Resubmissions

08/12/2024, 23:53

241208-3xp88swmes 10

19/07/2023, 10:01

230719-l2n4asdb6y 10

Analysis

  • max time kernel
    1200s
  • max time network
    1177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2023, 10:01

General

  • Target

    sample.exe

  • Size

    19.1MB

  • MD5

    8ebac20b51430b0cc35cef0bb4343524

  • SHA1

    d73890138f1bac7f87cbb0137a86b000ca1dfdc8

  • SHA256

    0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5

  • SHA512

    0db3f4eb3df46f9811793edd29388fe7c9a36c3c9f94f4f16caaaa70d0a28aa4e8a38ccc96fd57270dab9d23b0313f85aab0808e81c660512bc8abc7d2f90674

  • SSDEEP

    393216:obnSY7czVZQ+jQ3o3xrcJpuEJsVLDV3EJCP2qzFMlSQbY3hyt:GOVSiQ30xrUQkoFz+qaghyt

Malware Config

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Script User-Agent 15 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Users\Admin\AppData\Local\Temp\Software_Tool.exe
      "C:\Users\Admin\AppData\Local\Temp\Software_Tool.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Users\Admin\AppData\Local\Temp\sib7F92.tmp\0\AdblockInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\sib7F92.tmp\0\AdblockInstaller.exe" /pid=741
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Users\Admin\AppData\Local\Temp\is-ETRL2.tmp\AdblockInstaller.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-ETRL2.tmp\AdblockInstaller.tmp" /SL5="$801CE,15557677,792064,C:\Users\Admin\AppData\Local\Temp\sib7F92.tmp\0\AdblockInstaller.exe" /pid=741
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3364
          • C:\Windows\SysWOW64\taskkill.exe
            "C:\Windows\System32\taskkill.exe" /f /im Adblock.exe
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2240
          • C:\Users\Admin\Programs\Adblock\Adblock.exe
            "C:\Users\Admin\Programs\Adblock\Adblock.exe" --installerSessionId=320257d51689760950 --downloadDate=2022-12-17T04:04:11 --distId=marketator --pid=741
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:440
            • C:\Users\Admin\Programs\Adblock\crashpad_handler.exe
              C:\Users\Admin\Programs\Adblock\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" "--metrics-dir=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" --url=https://o428832.ingest.sentry.io:443/api/5420194/minidump/?sentry_client=sentry.native/0.4.12&sentry_key=06798e99d7ee416faaf4e01cd2f1faaf "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\9d155521-9566-43ce-379b-4ed676d1055d.run\__sentry-event" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\9d155521-9566-43ce-379b-4ed676d1055d.run\__sentry-breadcrumb1" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\9d155521-9566-43ce-379b-4ed676d1055d.run\__sentry-breadcrumb2" --initial-client-data=0x3e8,0x3ec,0x3f0,0x3c4,0x3f4,0x7ff65914bdd0,0x7ff65914bdf0,0x7ff65914be08
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4212
            • C:\Windows\system32\netsh.exe
              C:\Windows\system32\netsh.exe firewall add allowedprogram "C:\Users\Admin\Programs\Adblock\DnsService.exe" AdBlockFast ENABLE
              6⤵
              • Modifies Windows Firewall
              PID:4520
            • C:\Users\Admin\Programs\Adblock\DnsService.exe
              C:\Users\Admin\Programs\Adblock\DnsService.exe -install
              6⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4496
            • C:\Users\Admin\Programs\Adblock\DnsService.exe
              C:\Users\Admin\Programs\Adblock\DnsService.exe -start
              6⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4028
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c "reg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3456
            • C:\Windows\system32\reg.exe
              reg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f
              6⤵
                PID:3604
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /c "reg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3476
            • C:\Windows\SysWOW64\taskkill.exe
              "C:\Windows\System32\taskkill.exe" /f /im MassiveEngine.exe
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4840
      • C:\Users\Admin\AppData\Local\Temp\Resource.exe
        "C:\Users\Admin\AppData\Local\Temp\Resource.exe"
        2⤵
        • Executes dropped EXE
        PID:4700
      • C:\Users\Admin\AppData\Local\Temp\Folder.exe
        "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Users\Admin\AppData\Local\Temp\Folder.exe
          "C:\Users\Admin\AppData\Local\Temp\Folder.exe" -h
          3⤵
          • Executes dropped EXE
          PID:4208
    • C:\Windows\system32\reg.exe
      reg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f
      1⤵
      • Modifies registry key
      PID:1784
    • C:\Users\Admin\Programs\Adblock\DnsService.exe
      C:\Users\Admin\Programs\Adblock\DnsService.exe
      1⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2420

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Folder.exe

      Filesize

      135KB

      MD5

      0f2871fbf16bf9f5adc60785d8a71bd5

      SHA1

      3a5763edc969e9213d5cefaff6a6eb1e48132a91

      SHA256

      e4990a5113f348f96ac4b3d443bce8fec9f6a2c3ac70f749c86dd5b5052ab115

      SHA512

      82b0bc0b01eb9eef999a103ef447a25161a33445d90cd90c60e05b15f9668ff5c75335dc47e2829e4544bd7ee04a33955c83f378675531cf84110320226fad88

    • C:\Users\Admin\AppData\Local\Temp\Folder.exe

      Filesize

      135KB

      MD5

      0f2871fbf16bf9f5adc60785d8a71bd5

      SHA1

      3a5763edc969e9213d5cefaff6a6eb1e48132a91

      SHA256

      e4990a5113f348f96ac4b3d443bce8fec9f6a2c3ac70f749c86dd5b5052ab115

      SHA512

      82b0bc0b01eb9eef999a103ef447a25161a33445d90cd90c60e05b15f9668ff5c75335dc47e2829e4544bd7ee04a33955c83f378675531cf84110320226fad88

    • C:\Users\Admin\AppData\Local\Temp\Folder.exe

      Filesize

      135KB

      MD5

      0f2871fbf16bf9f5adc60785d8a71bd5

      SHA1

      3a5763edc969e9213d5cefaff6a6eb1e48132a91

      SHA256

      e4990a5113f348f96ac4b3d443bce8fec9f6a2c3ac70f749c86dd5b5052ab115

      SHA512

      82b0bc0b01eb9eef999a103ef447a25161a33445d90cd90c60e05b15f9668ff5c75335dc47e2829e4544bd7ee04a33955c83f378675531cf84110320226fad88

    • C:\Users\Admin\AppData\Local\Temp\Folder.exe

      Filesize

      135KB

      MD5

      0f2871fbf16bf9f5adc60785d8a71bd5

      SHA1

      3a5763edc969e9213d5cefaff6a6eb1e48132a91

      SHA256

      e4990a5113f348f96ac4b3d443bce8fec9f6a2c3ac70f749c86dd5b5052ab115

      SHA512

      82b0bc0b01eb9eef999a103ef447a25161a33445d90cd90c60e05b15f9668ff5c75335dc47e2829e4544bd7ee04a33955c83f378675531cf84110320226fad88

    • C:\Users\Admin\AppData\Local\Temp\Resource.exe

      Filesize

      3.5MB

      MD5

      10a8375392ad7ff460dbc07a627f9259

      SHA1

      96a5c4480a44840e4a7562afd31171f069fbc3e3

      SHA256

      96e2e8605a3db028029fa462712808db69520573b7a940990f5afa1a65910e46

      SHA512

      089f12390b182e83c775adb973275a0dff0c69c9ea6074c25638e7069ae28911fc060491fa34d6202dfa8400e718aa81dce65530f34e110aff17fbc86c07247a

    • C:\Users\Admin\AppData\Local\Temp\Resource.exe

      Filesize

      3.5MB

      MD5

      10a8375392ad7ff460dbc07a627f9259

      SHA1

      96a5c4480a44840e4a7562afd31171f069fbc3e3

      SHA256

      96e2e8605a3db028029fa462712808db69520573b7a940990f5afa1a65910e46

      SHA512

      089f12390b182e83c775adb973275a0dff0c69c9ea6074c25638e7069ae28911fc060491fa34d6202dfa8400e718aa81dce65530f34e110aff17fbc86c07247a

    • C:\Users\Admin\AppData\Local\Temp\Resource.exe

      Filesize

      3.5MB

      MD5

      10a8375392ad7ff460dbc07a627f9259

      SHA1

      96a5c4480a44840e4a7562afd31171f069fbc3e3

      SHA256

      96e2e8605a3db028029fa462712808db69520573b7a940990f5afa1a65910e46

      SHA512

      089f12390b182e83c775adb973275a0dff0c69c9ea6074c25638e7069ae28911fc060491fa34d6202dfa8400e718aa81dce65530f34e110aff17fbc86c07247a

    • C:\Users\Admin\AppData\Local\Temp\Software_Tool.exe

      Filesize

      15.7MB

      MD5

      9af27765527617e9d75b5ee6b418c8d6

      SHA1

      0e5f46cf55abe0746e8ddf5d7980ad0a5475e8e7

      SHA256

      e92ee1bc7c053bfb6b65bfce216a97d3ba5fd4f09bf9fd4f530101a60bb19030

      SHA512

      033ae6fea1be872fbc028aa9519f558f425076b906330f6dfa2d63e9dba04bfb7efdb583cff87c16a5e4ec2c29736540b8552ec754422ee05ee97788b095bd13

    • C:\Users\Admin\AppData\Local\Temp\Software_Tool.exe

      Filesize

      15.7MB

      MD5

      9af27765527617e9d75b5ee6b418c8d6

      SHA1

      0e5f46cf55abe0746e8ddf5d7980ad0a5475e8e7

      SHA256

      e92ee1bc7c053bfb6b65bfce216a97d3ba5fd4f09bf9fd4f530101a60bb19030

      SHA512

      033ae6fea1be872fbc028aa9519f558f425076b906330f6dfa2d63e9dba04bfb7efdb583cff87c16a5e4ec2c29736540b8552ec754422ee05ee97788b095bd13

    • C:\Users\Admin\AppData\Local\Temp\Software_Tool.exe

      Filesize

      15.7MB

      MD5

      9af27765527617e9d75b5ee6b418c8d6

      SHA1

      0e5f46cf55abe0746e8ddf5d7980ad0a5475e8e7

      SHA256

      e92ee1bc7c053bfb6b65bfce216a97d3ba5fd4f09bf9fd4f530101a60bb19030

      SHA512

      033ae6fea1be872fbc028aa9519f558f425076b906330f6dfa2d63e9dba04bfb7efdb583cff87c16a5e4ec2c29736540b8552ec754422ee05ee97788b095bd13

    • C:\Users\Admin\AppData\Local\Temp\is-3JJ3J.tmp\PEInjector.dll

      Filesize

      186KB

      MD5

      a4cf124b21795dfd382c12422fd901ca

      SHA1

      7e2832f3b8b8e06ae594558d81416e96a81d3898

      SHA256

      9e371a745ea2c92c4ba996772557f4a66545ed5186d02bb2e73e20dc79906ec7

      SHA512

      3ee82d438e4a01d543791a6a17d78e148a68796e5f57d7354da36da0755369091089466e57ee9b786e7e0305a4321c281e03aeb24f6eb4dd07e7408eb3763cdd

    • C:\Users\Admin\AppData\Local\Temp\is-ETRL2.tmp\AdblockInstaller.tmp

      Filesize

      3.0MB

      MD5

      1228c03ba840482eac14e25b727f65b5

      SHA1

      eaa92be989ff71dc2b7cf090b2a8183a3c44e655

      SHA256

      a048ccbd5797616ed03ea8c13ddea2ec868e0ea22ecc6f475bf7e3ba42aa77b7

      SHA512

      77e874dc88b428c43a72ed8ab9e00e98872e9b47c4ad18f35019aa26c89de909448d5ec83a289ed87d8ddbea6e9515c5932973cf54ea3f535d7f2e11bc2318bb

    • C:\Users\Admin\AppData\Local\Temp\is-ETRL2.tmp\AdblockInstaller.tmp

      Filesize

      3.0MB

      MD5

      1228c03ba840482eac14e25b727f65b5

      SHA1

      eaa92be989ff71dc2b7cf090b2a8183a3c44e655

      SHA256

      a048ccbd5797616ed03ea8c13ddea2ec868e0ea22ecc6f475bf7e3ba42aa77b7

      SHA512

      77e874dc88b428c43a72ed8ab9e00e98872e9b47c4ad18f35019aa26c89de909448d5ec83a289ed87d8ddbea6e9515c5932973cf54ea3f535d7f2e11bc2318bb

    • C:\Users\Admin\AppData\Local\Temp\nsy761B.tmp\Sibuia.dll

      Filesize

      527KB

      MD5

      eb948284236e2d61eae0741280265983

      SHA1

      d5180db7f54de24c27489b221095871a52dc9156

      SHA256

      dbe5a7daf5bcff97f7c48f9b5476db3072cc85fbffd660adaff2e0455132d026

      SHA512

      6d8087022ee62acd823cfa871b8b3e3251e44f316769dc04e2ad169e9df6a836dba95c3b268716f2397d6c6a3624a9e50dbe0bc847f3c4f3ef8e09bff30f2d75

    • C:\Users\Admin\AppData\Local\Temp\nsy761B.tmp\Sibuia.dll

      Filesize

      527KB

      MD5

      eb948284236e2d61eae0741280265983

      SHA1

      d5180db7f54de24c27489b221095871a52dc9156

      SHA256

      dbe5a7daf5bcff97f7c48f9b5476db3072cc85fbffd660adaff2e0455132d026

      SHA512

      6d8087022ee62acd823cfa871b8b3e3251e44f316769dc04e2ad169e9df6a836dba95c3b268716f2397d6c6a3624a9e50dbe0bc847f3c4f3ef8e09bff30f2d75

    • C:\Users\Admin\AppData\Local\Temp\sib7F92.tmp\0\AdblockInstaller.exe

      Filesize

      15.7MB

      MD5

      8d7db88f1fb9c7308f7368ae65e3f0ef

      SHA1

      5166ff1bb9b4b5d5f0ab460496cf7cc491f81f62

      SHA256

      5f81f8ee08a7460a3abd3aed1da137f2824bbdf804951477546a96300bd1e31f

      SHA512

      a620347b470c43f1d5d253a4899cbf89b1f9f631da35e5740d5134155e66a2c1756660ac9be21a6d9b5f830fa02461b3781db5c9cfe9d56b23e1454b198a7316

    • C:\Users\Admin\AppData\Local\Temp\sib7F92.tmp\0\AdblockInstaller.exe

      Filesize

      15.7MB

      MD5

      8d7db88f1fb9c7308f7368ae65e3f0ef

      SHA1

      5166ff1bb9b4b5d5f0ab460496cf7cc491f81f62

      SHA256

      5f81f8ee08a7460a3abd3aed1da137f2824bbdf804951477546a96300bd1e31f

      SHA512

      a620347b470c43f1d5d253a4899cbf89b1f9f631da35e5740d5134155e66a2c1756660ac9be21a6d9b5f830fa02461b3781db5c9cfe9d56b23e1454b198a7316

    • C:\Users\Admin\AppData\Local\Temp\sib7F92.tmp\SibClr.dll

      Filesize

      51KB

      MD5

      928e680dea22c19febe9fc8e05d96472

      SHA1

      0a4a749ddfd220e2b646b878881575ff9352cf73

      SHA256

      8b6b56f670d59ff93a1c7e601468127fc21f02dde567b5c21a5d53594cdaef94

      SHA512

      5fbc72c3fa98dc2b5ad2ed556d2c6dc9279d4be3eb90ffd7fa2ada39cb976eba7cb34033e5786d1cb6137c64c869027002be2f2cad408acefd5c22006a1fef34

    • C:\Users\Admin\AppData\Local\Temp\sib7F92.tmp\SibClr.dll

      Filesize

      51KB

      MD5

      928e680dea22c19febe9fc8e05d96472

      SHA1

      0a4a749ddfd220e2b646b878881575ff9352cf73

      SHA256

      8b6b56f670d59ff93a1c7e601468127fc21f02dde567b5c21a5d53594cdaef94

      SHA512

      5fbc72c3fa98dc2b5ad2ed556d2c6dc9279d4be3eb90ffd7fa2ada39cb976eba7cb34033e5786d1cb6137c64c869027002be2f2cad408acefd5c22006a1fef34

    • C:\Users\Admin\AppData\Roaming\Adblock Fast\Massive\usage\000002.dbtmp

      Filesize

      16B

      MD5

      206702161f94c5cd39fadd03f4014d98

      SHA1

      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

      SHA256

      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

      SHA512

      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

    • C:\Users\Admin\AppData\Roaming\Adblock Fast\Massive\usage\CURRENT

      Filesize

      16B

      MD5

      46295cac801e5d4857d09837238a6394

      SHA1

      44e0fa1b517dbf802b18faf0785eeea6ac51594b

      SHA256

      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

      SHA512

      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

    • C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\9d155521-9566-43ce-379b-4ed676d1055d.run\__sentry-event

      Filesize

      324B

      MD5

      d6760e518e1c2934808f7f6fbe4ba945

      SHA1

      8362a7d2357f9b8d02aeabed22bc3610e64429f1

      SHA256

      5761996bb652ff369f72521b5ec5a0a96ddf8ed82e080a6eea3992477a282c2f

      SHA512

      cd5796947bb37333e19a90600b695b173bcff6bdf9557edc07a216d94b95d4cc6826459dae10eec9347df35c17319bffa72f4949f9fc99460381ea7b65dc1742

    • C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\reports\0967e984-b34b-471d-bae0-aa126cda2af1.dmp

      Filesize

      1.0MB

      MD5

      7a1d261cfdc719ee5d7a6afa202dee4b

      SHA1

      8f10abe0c285490f86a251aae031da5e6e87ba5a

      SHA256

      6e3bca12e1b1e7b13f9430b38c93c532bd46c6f5ec421c70e627d5819381a095

      SHA512

      c83752268cf545f963ab986cfb52a0d7e91182322e234c0905ab4c31669ac2ac70a72aa640beb0f59a0d256c5c57df730fb454dc3e7ce46f4b87ca83dbc08d55

    • C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\settings.dat

      Filesize

      40B

      MD5

      cd232a8177965102d59fe5b543ba39c7

      SHA1

      237d6a887184f1790baf88a9a887656b13000179

      SHA256

      ac1af0abc744cebc919cb218922d8d89fa64f60e7debc46ce367716e7e95d847

      SHA512

      888d271ae6737080b439194f381053c3a11fb1491b9fa890c68c05dd45ec285fb1cbfb2c574771e88d5a0c6d445f1da2bd020a42a937a8a24ba471373f310c9f

    • C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\settings.dat

      Filesize

      40B

      MD5

      cd232a8177965102d59fe5b543ba39c7

      SHA1

      237d6a887184f1790baf88a9a887656b13000179

      SHA256

      ac1af0abc744cebc919cb218922d8d89fa64f60e7debc46ce367716e7e95d847

      SHA512

      888d271ae6737080b439194f381053c3a11fb1491b9fa890c68c05dd45ec285fb1cbfb2c574771e88d5a0c6d445f1da2bd020a42a937a8a24ba471373f310c9f

    • C:\Users\Admin\Programs\Adblock\Adblock.exe

      Filesize

      5.4MB

      MD5

      c7119e2a05db13f4888321d28e215c07

      SHA1

      2040cf5a97a671e18aee7bbd78a9dce70235f8ab

      SHA256

      b10d464d5b329829a6ec5c5bca79d9e5e5614448bc8763cc51230a3b778b644b

      SHA512

      60cc31c7d054620ad2002f00d16e58728eb941ae9a8ad492d21207e916ce3e1cc4e16e9c130a084939d35ea6f2fbf9e2d5ad89f5dc31407c1e43c70a0974478a

    • C:\Users\Admin\Programs\Adblock\Adblock.exe

      Filesize

      5.4MB

      MD5

      c7119e2a05db13f4888321d28e215c07

      SHA1

      2040cf5a97a671e18aee7bbd78a9dce70235f8ab

      SHA256

      b10d464d5b329829a6ec5c5bca79d9e5e5614448bc8763cc51230a3b778b644b

      SHA512

      60cc31c7d054620ad2002f00d16e58728eb941ae9a8ad492d21207e916ce3e1cc4e16e9c130a084939d35ea6f2fbf9e2d5ad89f5dc31407c1e43c70a0974478a

    • C:\Users\Admin\Programs\Adblock\Adblock.exe

      Filesize

      5.4MB

      MD5

      c7119e2a05db13f4888321d28e215c07

      SHA1

      2040cf5a97a671e18aee7bbd78a9dce70235f8ab

      SHA256

      b10d464d5b329829a6ec5c5bca79d9e5e5614448bc8763cc51230a3b778b644b

      SHA512

      60cc31c7d054620ad2002f00d16e58728eb941ae9a8ad492d21207e916ce3e1cc4e16e9c130a084939d35ea6f2fbf9e2d5ad89f5dc31407c1e43c70a0974478a

    • C:\Users\Admin\Programs\Adblock\DnsService.exe

      Filesize

      3.0MB

      MD5

      97a08c6366f4589739209fdb43b4b3ec

      SHA1

      56b57f33d510de026207a8b37ea93db8447a11b8

      SHA256

      5d15b23e628be6147ea04df302b5a06ceb8420b3bfc41872e2f90b0511bc11b1

      SHA512

      d83e83d3c252622b13004c60bed56653c284462240553d12dfd22989fa2fdc34a06dc8b388f1fe2aded478542299356aaefc2e4691e8db396bcf7a9e65af94b1

    • C:\Users\Admin\Programs\Adblock\DnsService.exe

      Filesize

      3.0MB

      MD5

      97a08c6366f4589739209fdb43b4b3ec

      SHA1

      56b57f33d510de026207a8b37ea93db8447a11b8

      SHA256

      5d15b23e628be6147ea04df302b5a06ceb8420b3bfc41872e2f90b0511bc11b1

      SHA512

      d83e83d3c252622b13004c60bed56653c284462240553d12dfd22989fa2fdc34a06dc8b388f1fe2aded478542299356aaefc2e4691e8db396bcf7a9e65af94b1

    • C:\Users\Admin\Programs\Adblock\DnsService.exe

      Filesize

      3.0MB

      MD5

      97a08c6366f4589739209fdb43b4b3ec

      SHA1

      56b57f33d510de026207a8b37ea93db8447a11b8

      SHA256

      5d15b23e628be6147ea04df302b5a06ceb8420b3bfc41872e2f90b0511bc11b1

      SHA512

      d83e83d3c252622b13004c60bed56653c284462240553d12dfd22989fa2fdc34a06dc8b388f1fe2aded478542299356aaefc2e4691e8db396bcf7a9e65af94b1

    • C:\Users\Admin\Programs\Adblock\DnsService.exe

      Filesize

      3.0MB

      MD5

      97a08c6366f4589739209fdb43b4b3ec

      SHA1

      56b57f33d510de026207a8b37ea93db8447a11b8

      SHA256

      5d15b23e628be6147ea04df302b5a06ceb8420b3bfc41872e2f90b0511bc11b1

      SHA512

      d83e83d3c252622b13004c60bed56653c284462240553d12dfd22989fa2fdc34a06dc8b388f1fe2aded478542299356aaefc2e4691e8db396bcf7a9e65af94b1

    • C:\Users\Admin\Programs\Adblock\MassiveService.dll

      Filesize

      3.5MB

      MD5

      6bcbb964e1fe28513b22273f136a4b37

      SHA1

      fde4927b46bac2340f65fe2811c2307c798e2398

      SHA256

      10c027bdd8008ad62c7e3ab5abd92d2573bb9474a9ea8ffeb218b43a2efaab09

      SHA512

      6e587fda68bc9e9683f2bece39a5ff9357cccd12ea1e3669f8d7c675479b476f482de0e2fea20e7a0f4fec72abde7ec1b0beffa1eed79461abd006427d182fed

    • C:\Users\Admin\Programs\Adblock\MassiveService.dll

      Filesize

      3.5MB

      MD5

      6bcbb964e1fe28513b22273f136a4b37

      SHA1

      fde4927b46bac2340f65fe2811c2307c798e2398

      SHA256

      10c027bdd8008ad62c7e3ab5abd92d2573bb9474a9ea8ffeb218b43a2efaab09

      SHA512

      6e587fda68bc9e9683f2bece39a5ff9357cccd12ea1e3669f8d7c675479b476f482de0e2fea20e7a0f4fec72abde7ec1b0beffa1eed79461abd006427d182fed

    • C:\Users\Admin\Programs\Adblock\MiningGpu.dll

      Filesize

      878KB

      MD5

      79cae1118a31818af31b388ee4808a1b

      SHA1

      9054393f36900ca638a6f58c31f6ed8b5e08ffb4

      SHA256

      8d8770fd885e0bb8a28fc96f31209f05d6b4db9b4036666bd5500d13b2faeb84

      SHA512

      0e320cba17c28bedc5bcd603c462bea62d658ca1aa6d8c954d1b68ae8597b8631ed20aa8754139702ae41d970458f681d4417c3caaa6e4e52a7dde4aeb6538dc

    • C:\Users\Admin\Programs\Adblock\MiningGpu.dll

      Filesize

      878KB

      MD5

      79cae1118a31818af31b388ee4808a1b

      SHA1

      9054393f36900ca638a6f58c31f6ed8b5e08ffb4

      SHA256

      8d8770fd885e0bb8a28fc96f31209f05d6b4db9b4036666bd5500d13b2faeb84

      SHA512

      0e320cba17c28bedc5bcd603c462bea62d658ca1aa6d8c954d1b68ae8597b8631ed20aa8754139702ae41d970458f681d4417c3caaa6e4e52a7dde4aeb6538dc

    • C:\Users\Admin\Programs\Adblock\SPCDNS.dll

      Filesize

      40KB

      MD5

      61e336dd16128398b546c70439c2bd3f

      SHA1

      4bb959d12c1184d64d439b3c21ffe8c4ad5ca5ae

      SHA256

      4f5160af8f4aa67f76613924280fb16da450c97eb657c871d9e42ec8a613acf1

      SHA512

      3506df990fdff07090d2f88a3aa56b8ea621dc412294b165dee532f7bbf40c4b00268f55a188e599df0d0d8151a644205104689716ebc78f40c83dab6a61a9e3

    • C:\Users\Admin\Programs\Adblock\SPCDNS.dll

      Filesize

      40KB

      MD5

      61e336dd16128398b546c70439c2bd3f

      SHA1

      4bb959d12c1184d64d439b3c21ffe8c4ad5ca5ae

      SHA256

      4f5160af8f4aa67f76613924280fb16da450c97eb657c871d9e42ec8a613acf1

      SHA512

      3506df990fdff07090d2f88a3aa56b8ea621dc412294b165dee532f7bbf40c4b00268f55a188e599df0d0d8151a644205104689716ebc78f40c83dab6a61a9e3

    • C:\Users\Admin\Programs\Adblock\SPCDNS.dll

      Filesize

      40KB

      MD5

      61e336dd16128398b546c70439c2bd3f

      SHA1

      4bb959d12c1184d64d439b3c21ffe8c4ad5ca5ae

      SHA256

      4f5160af8f4aa67f76613924280fb16da450c97eb657c871d9e42ec8a613acf1

      SHA512

      3506df990fdff07090d2f88a3aa56b8ea621dc412294b165dee532f7bbf40c4b00268f55a188e599df0d0d8151a644205104689716ebc78f40c83dab6a61a9e3

    • C:\Users\Admin\Programs\Adblock\SPCDNS.dll

      Filesize

      40KB

      MD5

      61e336dd16128398b546c70439c2bd3f

      SHA1

      4bb959d12c1184d64d439b3c21ffe8c4ad5ca5ae

      SHA256

      4f5160af8f4aa67f76613924280fb16da450c97eb657c871d9e42ec8a613acf1

      SHA512

      3506df990fdff07090d2f88a3aa56b8ea621dc412294b165dee532f7bbf40c4b00268f55a188e599df0d0d8151a644205104689716ebc78f40c83dab6a61a9e3

    • C:\Users\Admin\Programs\Adblock\SysGpuInfoEx.dll

      Filesize

      95KB

      MD5

      dc6723d0c1c83f6fa274d65d65a47962

      SHA1

      4f5147e4808ea4e7be6f6648f91089ed98ff3120

      SHA256

      2e27187fcd3e1216d20efab042151f4edbdc10d8cc3c2adf330c0b64ebb8cea0

      SHA512

      25464806174c060c4faaa23458f59d5f47d953232713238a7077f387fac97dd15dd8dcb34632131176341ae8e046d0320ed8ef87782322d623ed1f388a5e142d

    • C:\Users\Admin\Programs\Adblock\SysGpuInfoEx.dll

      Filesize

      95KB

      MD5

      dc6723d0c1c83f6fa274d65d65a47962

      SHA1

      4f5147e4808ea4e7be6f6648f91089ed98ff3120

      SHA256

      2e27187fcd3e1216d20efab042151f4edbdc10d8cc3c2adf330c0b64ebb8cea0

      SHA512

      25464806174c060c4faaa23458f59d5f47d953232713238a7077f387fac97dd15dd8dcb34632131176341ae8e046d0320ed8ef87782322d623ed1f388a5e142d

    • C:\Users\Admin\Programs\Adblock\WinSparkle.dll

      Filesize

      2.3MB

      MD5

      e167dfd4bb292d7837f3c15bc8f6f7a1

      SHA1

      d56a8b15f1da113afda580f5b4271354bb8fa574

      SHA256

      1f64e24bb019f60755215e3ad1efd30926e1febe497f029a69b83cedcb0dac49

      SHA512

      cbd5da6ad4cd5682163b9035af56a0ca95773cd2902d7cbcef37a8c950d3a4b7df6b79864305e449dda47e48f1d4514c48da18fb2a99334269deeaf935947f35

    • C:\Users\Admin\Programs\Adblock\WinSparkle.dll

      Filesize

      2.3MB

      MD5

      e167dfd4bb292d7837f3c15bc8f6f7a1

      SHA1

      d56a8b15f1da113afda580f5b4271354bb8fa574

      SHA256

      1f64e24bb019f60755215e3ad1efd30926e1febe497f029a69b83cedcb0dac49

      SHA512

      cbd5da6ad4cd5682163b9035af56a0ca95773cd2902d7cbcef37a8c950d3a4b7df6b79864305e449dda47e48f1d4514c48da18fb2a99334269deeaf935947f35

    • C:\Users\Admin\Programs\Adblock\crashpad_handler.exe

      Filesize

      913KB

      MD5

      cd2e0167f2e1092816f04bc174c13364

      SHA1

      8015c003fdf94d5991902437d2e98ae2d7cbccf3

      SHA256

      bfb062608229199430bd5f729fde00147451c074775ee5bf0e2917f7b239df96

      SHA512

      2f64d56f2dd6ff3f4c334540338af223a9a05e50b58e988de112712fe429698393b0acc50ce61831e418b8d63e8029d47473777dc346135303b80ad753ccc4ab

    • C:\Users\Admin\Programs\Adblock\crashpad_handler.exe

      Filesize

      913KB

      MD5

      cd2e0167f2e1092816f04bc174c13364

      SHA1

      8015c003fdf94d5991902437d2e98ae2d7cbccf3

      SHA256

      bfb062608229199430bd5f729fde00147451c074775ee5bf0e2917f7b239df96

      SHA512

      2f64d56f2dd6ff3f4c334540338af223a9a05e50b58e988de112712fe429698393b0acc50ce61831e418b8d63e8029d47473777dc346135303b80ad753ccc4ab

    • C:\Users\Admin\Programs\Adblock\dns.conf

      Filesize

      73B

      MD5

      d9229b2bf6ea93565ebbeb81459025c1

      SHA1

      5b8af056d1a853b73ac94903edd1d6f167af8d22

      SHA256

      f975168980dc06d1f64400c045f73e13e4e68ab8f350aa23304924461cce1cb6

      SHA512

      ab8650d51b0606738001e70acb28f18a7b3a89445ba64f1264908e6d9cc6a94fa93d7b35377e817a5db98e8050c8c9942782ddccceb0c9795f3e05b5e9d4304c

    • C:\Users\Admin\Programs\Adblock\dnsService.txt

      Filesize

      1KB

      MD5

      7d9d1ce6ac1037c59648f102d0508cce

      SHA1

      40daf2677e34f622b078d1b8ed203136b0cf44c1

      SHA256

      cb5829d4eacf069edf7f37d78881fda16d3859af8dd63b2442595b41978df59a

      SHA512

      77902100927ae6a4b209a5735072433f2ad857176676203f3999309f08dc56da2281fef3edf6948bf66d6a7a77167ba794edfb10fa4331b9f4c630ea91397e04

    • C:\Users\Admin\Programs\Adblock\dnsService.txt

      Filesize

      1KB

      MD5

      7d9d1ce6ac1037c59648f102d0508cce

      SHA1

      40daf2677e34f622b078d1b8ed203136b0cf44c1

      SHA256

      cb5829d4eacf069edf7f37d78881fda16d3859af8dd63b2442595b41978df59a

      SHA512

      77902100927ae6a4b209a5735072433f2ad857176676203f3999309f08dc56da2281fef3edf6948bf66d6a7a77167ba794edfb10fa4331b9f4c630ea91397e04

    • C:\Users\Admin\Programs\Adblock\domains\initial\adservers.conf

      Filesize

      1.0MB

      MD5

      c7183c7e129894d2634e14d86c2c9d94

      SHA1

      40a97a2d57daccd4ae455958be3f0c44aef12521

      SHA256

      1c288bd7a4bf7bf322f3c2949f65af3302019e93e7f92f211955a15c666a4a8b

      SHA512

      56a1add9de07eb49de8440f00772b211e382dc244a5cd9d5d4c7ae73cf56abdb2e76f3cdb1d81cc8d2cd0e21616844f20c9e24c9f3b21a46307c983a455b5e8b

    • C:\Users\Admin\Programs\Adblock\domains\initial\facebook.conf

      Filesize

      127KB

      MD5

      ba1435f50eb74c8a1ad64a75eb9d478b

      SHA1

      70ef49a54615637db396ddde8fb011bd62af1e4c

      SHA256

      5a718bc1916d74a426905484022551fa3ec4da678b0b1126f1d5cf674b42054d

      SHA512

      d73240e16152de66c5bd20a270528ac93d66d14e7458e753254767c37c7b292197e0fd1e3c4b4b44d91bf720c038d2df294b1ae1a5884dda45d4955b248fe9e5

    • C:\Users\Admin\Programs\Adblock\nvml.dll

      Filesize

      988KB

      MD5

      8b7acf836560a8e41423f1bb60a3b308

      SHA1

      3dbca75ddd19e447747865e227d456d7b0694281

      SHA256

      c2e049e90d23b692d1a01ca88d6d95c88b9c6d8cf0257314ae749c0c55906692

      SHA512

      49f75a2c9e18865a55fba824b777d0d418136a736d41db864af4d46571f5f285a60efb3aef24d129f50d2a23d3c78f6329545bc5b76c07073879de0cb19fb0cd

    • C:\Users\Admin\Programs\Adblock\nvml.dll

      Filesize

      988KB

      MD5

      8b7acf836560a8e41423f1bb60a3b308

      SHA1

      3dbca75ddd19e447747865e227d456d7b0694281

      SHA256

      c2e049e90d23b692d1a01ca88d6d95c88b9c6d8cf0257314ae749c0c55906692

      SHA512

      49f75a2c9e18865a55fba824b777d0d418136a736d41db864af4d46571f5f285a60efb3aef24d129f50d2a23d3c78f6329545bc5b76c07073879de0cb19fb0cd

    • C:\Users\Admin\Programs\Adblock\unins000.exe

      Filesize

      3.0MB

      MD5

      1228c03ba840482eac14e25b727f65b5

      SHA1

      eaa92be989ff71dc2b7cf090b2a8183a3c44e655

      SHA256

      a048ccbd5797616ed03ea8c13ddea2ec868e0ea22ecc6f475bf7e3ba42aa77b7

      SHA512

      77e874dc88b428c43a72ed8ab9e00e98872e9b47c4ad18f35019aa26c89de909448d5ec83a289ed87d8ddbea6e9515c5932973cf54ea3f535d7f2e11bc2318bb

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      3a19121498aa4a500f33519964565b99

      SHA1

      a881fe7bce9804b653a087a073c97472ca27fc14

      SHA256

      e5c414ee59ffc5fe19bf968ecadd6271ffcd1fc22b51ef772dfcfe956579f9ec

      SHA512

      c70fdacebd725b43fe65f84cbf9d7ddf9e9c95919b58d772211b2aa9fc2f24639fb13080a8fb38a6688ffa95ca14d4855e882f8f92a346bae6c134db1cffafc9

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      3a19121498aa4a500f33519964565b99

      SHA1

      a881fe7bce9804b653a087a073c97472ca27fc14

      SHA256

      e5c414ee59ffc5fe19bf968ecadd6271ffcd1fc22b51ef772dfcfe956579f9ec

      SHA512

      c70fdacebd725b43fe65f84cbf9d7ddf9e9c95919b58d772211b2aa9fc2f24639fb13080a8fb38a6688ffa95ca14d4855e882f8f92a346bae6c134db1cffafc9

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      3a19121498aa4a500f33519964565b99

      SHA1

      a881fe7bce9804b653a087a073c97472ca27fc14

      SHA256

      e5c414ee59ffc5fe19bf968ecadd6271ffcd1fc22b51ef772dfcfe956579f9ec

      SHA512

      c70fdacebd725b43fe65f84cbf9d7ddf9e9c95919b58d772211b2aa9fc2f24639fb13080a8fb38a6688ffa95ca14d4855e882f8f92a346bae6c134db1cffafc9

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      3a19121498aa4a500f33519964565b99

      SHA1

      a881fe7bce9804b653a087a073c97472ca27fc14

      SHA256

      e5c414ee59ffc5fe19bf968ecadd6271ffcd1fc22b51ef772dfcfe956579f9ec

      SHA512

      c70fdacebd725b43fe65f84cbf9d7ddf9e9c95919b58d772211b2aa9fc2f24639fb13080a8fb38a6688ffa95ca14d4855e882f8f92a346bae6c134db1cffafc9

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      bf5d067c2e0189b49536efaf81a28f90

      SHA1

      b8c917d8ec1c360e666a956b789edc247ed99eac

      SHA256

      b631670c5cc15bf98c8f5ee66aa4744884fe629cb1688b18e42bdf1fd6d3d8be

      SHA512

      4e22fa84d6dcc5c6f76048d247b745f6124ca3c4dd327958f551281afda8fecb2a45ee5f9db7bd81421c81962c7a1fa59c0bfd979f1858adb2304a680b423833

    • memory/2116-184-0x000000000E950000-0x000000000E960000-memory.dmp

      Filesize

      64KB

    • memory/2116-179-0x0000000010CB0000-0x0000000010CC2000-memory.dmp

      Filesize

      72KB

    • memory/2116-175-0x0000000073910000-0x00000000740C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2116-181-0x000000000E950000-0x000000000E960000-memory.dmp

      Filesize

      64KB

    • memory/2116-186-0x000000000E950000-0x000000000E960000-memory.dmp

      Filesize

      64KB

    • memory/2116-187-0x000000000E950000-0x000000000E960000-memory.dmp

      Filesize

      64KB

    • memory/2116-185-0x0000000010CD0000-0x0000000010D8A000-memory.dmp

      Filesize

      744KB

    • memory/2116-209-0x000000000E950000-0x000000000E960000-memory.dmp

      Filesize

      64KB

    • memory/2116-208-0x000000000E950000-0x000000000E960000-memory.dmp

      Filesize

      64KB

    • memory/2116-207-0x0000000073910000-0x00000000740C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2208-266-0x0000000000400000-0x00000000004CF000-memory.dmp

      Filesize

      828KB

    • memory/2208-194-0x0000000000400000-0x00000000004CF000-memory.dmp

      Filesize

      828KB

    • memory/3364-268-0x0000000000400000-0x0000000000709000-memory.dmp

      Filesize

      3.0MB

    • memory/3364-200-0x00000000009E0000-0x00000000009E1000-memory.dmp

      Filesize

      4KB

    • memory/3364-290-0x00000000009E0000-0x00000000009E1000-memory.dmp

      Filesize

      4KB

    • memory/3364-503-0x0000000000400000-0x0000000000709000-memory.dmp

      Filesize

      3.0MB

    • memory/4700-174-0x0000000140000000-0x0000000140619000-memory.dmp

      Filesize

      6.1MB