071c
SHA5129d0acb24f66115f48a320841f66d1b9efa483f78684d11724541ce650701ac88cf82b5624bae362d036a42b2f177e3d3819926e0bf297502853e5d62302c7967
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exeMD5
941888d7dc7810199fc9d7fe45b29947
SHA15f384b58763b8d3035a158d6d8d55e001af61c34
SHA256d883da922360a751ea8b780ac7b3a5aedc4b09258fdd2c156bfa60593885071c
SHA5129d0acb24f66115f48a320841f66d1b9efa483f78684d11724541ce650701ac88cf82b5624bae362d036a42b2f177e3d3819926e0bf297502853e5d62302c7967
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\sahiba_9.exeMD5
941888d7dc7810199fc9d7fe45b29947
SHA15f384b58763b8d3035a158d6d8d55e001af61c34
SHA256d883da922360a751ea8b780ac7b3a5aedc4b09258fdd2c156bfa60593885071c
SHA5129d0acb24f66115f48a320841f66d1b9efa483f78684d11724541ce650701ac88cf82b5624bae362d036a42b2f177e3d3819926e0bf297502853e5d62302c7967
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
\Users\Admin\AppData\Local\Temp\7zS454E3646\setup_install.exeMD5
5b1cfdacff93439669125b1aca14eb08
SHA1f128e8671ef76ab48393f5171c1175d6e5a0beeb
SHA2568f371da14f97d05f82215b72b7e651aac33bb539681547d6d431a959ac254466
SHA512956b43a2fd78dace5f7b34b4fb2079d9cdeb98f9b23c0d06b6a47fd992b4b9514f98c52cd5bad5fb2cd99c1987bf09dc839dd0ca3d45e983338509f2d956b440
-
\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
77e16d021d55f3effba9d8eb2b3ae843
SHA1af36325b024edd18cdea74ab6a54aa4d5d0cae83
SHA256ab5e7ae7b1b93464bb1dd0aeb0777295de479e6fd434cd273d44d30aadcb0a85
SHA51262dbc57c4eb2d1e42e863a49699151232326e673f0e451dda8271945d1a5ed904dde70618a8c6cae02318967cf9bb3700550a4076dd2bfe3fdba71b3096365c5
-
\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
77e16d021d55f3effba9d8eb2b3ae843
SHA1af36325b024edd18cdea74ab6a54aa4d5d0cae83
SHA256ab5e7ae7b1b93464bb1dd0aeb0777295de479e6fd434cd273d44d30aadcb0a85
SHA51262dbc57c4eb2d1e42e863a49699151232326e673f0e451dda8271945d1a5ed904dde70618a8c6cae02318967cf9bb3700550a4076dd2bfe3fdba71b3096365c5
-
\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
77e16d021d55f3effba9d8eb2b3ae843
SHA1af36325b024edd18cdea74ab6a54aa4d5d0cae83
SHA256ab5e7ae7b1b93464bb1dd0aeb0777295de479e6fd434cd273d44d30aadcb0a85
SHA51262dbc57c4eb2d1e42e863a49699151232326e673f0e451dda8271945d1a5ed904dde70618a8c6cae02318967cf9bb3700550a4076dd2bfe3fdba71b3096365c5
-
\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
77e16d021d55f3effba9d8eb2b3ae843
SHA1af36325b024edd18cdea74ab6a54aa4d5d0cae83
SHA256ab5e7ae7b1b93464bb1dd0aeb0777295de479e6fd434cd273d44d30aadcb0a85
SHA51262dbc57c4eb2d1e42e863a49699151232326e673f0e451dda8271945d1a5ed904dde70618a8c6cae02318967cf9bb3700550a4076dd2bfe3fdba71b3096365c5
-
memory/288-163-0x0000000001060000-0x00000000010C6000-memory.dmpFilesize
408KB
-
memory/288-186-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/288-190-0x0000000002670000-0x0000000002671000-memory.dmpFilesize
4KB
-
memory/560-168-0x00000000002C0000-0x0000000000324000-memory.dmpFilesize
400KB
-
memory/560-181-0x00000000002C0000-0x0000000000324000-memory.dmpFilesize
400KB
-
memory/560-183-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/560-182-0x00000000004C0000-0x000000000055D000-memory.dmpFilesize
628KB
-
memory/796-179-0x00000000002C0000-0x0000000000323000-memory.dmpFilesize
396KB
-
memory/796-164-0x0000000000530000-0x0000000000540000-memory.dmpFilesize
64KB
-
memory/796-178-0x0000000000530000-0x0000000000540000-memory.dmpFilesize
64KB
-
memory/796-180-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/832-209-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/832-206-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/832-214-0x00000000025F0000-0x00000000025F1000-memory.dmpFilesize
4KB
-
memory/832-200-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/832-213-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/832-204-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/832-211-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/832-198-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/832-202-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/896-161-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/896-156-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/952-54-0x00000000760A1000-0x00000000760A3000-memory.dmpFilesize
8KB
-
memory/1032-151-0x00000000008B0000-0x00000000008E2000-memory.dmpFilesize
200KB
-
memory/1032-176-0x0000000000270000-0x0000000000272000-memory.dmpFilesize
8KB
-
memory/1032-184-0x000007FEF5A30000-0x000007FEF641C000-memory.dmpFilesize
9.9MB
-
memory/1032-166-0x0000000000240000-0x0000000000246000-memory.dmpFilesize
24KB
-
memory/1032-169-0x0000000000480000-0x00000000004A4000-memory.dmpFilesize
144KB
-
memory/1032-171-0x0000000000260000-0x0000000000266000-memory.dmpFilesize
24KB
-
memory/1180-167-0x0000000000480000-0x0000000000486000-memory.dmpFilesize
24KB
-
memory/1180-155-0x00000000002F0000-0x0000000000320000-memory.dmpFilesize
192KB
-
memory/1180-170-0x00000000004A0000-0x00000000004C4000-memory.dmpFilesize
144KB
-
memory/1180-172-0x0000000000540000-0x0000000000546000-memory.dmpFilesize
24KB
-
memory/1180-174-0x000007FEF5A30000-0x000007FEF641C000-memory.dmpFilesize
9.9MB
-
memory/1180-177-0x000000001AD70000-0x000000001AD72000-memory.dmpFilesize
8KB
-
memory/1288-207-0x0000000003AE0000-0x0000000003AF5000-memory.dmpFilesize
84KB
-
memory/1732-189-0x0000000000400000-0x0000000000474000-memory.dmpFilesize
464KB
-
memory/1732-188-0x00000000002D0000-0x00000000002FF000-memory.dmpFilesize
188KB
-
memory/1732-173-0x0000000000550000-0x0000000000571000-memory.dmpFilesize
132KB
-
memory/1732-196-0x0000000004894000-0x0000000004896000-memory.dmpFilesize
8KB
-
memory/1732-195-0x0000000001FC0000-0x0000000001FDE000-memory.dmpFilesize
120KB
-
memory/1732-194-0x0000000004893000-0x0000000004894000-memory.dmpFilesize
4KB
-
memory/1732-192-0x0000000004891000-0x0000000004892000-memory.dmpFilesize
4KB
-
memory/1732-193-0x0000000004892000-0x0000000004893000-memory.dmpFilesize
4KB
-
memory/1732-185-0x0000000001E30000-0x0000000001E50000-memory.dmpFilesize
128KB
-
memory/1732-191-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/1732-187-0x0000000000550000-0x0000000000571000-memory.dmpFilesize
132KB
-
memory/1904-175-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1964-85-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1964-92-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1964-91-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1964-93-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1964-94-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1964-153-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1964-154-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1964-157-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1964-159-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1964-90-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1964-89-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/1964-88-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/1964-84-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1964-87-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1964-86-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/1964-160-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/1964-83-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1964-82-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/1964-81-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2104-220-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/2104-219-0x0000000000F10000-0x0000000000FE0000-memory.dmpFilesize
832KB
-
memory/2112-218-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/2112-217-0x00000000002E0000-0x00000000003C8000-memory.dmpFilesize
928KB
-
memory/2112-250-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/2164-223-0x0000000000400000-0x0000000000914000-memory.dmpFilesize
5.1MB
-
memory/2164-222-0x00000000002B0000-0x0000000000310000-memory.dmpFilesize
384KB
-
memory/2232-225-0x0000000000ED0000-0x0000000000EFE000-memory.dmpFilesize
184KB
-
memory/2232-231-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/2232-241-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/2232-235-0x0000000000460000-0x0000000000466000-memory.dmpFilesize
24KB
-
memory/2240-238-0x0000000002130000-0x0000000002190000-memory.dmpFilesize
384KB
-
memory/2240-239-0x0000000000400000-0x00000000007E1000-memory.dmpFilesize
3.9MB
-
memory/2240-240-0x0000000000400000-0x00000000007E1000-memory.dmpFilesize
3.9MB
-
memory/2240-236-0x0000000000400000-0x00000000007E1000-memory.dmpFilesize
3.9MB
-
memory/2240-243-0x0000000000175000-0x0000000000176000-memory.dmpFilesize
4KB
-
memory/2240-244-0x00000000028C0000-0x00000000028C1000-memory.dmpFilesize
4KB
-
memory/2240-246-0x00000000028D0000-0x00000000028D1000-memory.dmpFilesize
4KB
-
memory/2240-248-0x0000000002880000-0x0000000002881000-memory.dmpFilesize
4KB
-
memory/2240-229-0x0000000000400000-0x00000000007E1000-memory.dmpFilesize
3.9MB
-
memory/2284-242-0x00000000002F0000-0x0000000000336000-memory.dmpFilesize
280KB
-
memory/2360-255-0x0000000000180000-0x00000000001C6000-memory.dmpFilesize
280KB
-
memory/2360-257-0x00000000010F0000-0x0000000001275000-memory.dmpFilesize
1.5MB
-
memory/2360-258-0x00000000010F0000-0x0000000001275000-memory.dmpFilesize
1.5MB