Analysis
-
max time kernel
166s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-05-2022 07:53
Static task
static1
Behavioral task
behavioral1
Sample
e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe
Resource
win10v2004-20220414-en
General
-
Target
e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe
-
Size
307KB
-
MD5
ee7e3d6206b8c815c7e3c30bd40e00cc
-
SHA1
c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
-
SHA256
e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
-
SHA512
7a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
Malware Config
Extracted
amadey
3.08
185.215.113.35/d2VxjasuwS/index.php
Extracted
redline
testid
45.147.230.125:14422
-
auth_value
3d3327cccfe43832bb9f6cd3da31d385
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1404-75-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1404-76-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1404-77-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1404-78-0x000000000041ADB2-mapping.dmp family_redline behavioral1/memory/1404-82-0x0000000000402000-0x000000000041BC00-memory.dmp family_redline behavioral1/memory/1404-81-0x0000000000402000-0x000000000041BC00-memory.dmp family_redline -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 52 948 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
ftewk.exeftewk.exeftewk.exeftewk.exepid process 1220 ftewk.exe 1404 ftewk.exe 292 ftewk.exe 1500 ftewk.exe -
Loads dropped DLL 7 IoCs
Processes:
e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exeftewk.exerundll32.exepid process 908 e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe 908 e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe 1220 ftewk.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ftewk.exedescription pid process target process PID 1220 set thread context of 1404 1220 ftewk.exe ftewk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "359546813" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd400000000020000000000106600000001000020000000110b63f4eaccffbee16acd803ab6668765ebb548a92635c248cedf393bb4362a000000000e8000000002000020000000659eef8a8ec9869aa8e0235f5c0fb3a31c966895a1c2ece335f51751a49acf51200000005932d22eb3e5ff824c7e36c5283e0b139c42df51849dbb964f8449179c21d5d640000000f7cb4e715f72fdda2a11e8f363ec5ca89143578f674abdd44407acdd53bfd365226c2dee0db5354c5112669c8b4c9212a762ef4d9c0e02deae8bb623da41c362 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06b6093d569d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A39A9861-D5C8-11EC-9716-7E3B55B31640} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Processes:
ftewk.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ftewk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ftewk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ftewk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 ftewk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ftewk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ftewk.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1552 iexplore.exe 1552 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exeftewk.execmd.exeftewk.exeiexplore.exetaskeng.exedescription pid process target process PID 908 wrote to memory of 1220 908 e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe ftewk.exe PID 908 wrote to memory of 1220 908 e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe ftewk.exe PID 908 wrote to memory of 1220 908 e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe ftewk.exe PID 908 wrote to memory of 1220 908 e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe ftewk.exe PID 1220 wrote to memory of 1732 1220 ftewk.exe cmd.exe PID 1220 wrote to memory of 1732 1220 ftewk.exe cmd.exe PID 1220 wrote to memory of 1732 1220 ftewk.exe cmd.exe PID 1220 wrote to memory of 1732 1220 ftewk.exe cmd.exe PID 1220 wrote to memory of 1208 1220 ftewk.exe schtasks.exe PID 1220 wrote to memory of 1208 1220 ftewk.exe schtasks.exe PID 1220 wrote to memory of 1208 1220 ftewk.exe schtasks.exe PID 1220 wrote to memory of 1208 1220 ftewk.exe schtasks.exe PID 1732 wrote to memory of 1796 1732 cmd.exe reg.exe PID 1732 wrote to memory of 1796 1732 cmd.exe reg.exe PID 1732 wrote to memory of 1796 1732 cmd.exe reg.exe PID 1732 wrote to memory of 1796 1732 cmd.exe reg.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1220 wrote to memory of 1404 1220 ftewk.exe ftewk.exe PID 1404 wrote to memory of 1552 1404 ftewk.exe iexplore.exe PID 1404 wrote to memory of 1552 1404 ftewk.exe iexplore.exe PID 1404 wrote to memory of 1552 1404 ftewk.exe iexplore.exe PID 1404 wrote to memory of 1552 1404 ftewk.exe iexplore.exe PID 1552 wrote to memory of 1800 1552 iexplore.exe IEXPLORE.EXE PID 1552 wrote to memory of 1800 1552 iexplore.exe IEXPLORE.EXE PID 1552 wrote to memory of 1800 1552 iexplore.exe IEXPLORE.EXE PID 1552 wrote to memory of 1800 1552 iexplore.exe IEXPLORE.EXE PID 1536 wrote to memory of 292 1536 taskeng.exe ftewk.exe PID 1536 wrote to memory of 292 1536 taskeng.exe ftewk.exe PID 1536 wrote to memory of 292 1536 taskeng.exe ftewk.exe PID 1536 wrote to memory of 292 1536 taskeng.exe ftewk.exe PID 1220 wrote to memory of 948 1220 ftewk.exe rundll32.exe PID 1220 wrote to memory of 948 1220 ftewk.exe rundll32.exe PID 1220 wrote to memory of 948 1220 ftewk.exe rundll32.exe PID 1220 wrote to memory of 948 1220 ftewk.exe rundll32.exe PID 1220 wrote to memory of 948 1220 ftewk.exe rundll32.exe PID 1220 wrote to memory of 948 1220 ftewk.exe rundll32.exe PID 1220 wrote to memory of 948 1220 ftewk.exe rundll32.exe PID 1536 wrote to memory of 1500 1536 taskeng.exe ftewk.exe PID 1536 wrote to memory of 1500 1536 taskeng.exe ftewk.exe PID 1536 wrote to memory of 1500 1536 taskeng.exe ftewk.exe PID 1536 wrote to memory of 1500 1536 taskeng.exe ftewk.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe"C:\Users\Admin\AppData\Local\Temp\e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exe"C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e014321378\3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e014321378\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ftewk.exe /TR "C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exe"C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=ftewk.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.04⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1552 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\9034267ed8b4ad\cred.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
-
C:\Windows\system32\taskeng.exetaskeng.exe {DDD91D8E-DD7F-43F8-BEDB-AACF1EFC8FEF} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeC:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeC:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5b9f21d8db36e88831e5352bb82c438b3
SHA14a3c330954f9f65a2f5fd7e55800e46ce228a3e2
SHA256998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e
SHA512d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5c6934bd1d7fc997d87e76d6945f88fe2
SHA1900819096517ba8319cddcec824feec48ece77c8
SHA256de471443ea6a86a8e32e168cd7801409b7e0438f3f1909d0f0d7f7bf81d9cc3d
SHA512ef50c3acec8fb11d1cb09358923d03d91d6678b1f8370f5fda13ddaff8c9d4e597cf820ce7833e6f9cdcdc308ab1b5183c1f49da51114448bbb4b45b1d1dcbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5e240f9c71a1e08ccc350cbcd36cf94e0
SHA1f6a008de3a466c91c190fcd8fb650818fce32f03
SHA25638b6b53c61f08e3129c2438948d14c12b27cab9c0ae70b53d51a9048fbe0bc04
SHA51238d9e2c7d816df1d529ea3ca0af3a39418e4af5c17f7ee36fe961879c8497982b56fb4961966ffcc907403a937e41e9cf32ae9e2245320c2adad54b6a43dcab9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.datFilesize
21KB
MD5d377c7b92f9f5c93e3f38fb47845ce8a
SHA1dca9537965b2bb14f8189b2276c0df351a88a571
SHA256651cb5121e3752f2bba905324b16ba8f0854749648959ce3e4fc5289694a9026
SHA512121383364d4fdfb961ca3d8bae4fe6e7062faaeeffafdefde6095032d926bb7d5e82b0d41e527f2aff6fe1654c7a41046fcb2ee9250d86dadcb6a168be7ecb5e
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
C:\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
C:\Users\Admin\AppData\Roaming\9034267ed8b4ad\cred.dllFilesize
126KB
MD5d4ca12f7203548519be8455bd836274f
SHA17c8a18a80ba96c3944462f3a68e63b55da0e1bf4
SHA2567bc6a9edc592553dcb9250d70816f511d43a998f95f4e0b2a347dc2b66f897c4
SHA512e2cad4293dbb043c6d563710087e9769beeb130a80319c151e9d81d9c74b0b5017a23c3fec9cdc022b45491dc6aa6499e3898488dc9c8486e1df83e6da28e697
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1H896HX4.txtFilesize
604B
MD5217dbf51ef92ac5e227dafbc0c5eae82
SHA17b3f4d6c3fd99ef32bb442f5b94faf39634f2977
SHA2566b5d94ccbfab5722d08683f582ceab96cf99112b9c83d98e20268c3691a261cf
SHA512aaf70d81807669a1d41e888cb804a9e9aa3449494c790e8dab61a00fa7c8711a22db0134b376ea942ff5a0495d16d28629f3b45aed08e6ac2a2d5e21d26d4f0a
-
\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
\Users\Admin\AppData\Local\Temp\e014321378\ftewk.exeFilesize
307KB
MD5ee7e3d6206b8c815c7e3c30bd40e00cc
SHA1c41bd2e3c0ac545d7ba81e26743ee4f909eccb27
SHA256e085027f0a000f7be4a5ac90460b005d03a4ef4e48579c78b5582f2a99ae6c19
SHA5127a8f98e25c44d6db495eda24247e29696b4bc195566ea5d5fd3f9aedc8c792bedf9ce8d9b826d34e52302a2ab0ec82552a2007f8811688e8f84746c66af807d7
-
\Users\Admin\AppData\Roaming\9034267ed8b4ad\cred.dllFilesize
126KB
MD5d4ca12f7203548519be8455bd836274f
SHA17c8a18a80ba96c3944462f3a68e63b55da0e1bf4
SHA2567bc6a9edc592553dcb9250d70816f511d43a998f95f4e0b2a347dc2b66f897c4
SHA512e2cad4293dbb043c6d563710087e9769beeb130a80319c151e9d81d9c74b0b5017a23c3fec9cdc022b45491dc6aa6499e3898488dc9c8486e1df83e6da28e697
-
\Users\Admin\AppData\Roaming\9034267ed8b4ad\cred.dllFilesize
126KB
MD5d4ca12f7203548519be8455bd836274f
SHA17c8a18a80ba96c3944462f3a68e63b55da0e1bf4
SHA2567bc6a9edc592553dcb9250d70816f511d43a998f95f4e0b2a347dc2b66f897c4
SHA512e2cad4293dbb043c6d563710087e9769beeb130a80319c151e9d81d9c74b0b5017a23c3fec9cdc022b45491dc6aa6499e3898488dc9c8486e1df83e6da28e697
-
\Users\Admin\AppData\Roaming\9034267ed8b4ad\cred.dllFilesize
126KB
MD5d4ca12f7203548519be8455bd836274f
SHA17c8a18a80ba96c3944462f3a68e63b55da0e1bf4
SHA2567bc6a9edc592553dcb9250d70816f511d43a998f95f4e0b2a347dc2b66f897c4
SHA512e2cad4293dbb043c6d563710087e9769beeb130a80319c151e9d81d9c74b0b5017a23c3fec9cdc022b45491dc6aa6499e3898488dc9c8486e1df83e6da28e697
-
\Users\Admin\AppData\Roaming\9034267ed8b4ad\cred.dllFilesize
126KB
MD5d4ca12f7203548519be8455bd836274f
SHA17c8a18a80ba96c3944462f3a68e63b55da0e1bf4
SHA2567bc6a9edc592553dcb9250d70816f511d43a998f95f4e0b2a347dc2b66f897c4
SHA512e2cad4293dbb043c6d563710087e9769beeb130a80319c151e9d81d9c74b0b5017a23c3fec9cdc022b45491dc6aa6499e3898488dc9c8486e1df83e6da28e697
-
memory/292-90-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/292-86-0x0000000000000000-mapping.dmp
-
memory/908-54-0x0000000000528000-0x0000000000547000-memory.dmpFilesize
124KB
-
memory/908-62-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/908-61-0x00000000002C0000-0x00000000002F8000-memory.dmpFilesize
224KB
-
memory/908-60-0x0000000000528000-0x0000000000547000-memory.dmpFilesize
124KB
-
memory/908-55-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/948-91-0x0000000000000000-mapping.dmp
-
memory/1208-66-0x0000000000000000-mapping.dmp
-
memory/1220-69-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1220-58-0x0000000000000000-mapping.dmp
-
memory/1220-63-0x00000000005B8000-0x00000000005D7000-memory.dmpFilesize
124KB
-
memory/1220-68-0x00000000005B8000-0x00000000005D7000-memory.dmpFilesize
124KB
-
memory/1404-76-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1404-75-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1404-73-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1404-72-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1404-81-0x0000000000402000-0x000000000041BC00-memory.dmpFilesize
103KB
-
memory/1404-77-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1404-82-0x0000000000402000-0x000000000041BC00-memory.dmpFilesize
103KB
-
memory/1404-78-0x000000000041ADB2-mapping.dmp
-
memory/1500-103-0x0000000000518000-0x0000000000536000-memory.dmpFilesize
120KB
-
memory/1500-101-0x0000000000518000-0x0000000000536000-memory.dmpFilesize
120KB
-
memory/1500-99-0x0000000000000000-mapping.dmp
-
memory/1500-104-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1732-65-0x0000000000000000-mapping.dmp
-
memory/1796-67-0x0000000000000000-mapping.dmp