Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 01:21
Static task
static1
General
-
Target
7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe
-
Size
3.2MB
-
MD5
556412f983de13496bbee4fd87e1a966
-
SHA1
59beeba0a1e82ae41cbfcbec56ba8d30e3702f03
-
SHA256
7140765cd0d5f61bb453f0511e24786e21d950c2cb3b30aa2945ba1846a4e0a5
-
SHA512
10b65535e68a763dd216d246e30927144ffda2d1f5084d27758c1868383fc5386f5c8c08650fd1354d38fd8d5fc082588cee0cedc35dceecec9115ad63c7abbb
-
SSDEEP
98304:JhXlDXkM77yrTrLG7Xk0+G94TksGWQKx7+g:JdVXkM3qrCzk0+G6IshhxCg
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
vidar
39.8
706
https://xeronxikxxx.tumblr.com/
-
profile_id
706
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/824-228-0x0000000000540000-0x0000000000549000-memory.dmp family_smokeloader -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4604-232-0x0000000000680000-0x000000000071D000-memory.dmp family_vidar behavioral2/memory/4604-233-0x0000000000400000-0x0000000000513000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurlpp.dll aspack_v212_v242 -
Executes dropped EXE 14 IoCs
Processes:
setup_installer.exesetup_install.exesahiba_1.exesahiba_2.exesahiba_4.exesahiba_3.exesahiba_5.exesahiba_6.exesahiba_8.exesahiba_7.exesahiba_4.tmpsahiba_1.exeTriste.exe.comTriste.exe.compid process 1008 setup_installer.exe 4524 setup_install.exe 4012 sahiba_1.exe 824 sahiba_2.exe 4780 sahiba_4.exe 4604 sahiba_3.exe 4700 sahiba_5.exe 3296 sahiba_6.exe 1836 sahiba_8.exe 1404 sahiba_7.exe 4084 sahiba_4.tmp 4824 sahiba_1.exe 4928 Triste.exe.com 3864 Triste.exe.com -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
sahiba_7.exe7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exesetup_installer.exesahiba_1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation sahiba_7.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation sahiba_1.exe -
Loads dropped DLL 7 IoCs
Processes:
setup_install.exesahiba_4.tmppid process 4524 setup_install.exe 4524 setup_install.exe 4524 setup_install.exe 4524 setup_install.exe 4524 setup_install.exe 4524 setup_install.exe 4084 sahiba_4.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 ipinfo.io 25 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2448 4524 WerFault.exe setup_install.exe 4776 3340 WerFault.exe dwm.exe 4236 1812 WerFault.exe dwm.exe 3584 3504 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
sahiba_2.exedwm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dwm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
Processes:
dwm.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sahiba_2.exepid process 824 sahiba_2.exe 824 sahiba_2.exe 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
sahiba_2.exepid process 824 sahiba_2.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
Processes:
sahiba_5.exedwm.exedwm.exedescription pid process Token: SeDebugPrivilege 4700 sahiba_5.exe Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeCreateGlobalPrivilege 3340 dwm.exe Token: SeChangeNotifyPrivilege 3340 dwm.exe Token: 33 3340 dwm.exe Token: SeIncBasePriorityPrivilege 3340 dwm.exe Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeCreateGlobalPrivilege 1812 dwm.exe Token: SeChangeNotifyPrivilege 1812 dwm.exe Token: 33 1812 dwm.exe Token: SeIncBasePriorityPrivilege 1812 dwm.exe Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 Token: SeShutdownPrivilege 3092 Token: SeCreatePagefilePrivilege 3092 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
pid process 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 -
Suspicious use of SendNotifyMessage 19 IoCs
Processes:
pid process 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 3092 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exesahiba_4.exesahiba_1.exesahiba_7.execmd.exedescription pid process target process PID 2308 wrote to memory of 1008 2308 7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe setup_installer.exe PID 2308 wrote to memory of 1008 2308 7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe setup_installer.exe PID 2308 wrote to memory of 1008 2308 7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe setup_installer.exe PID 1008 wrote to memory of 4524 1008 setup_installer.exe setup_install.exe PID 1008 wrote to memory of 4524 1008 setup_installer.exe setup_install.exe PID 1008 wrote to memory of 4524 1008 setup_installer.exe setup_install.exe PID 4524 wrote to memory of 3432 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3432 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3432 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4272 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4272 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4272 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3748 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3748 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3748 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 2844 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 2844 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 2844 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3848 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3848 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 3848 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4944 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4944 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4944 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4788 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4788 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4788 4524 setup_install.exe cmd.exe PID 3432 wrote to memory of 4012 3432 cmd.exe sahiba_1.exe PID 3432 wrote to memory of 4012 3432 cmd.exe sahiba_1.exe PID 3432 wrote to memory of 4012 3432 cmd.exe sahiba_1.exe PID 4524 wrote to memory of 4500 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4500 4524 setup_install.exe cmd.exe PID 4524 wrote to memory of 4500 4524 setup_install.exe cmd.exe PID 4272 wrote to memory of 824 4272 cmd.exe sahiba_2.exe PID 4272 wrote to memory of 824 4272 cmd.exe sahiba_2.exe PID 4272 wrote to memory of 824 4272 cmd.exe sahiba_2.exe PID 2844 wrote to memory of 4780 2844 cmd.exe sahiba_4.exe PID 2844 wrote to memory of 4780 2844 cmd.exe sahiba_4.exe PID 2844 wrote to memory of 4780 2844 cmd.exe sahiba_4.exe PID 3748 wrote to memory of 4604 3748 cmd.exe sahiba_3.exe PID 3748 wrote to memory of 4604 3748 cmd.exe sahiba_3.exe PID 3748 wrote to memory of 4604 3748 cmd.exe sahiba_3.exe PID 3848 wrote to memory of 4700 3848 cmd.exe sahiba_5.exe PID 3848 wrote to memory of 4700 3848 cmd.exe sahiba_5.exe PID 4944 wrote to memory of 3296 4944 cmd.exe sahiba_6.exe PID 4944 wrote to memory of 3296 4944 cmd.exe sahiba_6.exe PID 4944 wrote to memory of 3296 4944 cmd.exe sahiba_6.exe PID 4788 wrote to memory of 1404 4788 cmd.exe sahiba_7.exe PID 4788 wrote to memory of 1404 4788 cmd.exe sahiba_7.exe PID 4788 wrote to memory of 1404 4788 cmd.exe sahiba_7.exe PID 4500 wrote to memory of 1836 4500 cmd.exe sahiba_8.exe PID 4500 wrote to memory of 1836 4500 cmd.exe sahiba_8.exe PID 4780 wrote to memory of 4084 4780 sahiba_4.exe sahiba_4.tmp PID 4780 wrote to memory of 4084 4780 sahiba_4.exe sahiba_4.tmp PID 4780 wrote to memory of 4084 4780 sahiba_4.exe sahiba_4.tmp PID 4012 wrote to memory of 4824 4012 sahiba_1.exe sahiba_1.exe PID 4012 wrote to memory of 4824 4012 sahiba_1.exe sahiba_1.exe PID 4012 wrote to memory of 4824 4012 sahiba_1.exe sahiba_1.exe PID 1404 wrote to memory of 3244 1404 sahiba_7.exe cmd.exe PID 1404 wrote to memory of 3244 1404 sahiba_7.exe cmd.exe PID 1404 wrote to memory of 3244 1404 sahiba_7.exe cmd.exe PID 3244 wrote to memory of 4008 3244 cmd.exe cmd.exe PID 3244 wrote to memory of 4008 3244 cmd.exe cmd.exe PID 3244 wrote to memory of 4008 3244 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe"C:\Users\Admin\AppData\Local\Temp\7140765CD0D5F61BB453F0511E24786E21D950C2CB3B3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_3.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_3.exesahiba_3.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_4.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_4.exesahiba_4.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-HICNN.tmp\sahiba_4.tmp"C:\Users\Admin\AppData\Local\Temp\is-HICNN.tmp\sahiba_4.tmp" /SL5="$6004A,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_4.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_5.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_5.exesahiba_5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_8.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_8.exesahiba_8.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_7.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_7.exesahiba_7.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Compatto.rtf6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd7⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^jvMDwkwydQdmnxGPmMOjYlbIlopECWXOZojRKCmISYgoKPYfXOyLKoMeYraSevCxTCAdoOyWjyxqVfYxlTHNQkrRvpTHpGGccUgofIipJpnFNMuJyYIpPPDHnITYVnMGn$" Oggi.rtf8⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.comTriste.exe.com n8⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.com n9⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 308⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_6.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_2.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_1.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 5604⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_2.exesahiba_2.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_6.exesahiba_6.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_1.exesahiba_1.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_1.exe" -a2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4524 -ip 45241⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 476 -p 2760 -ip 27601⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3340 -s 33402⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 564 -p 3340 -ip 33401⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1812 -s 13202⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 564 -p 1812 -ip 18121⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3504 -s 31001⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Compatto.rtfFilesize
478B
MD5b96b1288ce038869fb15d4353f760613
SHA15a6f01cb0546a6dd4ae1e90279aaa82bdd672b60
SHA2562c1458ecd2cc31a6d798a1c6396926cb99a66481832f774dbdbc19594ff9bd40
SHA51236a72a5cac8b1aaa395d9efc2fc79b4525e408c57cebaaf2f00c1ba5b51bc08ee22e5676055cdcc961197c05e41d020c8d74b0d95426095d1a5b04fb14d3b04e
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Incontrati.rtfFilesize
7KB
MD52159edf39246faecd80a5bb1638b0212
SHA144930f0fe67b06a73c57ff56976894632890aa6b
SHA2568dec7534543bc983bcd6965539e3d26de768775ac117a108b545a5b4e3bb3614
SHA51249b34aab60b12e98da6f521adf6d4c3ced8245df327a84b8c39d096fc26916ed95ddc212fb05558cf801213e62b5c40cba6cd5cde321f4d23af8bd7e54694a33
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Oggi.rtfFilesize
872KB
MD5916c4387e392f4f3c300d18dc396b739
SHA1c7b480305599093ed6f88f5d8597fc5facc7cb3e
SHA256d574f83fc092c037db7625e3b2dbe16a4898f9e8ec187c3a5744c699bdb5b75e
SHA5129166b8ff071f067bbd31f39c2201285dc1c2096c693849006554a8ca0201b8d43b2ad0c786b5bb4bdfe897870d0609bc6011aaf8baee1456a473045ea9189584
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.comFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.comFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Troverai.rtfFilesize
703KB
MD57fa88f5686ca445f2a90cb05d761975f
SHA11ffd9e0375a825deb059121951ce81844f97d527
SHA25694b01919c10661d96e0f8ccf05e143b76d94cae3dafc0e5cc7998d22b060ad1a
SHA512379cd229c1a5af95ab3a67943338879e0ef7fc971a51a56ad68997b38a8de69f6694e8e4dc497f174dee46740efd35f580258b29b5ac385c2ae8c837a6d94460
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nFilesize
703KB
MD57fa88f5686ca445f2a90cb05d761975f
SHA11ffd9e0375a825deb059121951ce81844f97d527
SHA25694b01919c10661d96e0f8ccf05e143b76d94cae3dafc0e5cc7998d22b060ad1a
SHA512379cd229c1a5af95ab3a67943338879e0ef7fc971a51a56ad68997b38a8de69f6694e8e4dc497f174dee46740efd35f580258b29b5ac385c2ae8c837a6d94460
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_1.exeFilesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_1.exeFilesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_1.txtFilesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_2.exeFilesize
237KB
MD594fed52e8630b37790927fc7cf29f71c
SHA1d9ba132522803b81eb70ca81f7ff5922fab33527
SHA256640df13e7605d0fd539eaac1474643d4e6ab2f3519cab2450f9b755778dfac6e
SHA512813dd04df910d79c8d480f17ef8d15e74f62a2b339d7df027dbff15c9d37e7187effbf6f528c05ac975de31e352fa26a7ad9918cb599fb48abd1cc04d31a9ed7
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_2.txtFilesize
237KB
MD594fed52e8630b37790927fc7cf29f71c
SHA1d9ba132522803b81eb70ca81f7ff5922fab33527
SHA256640df13e7605d0fd539eaac1474643d4e6ab2f3519cab2450f9b755778dfac6e
SHA512813dd04df910d79c8d480f17ef8d15e74f62a2b339d7df027dbff15c9d37e7187effbf6f528c05ac975de31e352fa26a7ad9918cb599fb48abd1cc04d31a9ed7
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_3.exeFilesize
574KB
MD5e909471f2bf7157b1335d0b64538a83b
SHA12d47775d09ec88ff71da593fed536c8dc2dd6d37
SHA256066ac142f91210ed2fe55e8e7e2b06427c6929c2321205be76b87aa586d263a7
SHA5126aa839b6d723455cc8fdfcfdd2b3e6566d7909d5baa36f82d27b3cdea53b845dcff44f1b58bc4b2e99e53d44cb59cd5e56556289dc3d597d264ba680cf3c815e
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_3.txtFilesize
574KB
MD5e909471f2bf7157b1335d0b64538a83b
SHA12d47775d09ec88ff71da593fed536c8dc2dd6d37
SHA256066ac142f91210ed2fe55e8e7e2b06427c6929c2321205be76b87aa586d263a7
SHA5126aa839b6d723455cc8fdfcfdd2b3e6566d7909d5baa36f82d27b3cdea53b845dcff44f1b58bc4b2e99e53d44cb59cd5e56556289dc3d597d264ba680cf3c815e
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_4.exeFilesize
749KB
MD5751d4acf96a759b5973394c11101407e
SHA161afa61d575550369da62cfb5f857720a4f226e7
SHA256bb271be24f3e60b032f3269aa7b6fe62b8d0c2c2a3ffd57febae6b11c0a8a1fa
SHA512b9adb1753125e7cdfb889e3f6116e37883f49eab0b6136e89230a90279a2c988d3090c6b0b90e182473c4a2b4fcd88e63591e47dfc72f35f68bb6499a099b1a5
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_4.txtFilesize
749KB
MD5751d4acf96a759b5973394c11101407e
SHA161afa61d575550369da62cfb5f857720a4f226e7
SHA256bb271be24f3e60b032f3269aa7b6fe62b8d0c2c2a3ffd57febae6b11c0a8a1fa
SHA512b9adb1753125e7cdfb889e3f6116e37883f49eab0b6136e89230a90279a2c988d3090c6b0b90e182473c4a2b4fcd88e63591e47dfc72f35f68bb6499a099b1a5
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_5.exeFilesize
170KB
MD57236d4e75af20131468a737ae0305905
SHA14e417d45128584cda16f2e6e4cfb3ad3be125662
SHA2566c7d057e00b8ecac9ec9c1bf9ec9584c43f0767d0172d66ad726652268209ff2
SHA51293dfa6c4a5c775bceb1550a8d24a8e273225a325f8d317f118d0cfdd12f94d26dd25f0a4eedf33a28a60675d1772afbae52f529e0f59cb742cb2eea76b37a4a8
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_5.txtFilesize
170KB
MD57236d4e75af20131468a737ae0305905
SHA14e417d45128584cda16f2e6e4cfb3ad3be125662
SHA2566c7d057e00b8ecac9ec9c1bf9ec9584c43f0767d0172d66ad726652268209ff2
SHA51293dfa6c4a5c775bceb1550a8d24a8e273225a325f8d317f118d0cfdd12f94d26dd25f0a4eedf33a28a60675d1772afbae52f529e0f59cb742cb2eea76b37a4a8
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_6.exeFilesize
1.1MB
MD57a99d0912a3371081b8a866c6ff48351
SHA16b1d33d1afec238f49a23be639790145ee0b3dfd
SHA25671f5bb7d9ace05cfb89e95843499c1c19ca1d6c8b1cd66561d24ceb9ffa94862
SHA512623bab73b38f8082212355d30b947b283799a7b79f21debc322f2090270c9bdaedbfb2a26e4389cac9ef74319c86d6c4f71507b2ab32d141fc9d0846c5fb64ff
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_6.txtFilesize
1.1MB
MD57a99d0912a3371081b8a866c6ff48351
SHA16b1d33d1afec238f49a23be639790145ee0b3dfd
SHA25671f5bb7d9ace05cfb89e95843499c1c19ca1d6c8b1cd66561d24ceb9ffa94862
SHA512623bab73b38f8082212355d30b947b283799a7b79f21debc322f2090270c9bdaedbfb2a26e4389cac9ef74319c86d6c4f71507b2ab32d141fc9d0846c5fb64ff
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_7.exeFilesize
882KB
MD5fb9c80b52aee624e19d016c13d56ade0
SHA19d9361947d673cca9155d12d56d6f23d20f164a2
SHA2564363307739b80f6e418170a049b1a4c52e0405161f18588a8330a849ac4a9a62
SHA512c358cef29d681aca0fb4d3d0de64dbc712cded98a1b70f5f93c654c02e3f399b2ac23419801f6fbb6ab6210c1854a14eb5a6b1ce3cbea927118decaf30a93210
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_7.txtFilesize
882KB
MD5fb9c80b52aee624e19d016c13d56ade0
SHA19d9361947d673cca9155d12d56d6f23d20f164a2
SHA2564363307739b80f6e418170a049b1a4c52e0405161f18588a8330a849ac4a9a62
SHA512c358cef29d681aca0fb4d3d0de64dbc712cded98a1b70f5f93c654c02e3f399b2ac23419801f6fbb6ab6210c1854a14eb5a6b1ce3cbea927118decaf30a93210
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_8.exeFilesize
252KB
MD5486a7013f15308af6623d7ab9b558002
SHA17348eec34e1ce51dca83965657d6db4ece50a2e0
SHA2562e11c0fee3c9df36052fd654193e6f5f935d66619c12e5b7ffabf926c20f3389
SHA5128be9d493af0070a9874d9ac52dadb00f22399e33c234c632830cfe212d5593361d12fc71881a7ede272b29752e551e2af3afc9e77845ce0437740c779470a6cd
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\sahiba_8.txtFilesize
252KB
MD5486a7013f15308af6623d7ab9b558002
SHA17348eec34e1ce51dca83965657d6db4ece50a2e0
SHA2562e11c0fee3c9df36052fd654193e6f5f935d66619c12e5b7ffabf926c20f3389
SHA5128be9d493af0070a9874d9ac52dadb00f22399e33c234c632830cfe212d5593361d12fc71881a7ede272b29752e551e2af3afc9e77845ce0437740c779470a6cd
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\setup_install.exeFilesize
287KB
MD5df0ce65445444b063de195ab92c55c61
SHA19d7abc78986145fcf5edb5ad1fd453d3c538a59b
SHA2560364d57699ff7821b74fa298b8553861421c00c304a9c27f902f90e112fb1619
SHA51259aca9fc8dc6c801fef6aa092b9f81ffa13d8763af49f6704d54c456da0b3db658479bb660ae04293f5257a57a58c8a1695892dafce6bffce2c6ccd6eb403c26
-
C:\Users\Admin\AppData\Local\Temp\7zS0F3A4A86\setup_install.exeFilesize
287KB
MD5df0ce65445444b063de195ab92c55c61
SHA19d7abc78986145fcf5edb5ad1fd453d3c538a59b
SHA2560364d57699ff7821b74fa298b8553861421c00c304a9c27f902f90e112fb1619
SHA51259aca9fc8dc6c801fef6aa092b9f81ffa13d8763af49f6704d54c456da0b3db658479bb660ae04293f5257a57a58c8a1695892dafce6bffce2c6ccd6eb403c26
-
C:\Users\Admin\AppData\Local\Temp\is-9IETU.tmp\idp.dllFilesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
C:\Users\Admin\AppData\Local\Temp\is-HICNN.tmp\sahiba_4.tmpFilesize
1.0MB
MD5d7fb40b6dda194f359858305bdfb8cda
SHA19c5be2c80c836b999eaa899efd8af6f70499f2e5
SHA2565f77587b1ad42e5e9a979a9f956e56db5e61c54ea8a3afe4d0dac9a51e0ee162
SHA51243d5c7b6c5906b625e819fee189017633dad2b99e2928042c31053ac6b4a5e37dc50f40f81fd24e2d657f24291b22f623be008341a77ab99767177c00d782448
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
3.2MB
MD5d95bc24372683e79b6e64692fec36ce7
SHA1e68f3e3bf13589534534775314f0a8d0c9ae260f
SHA256280c314b18ddf2481c1173c653acf508262e0ad3dbf2dfa8b64f48d75bd10765
SHA512b50ee4aa5ba1800fa976913f737b539e1a4fba569d1543662d76ced51294dcb1a3e3be5c20af2991aecb362517294cec74c250de2d7393f6b58013ee71c2ea13
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
3.2MB
MD5d95bc24372683e79b6e64692fec36ce7
SHA1e68f3e3bf13589534534775314f0a8d0c9ae260f
SHA256280c314b18ddf2481c1173c653acf508262e0ad3dbf2dfa8b64f48d75bd10765
SHA512b50ee4aa5ba1800fa976913f737b539e1a4fba569d1543662d76ced51294dcb1a3e3be5c20af2991aecb362517294cec74c250de2d7393f6b58013ee71c2ea13
-
memory/824-229-0x0000000000400000-0x00000000004BF000-memory.dmpFilesize
764KB
-
memory/824-238-0x0000000000400000-0x00000000004BF000-memory.dmpFilesize
764KB
-
memory/824-187-0x0000000000000000-mapping.dmp
-
memory/824-228-0x0000000000540000-0x0000000000549000-memory.dmpFilesize
36KB
-
memory/824-226-0x0000000000568000-0x0000000000579000-memory.dmpFilesize
68KB
-
memory/1008-132-0x0000000000000000-mapping.dmp
-
memory/1404-202-0x0000000000000000-mapping.dmp
-
memory/1836-203-0x0000000000000000-mapping.dmp
-
memory/2844-181-0x0000000000000000-mapping.dmp
-
memory/3012-222-0x0000000000000000-mapping.dmp
-
memory/3244-213-0x0000000000000000-mapping.dmp
-
memory/3296-196-0x0000000000000000-mapping.dmp
-
memory/3432-176-0x0000000000000000-mapping.dmp
-
memory/3748-180-0x0000000000000000-mapping.dmp
-
memory/3848-182-0x0000000000000000-mapping.dmp
-
memory/3864-235-0x0000000000000000-mapping.dmp
-
memory/4008-221-0x0000000000000000-mapping.dmp
-
memory/4012-185-0x0000000000000000-mapping.dmp
-
memory/4084-204-0x0000000000000000-mapping.dmp
-
memory/4272-179-0x0000000000000000-mapping.dmp
-
memory/4500-186-0x0000000000000000-mapping.dmp
-
memory/4524-159-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-177-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4524-165-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4524-164-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-160-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-163-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-162-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-161-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-158-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4524-167-0x00000000007A0000-0x000000000082F000-memory.dmpFilesize
572KB
-
memory/4524-157-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4524-153-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4524-156-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4524-166-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4524-155-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4524-154-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4524-152-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4524-151-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4524-150-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4524-214-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-216-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/4524-217-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/4524-218-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4524-215-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/4524-137-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/4524-135-0x0000000000000000-mapping.dmp
-
memory/4524-178-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/4604-189-0x0000000000000000-mapping.dmp
-
memory/4604-231-0x0000000000738000-0x000000000079D000-memory.dmpFilesize
404KB
-
memory/4604-233-0x0000000000400000-0x0000000000513000-memory.dmpFilesize
1.1MB
-
memory/4604-232-0x0000000000680000-0x000000000071D000-memory.dmpFilesize
628KB
-
memory/4612-234-0x0000000000000000-mapping.dmp
-
memory/4700-208-0x00007FFAB6470000-0x00007FFAB6F31000-memory.dmpFilesize
10.8MB
-
memory/4700-219-0x00007FFAB6470000-0x00007FFAB6F31000-memory.dmpFilesize
10.8MB
-
memory/4700-192-0x0000000000000000-mapping.dmp
-
memory/4700-200-0x0000000000340000-0x0000000000374000-memory.dmpFilesize
208KB
-
memory/4780-201-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4780-188-0x0000000000000000-mapping.dmp
-
memory/4780-212-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4780-195-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/4788-184-0x0000000000000000-mapping.dmp
-
memory/4824-210-0x0000000000000000-mapping.dmp
-
memory/4928-225-0x0000000000000000-mapping.dmp
-
memory/4944-183-0x0000000000000000-mapping.dmp