Resubmissions
13-03-2023 17:23
230313-vycersdd7z 10Analysis
-
max time kernel
168s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
13-03-2023 17:23
Static task
static1
Behavioral task
behavioral1
Sample
TUNIC Trainer Setup.exe
Resource
win7-20230220-es
General
-
Target
TUNIC Trainer Setup.exe
-
Size
141KB
-
MD5
09cc739c0d7dba742399b097e9045e05
-
SHA1
30c4c3ed5fdfba59f378480a711b6e3abed4e28e
-
SHA256
0628c7952099fcd105059b5c8d3750567e6a2378124d2fb72b56d467809cfd34
-
SHA512
e9c4ec97e72f18cc02869d2195f19f018e08184d9fcafd8ae2eadd16591176c6423794adfbc2d89cd93626c26090e83a846db0f6c8300163cea8f76b02b093a0
-
SSDEEP
3072:Bojm4ILlCI+4COHCyhaEtHZkOpk97oc4ILlCI+4TOHHSafx:Bd+bwaEtHLhiHt
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WeMod.exeWeMod.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\International\Geo\Nation WeMod.exe Key value queried \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\International\Geo\Nation WeMod.exe -
Executes dropped EXE 16 IoCs
Processes:
WeMod-Setup-638143286475796000.exeUpdate.exeSquirrel.exeWeMod.exeUpdate.exeUpdate.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeUpdate.exeWeModAuxiliaryService.exeWeMod.exepid process 1544 WeMod-Setup-638143286475796000.exe 1908 Update.exe 1584 Squirrel.exe 1344 WeMod.exe 2012 Update.exe 828 Update.exe 1424 WeMod.exe 1988 WeMod.exe 1788 WeMod.exe 1764 WeMod.exe 1576 WeMod.exe 1532 WeMod.exe 1512 WeMod.exe 1440 Update.exe 1660 WeModAuxiliaryService.exe 2024 WeMod.exe -
Loads dropped DLL 22 IoCs
Processes:
WeMod-Setup-638143286475796000.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exeWeMod.exepid process 1544 WeMod-Setup-638143286475796000.exe 1344 WeMod.exe 1344 WeMod.exe 1424 WeMod.exe 1988 WeMod.exe 1788 WeMod.exe 1764 WeMod.exe 1988 WeMod.exe 1988 WeMod.exe 1988 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1576 WeMod.exe 1512 WeMod.exe 1764 WeMod.exe 2024 WeMod.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WeMod.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString WeMod.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 WeMod.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WeMod.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WeMod.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WeMod.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 WeMod.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz WeMod.exe -
Processes:
TUNIC Trainer Setup.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage\wemod.com\Total = "35" TUNIC Trainer Setup.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main TUNIC Trainer Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage\wemod.com\NumberOfSubdomains = "1" TUNIC Trainer Setup.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total TUNIC Trainer Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "35" TUNIC Trainer Setup.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage\api.wemod.com TUNIC Trainer Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage\api.wemod.com\ = "35" TUNIC Trainer Setup.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage\wemod.com TUNIC Trainer Setup.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DOMStorage TUNIC Trainer Setup.exe -
Modifies registry class 7 IoCs
Processes:
WeMod.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\wemod\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\WeMod\\app-8.5.0\\WeMod.exe\" \"%1\"" WeMod.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\wemod WeMod.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\wemod\URL Protocol WeMod.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\wemod\ = "URL:wemod" WeMod.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\wemod\shell\open\command WeMod.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\wemod\shell WeMod.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\wemod\shell\open WeMod.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Update.exepid process 1908 Update.exe 1908 Update.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
Processes:
TUNIC Trainer Setup.exeUpdate.exeWeMod.exeWeMod.exedescription pid process Token: SeDebugPrivilege 1304 TUNIC Trainer Setup.exe Token: SeDebugPrivilege 1908 Update.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1512 WeMod.exe Token: SeShutdownPrivilege 1512 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe Token: SeShutdownPrivilege 1424 WeMod.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
TUNIC Trainer Setup.exepid process 1304 TUNIC Trainer Setup.exe 1304 TUNIC Trainer Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
TUNIC Trainer Setup.exeWeMod-Setup-638143286475796000.exeUpdate.exeWeMod.exeUpdate.exeWeMod.exedescription pid process target process PID 1304 wrote to memory of 1544 1304 TUNIC Trainer Setup.exe WeMod-Setup-638143286475796000.exe PID 1304 wrote to memory of 1544 1304 TUNIC Trainer Setup.exe WeMod-Setup-638143286475796000.exe PID 1304 wrote to memory of 1544 1304 TUNIC Trainer Setup.exe WeMod-Setup-638143286475796000.exe PID 1304 wrote to memory of 1544 1304 TUNIC Trainer Setup.exe WeMod-Setup-638143286475796000.exe PID 1304 wrote to memory of 1544 1304 TUNIC Trainer Setup.exe WeMod-Setup-638143286475796000.exe PID 1304 wrote to memory of 1544 1304 TUNIC Trainer Setup.exe WeMod-Setup-638143286475796000.exe PID 1304 wrote to memory of 1544 1304 TUNIC Trainer Setup.exe WeMod-Setup-638143286475796000.exe PID 1544 wrote to memory of 1908 1544 WeMod-Setup-638143286475796000.exe Update.exe PID 1544 wrote to memory of 1908 1544 WeMod-Setup-638143286475796000.exe Update.exe PID 1544 wrote to memory of 1908 1544 WeMod-Setup-638143286475796000.exe Update.exe PID 1544 wrote to memory of 1908 1544 WeMod-Setup-638143286475796000.exe Update.exe PID 1908 wrote to memory of 1584 1908 Update.exe Squirrel.exe PID 1908 wrote to memory of 1584 1908 Update.exe Squirrel.exe PID 1908 wrote to memory of 1584 1908 Update.exe Squirrel.exe PID 1908 wrote to memory of 1344 1908 Update.exe WeMod.exe PID 1908 wrote to memory of 1344 1908 Update.exe WeMod.exe PID 1908 wrote to memory of 1344 1908 Update.exe WeMod.exe PID 1908 wrote to memory of 1344 1908 Update.exe WeMod.exe PID 1344 wrote to memory of 2012 1344 WeMod.exe Update.exe PID 1344 wrote to memory of 2012 1344 WeMod.exe Update.exe PID 1344 wrote to memory of 2012 1344 WeMod.exe Update.exe PID 1344 wrote to memory of 2012 1344 WeMod.exe Update.exe PID 1304 wrote to memory of 828 1304 TUNIC Trainer Setup.exe Update.exe PID 1304 wrote to memory of 828 1304 TUNIC Trainer Setup.exe Update.exe PID 1304 wrote to memory of 828 1304 TUNIC Trainer Setup.exe Update.exe PID 828 wrote to memory of 1424 828 Update.exe WeMod.exe PID 828 wrote to memory of 1424 828 Update.exe WeMod.exe PID 828 wrote to memory of 1424 828 Update.exe WeMod.exe PID 828 wrote to memory of 1424 828 Update.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe PID 1424 wrote to memory of 1988 1424 WeMod.exe WeMod.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TUNIC Trainer Setup.exe"C:\Users\Admin\AppData\Local\Temp\TUNIC Trainer Setup.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WeMod-Setup-638143286475796000.exe"C:\Users\Admin\AppData\Local\Temp\WeMod-Setup-638143286475796000.exe" --silent2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install . --silent3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\Squirrel.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\Squirrel.exe" --updateSelf=C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe" --squirrel-install 8.5.04⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\WeMod\Update.exeC:\Users\Admin\AppData\Local\WeMod\Update.exe --createShortcut WeMod.exe5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\WeMod\Update.exe"C:\Users\Admin\AppData\Local\WeMod\Update.exe" --processStart "WeMod.exe" --process-start-args "wemod://titles/28422?_inst=blm6FCuck7GkKzvx"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe" wemod://titles/28422?_inst=blm6FCuck7GkKzvx3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\WeMod" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=936 --field-trial-handle=1056,i,11536149130517899363,6010721060737996942,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=es --service-sandbox-type=none --force-ui-direction=ltr --user-data-dir="C:\Users\Admin\AppData\Roaming\WeMod" --mojo-platform-channel-handle=1224 --field-trial-handle=1056,i,11536149130517899363,6010721060737996942,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\WeMod" --app-user-model-id=com.squirrel.WeMod.WeMod --app-path="C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=es --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1528 --field-trial-handle=1056,i,11536149130517899363,6010721060737996942,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\resources\app.asar.unpacked\static\unpacked\auxiliary\WeModAuxiliaryService.exeC:\Users\Admin\AppData\Local\WeMod\app-8.5.0\resources\app.asar.unpacked\static\unpacked\auxiliary\WeModAuxiliaryService.exe WeMod\Support_1678731962918_Out5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\WeMod" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2264 --field-trial-handle=1056,i,11536149130517899363,6010721060737996942,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\WeMod\Update.exeC:\Users\Admin\AppData\Local\WeMod\Update.exe --checkForUpdate https://api.wemod.com/client/channels/stable4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\WeMod\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\WeMod.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe"C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\WeMod" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=920 --field-trial-handle=1080,i,6465369619049201478,6802855194110237190,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD5f8c1641bec7b537f886c9b6e1c02ac2b
SHA10a47b91734cbb19d63ab9e8af1c6909da13b6f00
SHA25645a379ee84e797f1326797ac4aea189b01a2ae5a65b682a51ef51e3fa190f082
SHA512f4cf4fd01b58a1ee63aa5ae1a69ff7796e8689a1612335cac3810049d564d668fb2b28f38dbed031e0e57c680dd0b64b5de1cf144612567181efb81fe3828ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5a337ebe21ab2b1493ba7dee8b3555ad4
SHA109f612e6641da8abc81f09d73a1697582b04212a
SHA2569a4408df405117130ba57be00c714207c3c8fb79e936405589d1e1cfc2f7c9cc
SHA512e9dc074cd9a198d6138d6e4bb11e00282d182457c75dae681fb034cc70a5cdd16045db43ef8be6baa19d62318a464a485d761c0642f53c52099c1bcb9c1ef627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD559cf72f8a81b1643d1e4b3b9b1608eb1
SHA1f4c0392ee1606d6bb1a3d8e65328898054eb0d4c
SHA25652df6f4ae725df229cf975b54697466f73e73f433d77d38ca699c610efcc3bc2
SHA5125a01b512e324de535afd53c52e9903829e048890fec41502d623226bc1c36a9d754b464411ad432b76df76d8d79fcaeb4ac0d8bd47be3e40726c8c7b91b9b84a
-
C:\Users\Admin\AppData\Local\SquirrelTemp\RELEASESFilesize
76B
MD50b90c6926befa5dbf6d2d8d97e650ea5
SHA10c8e2327f01a4c6455a42d5f18e56242d2658082
SHA25618fc2d9a4c3405043bcd54b2c8193f1fd110a531b83177b168ba3d25bac8ed11
SHA51224da3d6bddf930d80e04798f5fe60db73748eeeae8238de5bb5a5b7d98df73d66a456159be819d574d5ff5fc6f0663c57ea3044892b810549c26aca168ce8491
-
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exeFilesize
1.8MB
MD51f4c7ac0f30d95edbe542b77bbdb5ed2
SHA1f95163ed631e57fc478fa74f5d31ca5106b5c95b
SHA2566d38745793e383f922f90719d5a9444ddaf9d8a25ae7ad83450a58e4564fe41c
SHA512e9b9aab1dfbef58a1bf6228e3e820f5b8673c73d53ea28b1519f1ba66fe9dab7c8dc3ba78315e73cfc7f28fce04167c6c4badbf191d9ee5df48d306483d7238a
-
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exeFilesize
1.8MB
MD51f4c7ac0f30d95edbe542b77bbdb5ed2
SHA1f95163ed631e57fc478fa74f5d31ca5106b5c95b
SHA2566d38745793e383f922f90719d5a9444ddaf9d8a25ae7ad83450a58e4564fe41c
SHA512e9b9aab1dfbef58a1bf6228e3e820f5b8673c73d53ea28b1519f1ba66fe9dab7c8dc3ba78315e73cfc7f28fce04167c6c4badbf191d9ee5df48d306483d7238a
-
C:\Users\Admin\AppData\Local\SquirrelTemp\WeMod-8.5.0-full.nupkgFilesize
98.1MB
MD5660861f1171364698499519c06c22d57
SHA130142d06e585bfc832f7fe2b9afbb933f928ac6f
SHA2564fe7046f9e17618013c0f8038d607ddac3738cf814ace553724bb20a24e4a34c
SHA5121bc16c595db7f6b7408de8d46c8ba0f2a7869442875624f530ca13c8685c5ddcbb8448c738f1c97c0f2905dc9383689fb7351e4f55df646fe552de664e1a4c6f
-
C:\Users\Admin\AppData\Local\Temp\WeMod-Setup-638143286475796000.exeFilesize
98.9MB
MD50a79ca5414d0b397ed93437a694622bc
SHA1882ce3a09f39a9f2b72b7187d92d37fb9d7de57a
SHA256af93691dcdacad747705b4fd30685b2a3c87edaf30b95db44151905678e3c934
SHA5128d8abe9214e1fd4cbdccb5d51e0b19be6767b915a44aa15dccbfe3770a07cb6d806a35b7ac0cfeb276b21e15189869ac02aaf5938e42e3dbd931c89c81e21dac
-
C:\Users\Admin\AppData\Local\WeMod\Update.exeFilesize
1.8MB
MD51f4c7ac0f30d95edbe542b77bbdb5ed2
SHA1f95163ed631e57fc478fa74f5d31ca5106b5c95b
SHA2566d38745793e383f922f90719d5a9444ddaf9d8a25ae7ad83450a58e4564fe41c
SHA512e9b9aab1dfbef58a1bf6228e3e820f5b8673c73d53ea28b1519f1ba66fe9dab7c8dc3ba78315e73cfc7f28fce04167c6c4badbf191d9ee5df48d306483d7238a
-
C:\Users\Admin\AppData\Local\WeMod\Update.exeFilesize
1.8MB
MD572d640aa4ca25f2e9bb6bf63433a2808
SHA1bc03640081764bf26c9888a252126bf5fa150595
SHA256e5eb13cd6018bfb0b8576f37f1f9001e299a33f95d0fb59366c57cadb4d1afc7
SHA512ad37209d607076706d3eb14d12e3b2b371d4ebe14ecce4a602e9e670f22af7e0de422b3bfab75452ee9ec1619fb4e2856edef3a4ab31bd343be15a8b9ea8ab5f
-
C:\Users\Admin\AppData\Local\WeMod\Update.exeFilesize
1.8MB
MD572d640aa4ca25f2e9bb6bf63433a2808
SHA1bc03640081764bf26c9888a252126bf5fa150595
SHA256e5eb13cd6018bfb0b8576f37f1f9001e299a33f95d0fb59366c57cadb4d1afc7
SHA512ad37209d607076706d3eb14d12e3b2b371d4ebe14ecce4a602e9e670f22af7e0de422b3bfab75452ee9ec1619fb4e2856edef3a4ab31bd343be15a8b9ea8ab5f
-
C:\Users\Admin\AppData\Local\WeMod\WeMod.exeFilesize
536KB
MD517d0bc5867eb50fcb4ccc3462615822c
SHA1f37cdbaf0e5325a7a3c81ff23060c1ef40d113bf
SHA256490772e36140b29c8eaebdaf5476cadc0ac6d88786c801a87cc5752047595b38
SHA512945a09949cbd545558982627c0175a7f4b161dac0d2af931206e768ca182d02df254921ac2b05db18cbdfa81183fe10ee6e319e21bce8be79466cb59cf846cc5
-
C:\Users\Admin\AppData\Local\WeMod\WeMod.exeFilesize
536KB
MD517d0bc5867eb50fcb4ccc3462615822c
SHA1f37cdbaf0e5325a7a3c81ff23060c1ef40d113bf
SHA256490772e36140b29c8eaebdaf5476cadc0ac6d88786c801a87cc5752047595b38
SHA512945a09949cbd545558982627c0175a7f4b161dac0d2af931206e768ca182d02df254921ac2b05db18cbdfa81183fe10ee6e319e21bce8be79466cb59cf846cc5
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\D3DCompiler_47.dllFilesize
3.9MB
MD5ab3be0c427c6e405fad496db1545bd61
SHA176012f31db8618624bc8b563698b2669365e49cb
SHA256827d12e4ed62520b663078bbf26f95dfd106526e66048cf75b5c9612b2fb7ce6
SHA512d1dc2ec77c770c5da99e688d799f88b1e585f8dcf63e6876e237fe7fce6e23b528e6a5ef94ffc68283c60ae4e465ff19d3fd6f2fae5de4504b5479d68cbc4dba
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\Squirrel.exeFilesize
1.8MB
MD572d640aa4ca25f2e9bb6bf63433a2808
SHA1bc03640081764bf26c9888a252126bf5fa150595
SHA256e5eb13cd6018bfb0b8576f37f1f9001e299a33f95d0fb59366c57cadb4d1afc7
SHA512ad37209d607076706d3eb14d12e3b2b371d4ebe14ecce4a602e9e670f22af7e0de422b3bfab75452ee9ec1619fb4e2856edef3a4ab31bd343be15a8b9ea8ab5f
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\WeMod.exeFilesize
127.9MB
MD5f663c2b81feb82e55f4bb297116dae17
SHA16b210465569dc0081950c390b96fb4dcdd79bcbe
SHA25610df644e3ba80f0628e02ab1a102d65d949940fe6b2bb4afe1d43d29b92dcf8f
SHA51273e8fc4b663fdd82c5fc6a61c860dd8cde6c754b7995200e018eaf76c56b51743d53c60b5ab18fedeaea2a380eb49822d2af767c10588203961099b2406c7efc
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\chrome_100_percent.pakFilesize
126KB
MD544a69827d4aa75426f3c577af2f8618e
SHA17bdd115425b05414b64dcdb7d980b92ecd3f15b3
SHA256bca4401b578a6ac0fe793e8519fed82b5444972b7d6c176ec0369ed13beaad7b
SHA5125c7bdf1f1deb72c79b860bf48f16c19cb19b4d861c0b6beb585512ad58b1bc4b64e24edfcd97233e5b91dcd0f63ed1c7b278d22ec062fd0dfe28fe49cae52049
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\chrome_200_percent.pakFilesize
175KB
MD59c379fc04a7bf1a853b14834f58c9f4b
SHA1c105120fd00001c9ebdf2b3b981ecccb02f8eefb
SHA256b2c25fb30fee5f04ccdb8bf3c937a667502d266e428425feeb5af964f6167d48
SHA512f28844dba7780e5f5c9d77ac3d29069dfcd6698447d5723886e510eadd51d6285e06adbda06bf4a69f841afc161c764cb2e5b9ad2c92f0a87176709b4acd2c13
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\icudtl.datFilesize
10.0MB
MD5cf9421b601645bda331c7136a0a9c3f8
SHA19950d66df9022f1caa941ab0e9647636f7b7a286
SHA2568d8a74ca376338623170d59c455476218d5a667d5991a52556aa9c9a70ebc5e5
SHA512bc9601e2b4ab28130bfadfd6f61b3ed500deb0bd235dc5ca94999c09f59d10bdcbf278869a9802f918830041f620c88e2c3b506608ade661db48ccd84c1977eb
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\libegl.dllFilesize
377KB
MD55bd8277192fb288232de03f662ed0b07
SHA1fe304b6b0b809fa8eacd8659c9dbf5439bafa8ca
SHA2569c9fa0503e1c1fba96d5bd3a383216091b5df934df59daf8f965535cca2dd4d5
SHA512c29e4352130167f167844f4ad3e3ee32a871fbdd2dd9ff92a9f0797af85ba97ec659e63eb5373f00152f1f2be64efbf26f779b51a51717b4be2b6f5225f5a4c6
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\libglesv2.dllFilesize
6.2MB
MD5375ab4b0b81c8f408ba618f436734739
SHA1c84064cacb3af0c83e7f393a09b4923587d75290
SHA256d974356a5af23cf5fae75750f7ffa0833100ff59982c1b4c6589597e295cc999
SHA5127e1c2e3e2e40439f5b3d312fb8b50e703beeb22d17b26fdf6ccaf672085b33679c20c84db4df829012466be56d020ccc6ff41c9770b159ad33d0c4f30d4b67d9
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\locales\es.pakFilesize
367KB
MD5c8086dc25cf0a3c978b2c3b37edf8d67
SHA17b6d2ce8b3cc5a33ab2bcd23114fe65ccc568e7a
SHA25611ef2c0229c1fe1c10be08e3d5f36c973bc3c272f37b40e05c534a118757461b
SHA512230e6999a6fea1df3b2708eb331a2c25ca53677b3453745ff9cc7fbbc013b69148af5609166720255a2db7e63b25e2d0c599fb07057a6b47bf61f63ea9db9e01
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\resources.pakFilesize
5.2MB
MD5f24c85d2b898b6b4de118f6a2e63a244
SHA1731adfc20807874b70bda7e2661e66ff6987e069
SHA256aca9267dd8f530135d67240aa897112467bae77cd5fe1a549c69732fdf2803c6
SHA512b49f6a4eb870b01b48b4cfbf5a73c1727cf7847a9505f7c11ce6befdbef868484867f6e0ac66aea8177ca5cab2abba1cae5ac626a8e3f44fc001cac0fe820c61
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\resources\app.asarFilesize
6.5MB
MD5b74477056326a2c0e27a0da6c25422af
SHA1d8f501d8b4c485f46fae9d9f80c0a2bb2afa912f
SHA256ae7368363955d479f3afbd0c0d00c3e22cb0f32fa6b2dcf1a782a94a3dc21df8
SHA51249f7e52847906baa40ba282efd227a2a649d548cdfb42476a9020ae9ad53f308d8aa6d487a194b9208b83bcf545cbea7ae0d3bcd9b294769f132adfde140bd4e
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\resources\app.asar.unpacked\static\unpacked\icon.icoFilesize
279KB
MD534ee19ccd44f31cd831dc50920f19890
SHA124545d2f4741fb5a4649840486ffd3597b7ade5b
SHA256136cf9b3a30268d1d439df7b9fd9104cb1d83be7fd2b562c3e9a47450ae0df3d
SHA512ded8ade93c143dc8abc7a76b03b4015a8637b2ee13b85dd70655d5857289f19ebef76562eace56a3ad3c2418fab5305bb0b6cadd0a412ddb781b8f496e82c74a
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\squirrel.exeFilesize
1.8MB
MD572d640aa4ca25f2e9bb6bf63433a2808
SHA1bc03640081764bf26c9888a252126bf5fa150595
SHA256e5eb13cd6018bfb0b8576f37f1f9001e299a33f95d0fb59366c57cadb4d1afc7
SHA512ad37209d607076706d3eb14d12e3b2b371d4ebe14ecce4a602e9e670f22af7e0de422b3bfab75452ee9ec1619fb4e2856edef3a4ab31bd343be15a8b9ea8ab5f
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\v8_context_snapshot.binFilesize
590KB
MD5dd9ca4878bba782613cba372de1c36f4
SHA12eefcb6fcaa4b2ed717c952895710be5701871a7
SHA256ea33ca96024769386ae0ff100c2ae239507006d7340f1f8bbc5bcfb4195f9226
SHA5120791d3827a6de5745d3424c562b16604cf311ed6fcb4cf62d2c7f54ec0b7f3535b1114e919d2ba6d144cbe9f45418a555ab3fd801078bd8d563a656796f5d4e6
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\vk_swiftshader.dllFilesize
4.2MB
MD5ed9ba505da635589cb5fc6623f6859bd
SHA121fe4f04404fcea097b3f214fd3181f91a56822b
SHA256d605d0c3fce033205c510dc1dae25fc64eb2fc9a3f99c2a8df25eb968a4db763
SHA512842b3c43e334a5fc706ba286fa23f7501854772f58240f14971944361caac5a985a445e565fe5d31aaed97aaea196e3a8c59d5275386d10703cff42384d2f24f
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\vk_swiftshader_icd.jsonFilesize
106B
MD58642dd3a87e2de6e991fae08458e302b
SHA19c06735c31cec00600fd763a92f8112d085bd12a
SHA25632d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f
-
C:\Users\Admin\AppData\Local\WeMod\app-8.5.0\vulkan-1.dllFilesize
754KB
MD5a6826e4c60449ca4b6f4f285ce981260
SHA1c7134e9715c365154882108b9b45b99d6462b785
SHA256a5267fd66fda82bc09aa71cfd7fa138e606178769548482fbff2fd0a80e4b795
SHA512cb664e0b29185e00aff14167305db3e63a4e91a0053183d5463caa0d735250b57dc6a8412850b8a4ad2c2145ccb21423b22d0ce7e76e6a995e37f3af801f46d9
-
C:\Users\Admin\AppData\Local\WeMod\packages\RELEASESFilesize
76B
MD50b90c6926befa5dbf6d2d8d97e650ea5
SHA10c8e2327f01a4c6455a42d5f18e56242d2658082
SHA25618fc2d9a4c3405043bcd54b2c8193f1fd110a531b83177b168ba3d25bac8ed11
SHA51224da3d6bddf930d80e04798f5fe60db73748eeeae8238de5bb5a5b7d98df73d66a456159be819d574d5ff5fc6f0663c57ea3044892b810549c26aca168ce8491
-
C:\Users\Admin\AppData\Local\WeMod\packages\RELEASESFilesize
76B
MD50b90c6926befa5dbf6d2d8d97e650ea5
SHA10c8e2327f01a4c6455a42d5f18e56242d2658082
SHA25618fc2d9a4c3405043bcd54b2c8193f1fd110a531b83177b168ba3d25bac8ed11
SHA51224da3d6bddf930d80e04798f5fe60db73748eeeae8238de5bb5a5b7d98df73d66a456159be819d574d5ff5fc6f0663c57ea3044892b810549c26aca168ce8491
-
C:\Users\Admin\AppData\Local\WeMod\packages\RELEASESFilesize
76B
MD50b90c6926befa5dbf6d2d8d97e650ea5
SHA10c8e2327f01a4c6455a42d5f18e56242d2658082
SHA25618fc2d9a4c3405043bcd54b2c8193f1fd110a531b83177b168ba3d25bac8ed11
SHA51224da3d6bddf930d80e04798f5fe60db73748eeeae8238de5bb5a5b7d98df73d66a456159be819d574d5ff5fc6f0663c57ea3044892b810549c26aca168ce8491
-
C:\Users\Admin\AppData\Local\WeMod\packages\WeMod-8.5.0-full.nupkgFilesize
98.1MB
MD5660861f1171364698499519c06c22d57
SHA130142d06e585bfc832f7fe2b9afbb933f928ac6f
SHA2564fe7046f9e17618013c0f8038d607ddac3738cf814ace553724bb20a24e4a34c
SHA5121bc16c595db7f6b7408de8d46c8ba0f2a7869442875624f530ca13c8685c5ddcbb8448c738f1c97c0f2905dc9383689fb7351e4f55df646fe552de664e1a4c6f
-
C:\Users\Admin\AppData\Local\WeMod\packages\WeMod-8.5.0-full.nupkgFilesize
98.1MB
MD5660861f1171364698499519c06c22d57
SHA130142d06e585bfc832f7fe2b9afbb933f928ac6f
SHA2564fe7046f9e17618013c0f8038d607ddac3738cf814ace553724bb20a24e4a34c
SHA5121bc16c595db7f6b7408de8d46c8ba0f2a7869442875624f530ca13c8685c5ddcbb8448c738f1c97c0f2905dc9383689fb7351e4f55df646fe552de664e1a4c6f
-
C:\Users\Admin\AppData\Local\WeMod\update.exeFilesize
1.8MB
MD51f4c7ac0f30d95edbe542b77bbdb5ed2
SHA1f95163ed631e57fc478fa74f5d31ca5106b5c95b
SHA2566d38745793e383f922f90719d5a9444ddaf9d8a25ae7ad83450a58e4564fe41c
SHA512e9b9aab1dfbef58a1bf6228e3e820f5b8673c73d53ea28b1519f1ba66fe9dab7c8dc3ba78315e73cfc7f28fce04167c6c4badbf191d9ee5df48d306483d7238a
-
C:\Users\Admin\AppData\Roaming\WeMod\DawnCache\data_0Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Roaming\WeMod\DawnCache\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Roaming\WeMod\DawnCache\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Roaming\WeMod\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Roaming\WeMod\Local StateFilesize
389B
MD56d5c207cbc1197bcc11dff1ca083585d
SHA1fca57c33b005ab35b6b0d96ae53676a0a6056a58
SHA256d299a9b5c67c2ac6777a5937a5f694d90bc2aba8015fddabb6fd892a5c846fe2
SHA5126ee23278a9b235b8bc61f8f28b5ac060fd88e1aae64557c3209c8229c2899a53b6970f4278a7dfbfa112034a9f394d761ee417c645b6abe5a72a6f102ecd9c42
-
C:\Users\Admin\AppData\Roaming\WeMod\Local Storage\leveldb\CURRENT~RF6d980c.TMPFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
\Users\Admin\AppData\Local\SquirrelTemp\Update.exeFilesize
1.8MB
MD51f4c7ac0f30d95edbe542b77bbdb5ed2
SHA1f95163ed631e57fc478fa74f5d31ca5106b5c95b
SHA2566d38745793e383f922f90719d5a9444ddaf9d8a25ae7ad83450a58e4564fe41c
SHA512e9b9aab1dfbef58a1bf6228e3e820f5b8673c73d53ea28b1519f1ba66fe9dab7c8dc3ba78315e73cfc7f28fce04167c6c4badbf191d9ee5df48d306483d7238a
-
\Users\Admin\AppData\Local\WeMod\Update.exeFilesize
1.8MB
MD51f4c7ac0f30d95edbe542b77bbdb5ed2
SHA1f95163ed631e57fc478fa74f5d31ca5106b5c95b
SHA2566d38745793e383f922f90719d5a9444ddaf9d8a25ae7ad83450a58e4564fe41c
SHA512e9b9aab1dfbef58a1bf6228e3e820f5b8673c73d53ea28b1519f1ba66fe9dab7c8dc3ba78315e73cfc7f28fce04167c6c4badbf191d9ee5df48d306483d7238a
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\d3dcompiler_47.dllFilesize
3.9MB
MD5ab3be0c427c6e405fad496db1545bd61
SHA176012f31db8618624bc8b563698b2669365e49cb
SHA256827d12e4ed62520b663078bbf26f95dfd106526e66048cf75b5c9612b2fb7ce6
SHA512d1dc2ec77c770c5da99e688d799f88b1e585f8dcf63e6876e237fe7fce6e23b528e6a5ef94ffc68283c60ae4e465ff19d3fd6f2fae5de4504b5479d68cbc4dba
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\d3dcompiler_47.dllFilesize
3.9MB
MD5ab3be0c427c6e405fad496db1545bd61
SHA176012f31db8618624bc8b563698b2669365e49cb
SHA256827d12e4ed62520b663078bbf26f95dfd106526e66048cf75b5c9612b2fb7ce6
SHA512d1dc2ec77c770c5da99e688d799f88b1e585f8dcf63e6876e237fe7fce6e23b528e6a5ef94ffc68283c60ae4e465ff19d3fd6f2fae5de4504b5479d68cbc4dba
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\ffmpeg.dllFilesize
2.4MB
MD5fe1bd381ac07068295f1990e794ada6c
SHA13a8c8cfa51d33453392f776be88b9bec50d561ad
SHA25693f1c82567e50b17ae3270e748d3b1456b260cb718cd20f49b4197c864b1a464
SHA51278ef7486cc8ddb940c4b3710dd567b9918daea06b4e86740a2fc51a0384638c0bafbadd40d3e37f99af1bf8e5bd1c951f1c1ea3d876494a4d323834f330c781f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\libEGL.dllFilesize
377KB
MD55bd8277192fb288232de03f662ed0b07
SHA1fe304b6b0b809fa8eacd8659c9dbf5439bafa8ca
SHA2569c9fa0503e1c1fba96d5bd3a383216091b5df934df59daf8f965535cca2dd4d5
SHA512c29e4352130167f167844f4ad3e3ee32a871fbdd2dd9ff92a9f0797af85ba97ec659e63eb5373f00152f1f2be64efbf26f779b51a51717b4be2b6f5225f5a4c6
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\libEGL.dllFilesize
377KB
MD55bd8277192fb288232de03f662ed0b07
SHA1fe304b6b0b809fa8eacd8659c9dbf5439bafa8ca
SHA2569c9fa0503e1c1fba96d5bd3a383216091b5df934df59daf8f965535cca2dd4d5
SHA512c29e4352130167f167844f4ad3e3ee32a871fbdd2dd9ff92a9f0797af85ba97ec659e63eb5373f00152f1f2be64efbf26f779b51a51717b4be2b6f5225f5a4c6
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\libGLESv2.dllFilesize
6.2MB
MD5375ab4b0b81c8f408ba618f436734739
SHA1c84064cacb3af0c83e7f393a09b4923587d75290
SHA256d974356a5af23cf5fae75750f7ffa0833100ff59982c1b4c6589597e295cc999
SHA5127e1c2e3e2e40439f5b3d312fb8b50e703beeb22d17b26fdf6ccaf672085b33679c20c84db4df829012466be56d020ccc6ff41c9770b159ad33d0c4f30d4b67d9
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\libGLESv2.dllFilesize
6.2MB
MD5375ab4b0b81c8f408ba618f436734739
SHA1c84064cacb3af0c83e7f393a09b4923587d75290
SHA256d974356a5af23cf5fae75750f7ffa0833100ff59982c1b4c6589597e295cc999
SHA5127e1c2e3e2e40439f5b3d312fb8b50e703beeb22d17b26fdf6ccaf672085b33679c20c84db4df829012466be56d020ccc6ff41c9770b159ad33d0c4f30d4b67d9
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\vk_swiftshader.dllFilesize
4.2MB
MD5ed9ba505da635589cb5fc6623f6859bd
SHA121fe4f04404fcea097b3f214fd3181f91a56822b
SHA256d605d0c3fce033205c510dc1dae25fc64eb2fc9a3f99c2a8df25eb968a4db763
SHA512842b3c43e334a5fc706ba286fa23f7501854772f58240f14971944361caac5a985a445e565fe5d31aaed97aaea196e3a8c59d5275386d10703cff42384d2f24f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\vk_swiftshader.dllFilesize
4.2MB
MD5ed9ba505da635589cb5fc6623f6859bd
SHA121fe4f04404fcea097b3f214fd3181f91a56822b
SHA256d605d0c3fce033205c510dc1dae25fc64eb2fc9a3f99c2a8df25eb968a4db763
SHA512842b3c43e334a5fc706ba286fa23f7501854772f58240f14971944361caac5a985a445e565fe5d31aaed97aaea196e3a8c59d5275386d10703cff42384d2f24f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\vk_swiftshader.dllFilesize
4.2MB
MD5ed9ba505da635589cb5fc6623f6859bd
SHA121fe4f04404fcea097b3f214fd3181f91a56822b
SHA256d605d0c3fce033205c510dc1dae25fc64eb2fc9a3f99c2a8df25eb968a4db763
SHA512842b3c43e334a5fc706ba286fa23f7501854772f58240f14971944361caac5a985a445e565fe5d31aaed97aaea196e3a8c59d5275386d10703cff42384d2f24f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\vk_swiftshader.dllFilesize
4.2MB
MD5ed9ba505da635589cb5fc6623f6859bd
SHA121fe4f04404fcea097b3f214fd3181f91a56822b
SHA256d605d0c3fce033205c510dc1dae25fc64eb2fc9a3f99c2a8df25eb968a4db763
SHA512842b3c43e334a5fc706ba286fa23f7501854772f58240f14971944361caac5a985a445e565fe5d31aaed97aaea196e3a8c59d5275386d10703cff42384d2f24f
-
\Users\Admin\AppData\Local\WeMod\app-8.5.0\vulkan-1.dllFilesize
754KB
MD5a6826e4c60449ca4b6f4f285ce981260
SHA1c7134e9715c365154882108b9b45b99d6462b785
SHA256a5267fd66fda82bc09aa71cfd7fa138e606178769548482fbff2fd0a80e4b795
SHA512cb664e0b29185e00aff14167305db3e63a4e91a0053183d5463caa0d735250b57dc6a8412850b8a4ad2c2145ccb21423b22d0ce7e76e6a995e37f3af801f46d9
-
memory/828-282-0x0000000000860000-0x0000000000A3C000-memory.dmpFilesize
1.9MB
-
memory/1304-56-0x000000001B190000-0x000000001B210000-memory.dmpFilesize
512KB
-
memory/1304-57-0x000000001B190000-0x000000001B210000-memory.dmpFilesize
512KB
-
memory/1304-55-0x000000001B190000-0x000000001B210000-memory.dmpFilesize
512KB
-
memory/1304-119-0x000000001B190000-0x000000001B210000-memory.dmpFilesize
512KB
-
memory/1304-95-0x0000000021FF0000-0x0000000022796000-memory.dmpFilesize
7.6MB
-
memory/1304-140-0x000000001B190000-0x000000001B210000-memory.dmpFilesize
512KB
-
memory/1304-120-0x000000001B190000-0x000000001B210000-memory.dmpFilesize
512KB
-
memory/1304-54-0x0000000000A00000-0x0000000000A26000-memory.dmpFilesize
152KB
-
memory/1424-344-0x000000000B7F0000-0x000000000B7F1000-memory.dmpFilesize
4KB
-
memory/1440-472-0x0000000000A90000-0x0000000000C6C000-memory.dmpFilesize
1.9MB
-
memory/1440-504-0x000000001B260000-0x000000001B2E0000-memory.dmpFilesize
512KB
-
memory/1584-239-0x0000000000110000-0x00000000002EC000-memory.dmpFilesize
1.9MB
-
memory/1660-518-0x000000001ACD0000-0x000000001AD50000-memory.dmpFilesize
512KB
-
memory/1660-499-0x0000000000D20000-0x0000000000E10000-memory.dmpFilesize
960KB
-
memory/1908-137-0x000000001B470000-0x000000001B4F0000-memory.dmpFilesize
512KB
-
memory/1908-134-0x0000000000E60000-0x0000000001036000-memory.dmpFilesize
1.8MB
-
memory/1908-244-0x000000001B470000-0x000000001B4F0000-memory.dmpFilesize
512KB
-
memory/1988-302-0x0000000008400000-0x0000000008401000-memory.dmpFilesize
4KB
-
memory/2012-278-0x0000000000780000-0x0000000000800000-memory.dmpFilesize
512KB
-
memory/2012-261-0x0000000000780000-0x0000000000800000-memory.dmpFilesize
512KB
-
memory/2012-256-0x0000000000370000-0x0000000000546000-memory.dmpFilesize
1.8MB