Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/01/2024, 21:56

General

  • Target

    6b9387bf96328f87463d46f9dff8b504.exe

  • Size

    2.7MB

  • MD5

    6b9387bf96328f87463d46f9dff8b504

  • SHA1

    7b58d78491655b1717d36852e857f766c079c434

  • SHA256

    be76d8099188dcd24930e143e92a6c0d0f0e8c55de5dc4c17faec4669ff39802

  • SHA512

    1177aec755b2c37e6c920a7274783ff82868e64259c97b1358c4e8f6132da83ab3b8c9fc11581925bab3f47c317ed77c498c91a26ba7f074d1e9ce63310bbc3c

  • SSDEEP

    49152:xcBKPkZVi7iKiF8cUvFyP7MFpo8T5+F9f6F7dg5kPEwJ84vLRaBtIl9mTlPF:xcri7ixZUvFyPez5+F9igNCvLUBsKP

Malware Config

Extracted

Family

nullmixer

C2

http://razino.xyz/

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

redline

Botnet

Cana01

C2

176.111.174.254:56328

Extracted

Family

redline

Botnet

AniOLD

C2

akedauiver.xyz:80

Extracted

Family

vidar

Version

39.5

Botnet

933

C2

https://olegf9844.tumblr.com/

Attributes
  • profile_id

    933

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • ASPack v2.12-2.42 7 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b9387bf96328f87463d46f9dff8b504.exe
    "C:\Users\Admin\AppData\Local\Temp\6b9387bf96328f87463d46f9dff8b504.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3416
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_8.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_8.exe
          sahiba_8.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_8.exe
            C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_8.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3600
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_7.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4424
        • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_7.exe
          sahiba_7.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:400
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_6.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4372
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 552
        3⤵
        • Program crash
        PID:3148
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_5.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3256
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_4.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4516
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_3.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4256
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_2.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:628
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1328
  • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_4.exe
    sahiba_4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:968
  • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_5.exe
    sahiba_5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:736
  • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_6.exe
    sahiba_6.exe
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Executes dropped EXE
    PID:1164
  • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_1.exe
    sahiba_1.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_1.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_1.exe" -a
      2⤵
      • Executes dropped EXE
      PID:5056
  • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_2.exe
    sahiba_2.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 396
      2⤵
      • Program crash
      PID:2472
  • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_3.exe
    sahiba_3.exe
    1⤵
    • Executes dropped EXE
    PID:2184
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 1028
      2⤵
      • Program crash
      PID:4756
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3416 -ip 3416
    1⤵
      PID:4808
    • C:\Windows\SysWOW64\rundll32.exe
      rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
      1⤵
      • Loads dropped DLL
      PID:1864
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 608
        2⤵
        • Program crash
        PID:4944
    • C:\Windows\system32\rUNdlL32.eXe
      rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1864 -ip 1864
      1⤵
        PID:4004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2184 -ip 2184
        1⤵
          PID:3240
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4076 -ip 4076
          1⤵
            PID:4856

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\sahiba_8.exe.log

            Filesize

            605B

            MD5

            3654bd2c6957761095206ffdf92b0cb9

            SHA1

            6f10f7b5867877de7629afcff644c265e79b4ad3

            SHA256

            c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4

            SHA512

            e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\libcurl.dll

            Filesize

            218KB

            MD5

            d09be1f47fd6b827c81a4812b4f7296f

            SHA1

            028ae3596c0790e6d7f9f2f3c8e9591527d267f7

            SHA256

            0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

            SHA512

            857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\libcurlpp.dll

            Filesize

            54KB

            MD5

            e6e578373c2e416289a8da55f1dc5e8e

            SHA1

            b601a229b66ec3d19c2369b36216c6f6eb1c063e

            SHA256

            43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

            SHA512

            9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\libgcc_s_dw2-1.dll

            Filesize

            113KB

            MD5

            9aec524b616618b0d3d00b27b6f51da1

            SHA1

            64264300801a353db324d11738ffed876550e1d3

            SHA256

            59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

            SHA512

            0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\libstdc++-6.dll

            Filesize

            321KB

            MD5

            fea2c65a3c3f58d46c0720bb13f75a82

            SHA1

            38cb9a1ca6c5f3a3231368ec713c91ed982a3c7b

            SHA256

            788cf9b3bfe9d79b4b6c5dd80798b12e22d71503c558e75ee55ae11035ded806

            SHA512

            60d3e95ab05045d8768ce54b8f83ebf5257d5678117b58cdfc438448cb005f6d0c61d6872d7ba8b66399efbbab1d7724c577cd0e77bb982086d268894f4a8300

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\libstdc++-6.dll

            Filesize

            8KB

            MD5

            98123aba24966b942c89c5ad38619f06

            SHA1

            db4be855e726306a1307c5759ccdaaf85b61015e

            SHA256

            79eeed5e8cd760dc3290759c06968765b9bd283f782880df080a2b043d83a654

            SHA512

            1336b62aeefbe380e0255230e01930da1cf29f806664e6474c89323ba2c4463c9ba0bb8b555cf9d9a9b6b20fed9d1e842ab00651da25bfe7891e030eacbf2364

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\libwinpthread-1.dll

            Filesize

            69KB

            MD5

            1e0d62c34ff2e649ebc5c372065732ee

            SHA1

            fcfaa36ba456159b26140a43e80fbd7e9d9af2de

            SHA256

            509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

            SHA512

            3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_1.exe

            Filesize

            80KB

            MD5

            62017a815419bfa8204c0d46a0012d6f

            SHA1

            a119a4737fae95670b1d202c0578607f2807b918

            SHA256

            a856d8ead857ccc7a2ed84a96d82861f273571f61d8e60420b090dd7b88b7228

            SHA512

            e44e1964d641bb3eb14190a7b65aac9b193671f0afde893f500f256682dcef4381ec15cfe71c06cddaa84ba25ea2cffe2031e0df0fd413fb0c7006423fa55361

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_1.txt

            Filesize

            349KB

            MD5

            48a4d703818479867d1a9e170fce1d8e

            SHA1

            2f2ba84ee3d1e71e917edea023b9eedfba8d3262

            SHA256

            33d3fec02e2bc159058f6049d19357e6e4d5e3a100f29e0742f1e3d4d35b358e

            SHA512

            a58d6d49e7f2d06198cfeb3ddc605871c00a7d41644183d1b815686dc2f4f3b2d6219378c36251ce177129c2a53ad00f5f40f215978fd3aaf083ceac459c62e2

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_2.exe

            Filesize

            95KB

            MD5

            31ce590db8e4a9f1ccf70db0361287f9

            SHA1

            05a5f04e26e47b5600d3b73a24d2dc438ee6587b

            SHA256

            fed36c567e3d2d0624490df96bf9737155c8975acc62ac0cf3ec1d81b5b3ca4f

            SHA512

            48ffc75011a77be0849e8c6f30664ad94af978db8a9fba6c042bad7351649aafb1a3e166c30aad0319f251e8f5d0d870c7ee274fc91af3fccc64dc37f292fffc

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_2.txt

            Filesize

            178KB

            MD5

            7e0073ab1517645c412d0abac816bab6

            SHA1

            d4b05005d88a400612e9d56b6bb6e7360877c4e1

            SHA256

            3b20f4689851f5ad8e4cde96fd2420e69c8bac588e2ba712e3044f39a0b3c7ae

            SHA512

            f37c656328dcd3b0523d6e847662ccde72c11a42806da5d56d817fd6606d9b8257c482fef58552d1b871ad74c36e41916c98d5d09991dbf953ba37a83b7c4f20

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_3.exe

            Filesize

            68KB

            MD5

            5c1eac825365da3212f7949031d02aff

            SHA1

            2723319fbd3b14e20fa24ed91a0b33fca7aad4bb

            SHA256

            f9c6962af387cfa1c8d55243208de474ce712586a682182cc7b26b58199ad1d5

            SHA512

            bd5c4240a83040fe8692170b066ccc13effe26c8891e5861f67cd8f2c167112f5e16624d9d36320c8288bdafaae34662288b76199c92f3e5feef75bb00faa5b1

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_3.txt

            Filesize

            296KB

            MD5

            e31b53e7f86bbee456af656f586aef46

            SHA1

            cc75c0431ef63750b67e4a3a51b14e24a73b53d5

            SHA256

            dbc8da2a557915ac17371672f5b26c1d329711a4c9bbf8bc41a7e1b844f0a57e

            SHA512

            d27a2cf69b416db13475c0a512cc73160c3756b738d8125ce6116a7af484b434b40946d8e03fcb49b944e5f0549892cea9d97717d6510bd1c261a3f8e2c21a7d

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_4.exe

            Filesize

            8KB

            MD5

            dbc3e1e93fe6f9e1806448cd19e703f7

            SHA1

            061119a118197ca93f69045abd657aa3627fc2c5

            SHA256

            9717f526bf9c56a5d06ccd0fb71eef0579d26b7100d01665b76d8fdd211b48bd

            SHA512

            beab2f861168af6f6761e216cb86527e90c92efc8466d8f07544de94659013a704ffeaa77b09054f2567856c69df02434de7206a81a502b738d14d8f36f0da84

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_5.exe

            Filesize

            22KB

            MD5

            aca90b345bc0b65a5fac1b88935246d3

            SHA1

            c5b2c664f9ce7461a4394f86a75bcc9cc6be1e13

            SHA256

            280ab06ae831ff9cbd05bcac7f4a1a8d1303a9bb94ce07854774bc5f6cb84ecf

            SHA512

            625a64dfbbdfa30c9cbd4f7476ae8edad7f4bf7a8f1dfa8a8742d227f7b456dd8e4754616f946de1093854122a234730d840a186227b18b3476a4537ca52fb2b

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_5.txt

            Filesize

            165KB

            MD5

            08e6ea0e270732e402a66e8b54eacfc6

            SHA1

            2d64b8331e641ca0ce3bde443860ca501b425614

            SHA256

            808791e690e48577e7f43b9aa055fa0efb928ef626b48f48e95d6d73c5f06f65

            SHA512

            917554ca163436f4f101188690f34a5ab9dd0cfd99cd566830423b3d67fa1da3e40f53b388d190fef9eb3f78b634d3c72330e545219de7570939a9539f5950f9

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_6.exe

            Filesize

            92KB

            MD5

            f213824e11c40b3ec5bfa20ee7e80c81

            SHA1

            b82ef5e406c577246f3ceb7d1a5ce77bad9fb8ea

            SHA256

            0d8d85b81aa10a8c2b89fbec09ba4e9d5f6d548eb56d357c08951e67d5985c71

            SHA512

            5a5a1c9365c0b366d045b3b4e601f9e2d13d3b40a32b7e4db8d99dc57b10a3defb9f5b00f571837ea9fe53455ebd21f4ef3abf7f7d55cf0c5419b6b62efa29ea

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_6.txt

            Filesize

            396KB

            MD5

            40e8a3acb31a7e0ef82fa73e2a7d91f5

            SHA1

            06d4f844d576946e037f5c54f63b0999dd6e157c

            SHA256

            7d6c83551ea6a489943219d0a53fc766f0e32301b2e749987c11ed3d2c2a1f6f

            SHA512

            8482e7ad6d8114416d003146d99ab3ee77cb19ecf16ae17dcafdb6889a62a6d2ca2d8fe40354af96a176b7399740d261823769593ba16e391e961fbf2dd16bd2

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_7.exe

            Filesize

            1KB

            MD5

            4899d92640460913706c2b8e80f0c684

            SHA1

            b54dd05733cced3bc7574d196e5c1ac17dbb00f1

            SHA256

            8bb074a11a125bca66643ce2d862b1a65f68f8c5356fed63acb8ada5097e87de

            SHA512

            1aa9fd2cd58f94021d5ee8cf5192edff2c7d15e0cde78f0961d5e6403b1aa7dd90d9e30978c01cb2047b0735bcbc2e5eb35576ce6e58ca497142325df807295b

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_7.txt

            Filesize

            221KB

            MD5

            ac0e1d7b2da757c0275a3a03df284eb2

            SHA1

            488a2e74696d8f6f100a01fc7c039969916f1a2f

            SHA256

            01d263448c38d48c3450f40dc794ea35f5b25a03d3eec772bbdd5a662dc976bc

            SHA512

            c6ca7b6700bba287c278bdf947ac5817653bfd8483549a871b7888ac21cbf98fbc6acfc8fd15fb5f050438ff5f0dc18a27a981f2911f799e48a475d8820754c0

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_8.exe

            Filesize

            25KB

            MD5

            3bef5ed6ae1282390f4aeb0bd08d9f03

            SHA1

            b38d913a76cedcb876df90df9a0c704d9934ebda

            SHA256

            8855523e42e65f2f4e96708716dd160174d376737feee988a5c1fd948e6587e7

            SHA512

            e9f920d35c16fd08a349a0d48a400735bd540f9c6e034bd8cc257e6e388682a8877fe83b58ef211b56930d622e303e2aef536118c985d6b8460f89eed22b7295

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_8.exe

            Filesize

            64KB

            MD5

            58edee4bfba22f5b208b14645ece139b

            SHA1

            43d51eb17d3cb50d1b774dc961ff605006a8f28b

            SHA256

            d1842ca4bd86f10eb678a4d743b2b8f5833bcdc24439f5fdd3bd2e01c111cc96

            SHA512

            8e313d1827efec907ec6fc8a1d37ae76fa7c3b6bd5956b04afcb251de1f905309af2dcea1ff74ff34eaba83146616fdf68132798f51c6344304ec046dc4a3f86

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\sahiba_8.txt

            Filesize

            208KB

            MD5

            46d390dce0adc8cb7f5b853840046850

            SHA1

            497933d00a6dfef1524d48d8f19e2d79b9a9a67e

            SHA256

            736e26416917e372b8feda4d8ea0664c7a9fc6d94e82d44cc745a71bea4d7c43

            SHA512

            3842514a9f827a9db2b1d82ea0dbb2b6ad294811b0d4a7b0a8a576bea0b8a994f97b41faecaab42242ad6d4a7643e9467c99dbc3bc4ace776e8c98c9849e731f

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\setup_install.exe

            Filesize

            92KB

            MD5

            63917d1942e1501a4fa7fd1201d76640

            SHA1

            5e32211eb17e5f4f59a45a2ee0265ac6c2204f41

            SHA256

            71ac20ecf3b4f7a7e1714489690c23f483764203f112520c32712716d19bc68b

            SHA512

            eeae28f9d67ae0443a04edb9fbf52d0d74cecf22f55799397e59536031f5e3e4f45942d45afd6249eb618f130477be830b6aae1199146e02071191866ce89053

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\setup_install.exe

            Filesize

            41KB

            MD5

            ad6b1ea190af55ec7fc2051c5426ffd5

            SHA1

            9caf1af316c4b30cd01106a25bdcfc9b77306958

            SHA256

            76f9b1e9bf49d668460cabd2ec4adeb6334efbd4dd646d98bd7907b2d1106d2e

            SHA512

            37905d67edada3dcb87fd92ca04ea094e1bbf7cba1cb917da5d2b9f77423d67646db8df9d54c4d92bc4a4040eb62046b96d260a90417ea858b27b1346568b64d

          • C:\Users\Admin\AppData\Local\Temp\7zSCBB30507\setup_install.exe

            Filesize

            287KB

            MD5

            92582e8357b979ad78514ddc24cdf437

            SHA1

            0f3b6eeb8b533588d77406e85eff9d07e1494e59

            SHA256

            4b7c62c428baea56f89cd90e3642d61b08cf7254783ec55f74a5f0fa735594a4

            SHA512

            4e158d5157a396743640e2f720a8d4e27d999867fa2f4598537802401aa8b67db727ec3f8f41cbd23d154dae9e091772d85e819156fe9ca91f9a2272ed7e05c1

          • C:\Users\Admin\AppData\Local\Temp\CC4F.tmp

            Filesize

            85KB

            MD5

            17bf0dca05bc23bdb225f4614816de95

            SHA1

            fd0bd0b00fd46af60c92466ba4f0a168abb83a7a

            SHA256

            5563518ce9fc2dae8283aed7c37bad01b2c654687aa1eaf9404d61bd1d729769

            SHA512

            342f8280086d85622a314ac8e001fdaf778bc98d81f44a187b9cd6265f96ad1509694c1251523cc5a1bd1eb72c931d0f61a430006dd62056cc33548c73fa7e2b

          • C:\Users\Admin\AppData\Local\Temp\axhub.dat

            Filesize

            85KB

            MD5

            95b3d6ea4a49bf1542ea4f58c93c5a2a

            SHA1

            f22342146dc75000a246695172e6dc2550d6b3f1

            SHA256

            4374af8bc32d52ec31fb1011229425a23b086d89e80305d294c952c53c34dea7

            SHA512

            c2823122c4887cc566f98f1c9affd0ae6c9e214a2993bd2450fc4fe4d0248e070c01873af99059252b9be3568d45b6815870607d100182496b1fe76ab9f5d18d

          • C:\Users\Admin\AppData\Local\Temp\axhub.dll

            Filesize

            17KB

            MD5

            23541642a800f37223de5ca1afddced8

            SHA1

            262cf60da88867d3bf02e67138009739259f0605

            SHA256

            57494dccd5fe3a248fd83cc13729756b08fd62a5b1cbbaaa463c7519fa2bfed3

            SHA512

            03309d29cbd9d6c1cc3c981e56c6fb4057c0bf59f1336167baa5a0dd96b7d6762871ee69c545f102a8cdb2e09aba786f37a7890c27a9cb0302db7a14f5b715ca

          • C:\Users\Admin\AppData\Local\Temp\axhub.dll

            Filesize

            36KB

            MD5

            d86e51e493b99f98c1930fa71eb158de

            SHA1

            3102eac947d22acc07b040504e1c68accfab9f41

            SHA256

            4af92d8153320ab2b44eeb365ef61ae5a0d61443991f85eaccbf8416b8027c4f

            SHA512

            1764e260f9b0cb507e71b6ed7af471908840cd7b1a8def1beeccb4722020612c31af419a9d020658f509d9e4ed91c5222aebab407ea4c5c1a7d3e57e89d198b7

          • memory/400-170-0x0000000000D10000-0x0000000000E10000-memory.dmp

            Filesize

            1024KB

          • memory/400-130-0x0000000002B00000-0x0000000002B1E000-memory.dmp

            Filesize

            120KB

          • memory/400-124-0x0000000002840000-0x0000000002860000-memory.dmp

            Filesize

            128KB

          • memory/400-178-0x0000000005050000-0x0000000005060000-memory.dmp

            Filesize

            64KB

          • memory/400-122-0x0000000000B10000-0x0000000000B3F000-memory.dmp

            Filesize

            188KB

          • memory/400-121-0x0000000000D10000-0x0000000000E10000-memory.dmp

            Filesize

            1024KB

          • memory/400-141-0x00000000057E0000-0x00000000058EA000-memory.dmp

            Filesize

            1.0MB

          • memory/400-173-0x00000000730A0000-0x0000000073850000-memory.dmp

            Filesize

            7.7MB

          • memory/400-125-0x0000000000400000-0x00000000009B5000-memory.dmp

            Filesize

            5.7MB

          • memory/400-171-0x0000000005050000-0x0000000005060000-memory.dmp

            Filesize

            64KB

          • memory/400-129-0x0000000005060000-0x0000000005604000-memory.dmp

            Filesize

            5.6MB

          • memory/400-132-0x0000000005C30000-0x0000000006248000-memory.dmp

            Filesize

            6.1MB

          • memory/400-134-0x0000000005610000-0x000000000564C000-memory.dmp

            Filesize

            240KB

          • memory/400-172-0x0000000005050000-0x0000000005060000-memory.dmp

            Filesize

            64KB

          • memory/400-133-0x0000000005010000-0x0000000005022000-memory.dmp

            Filesize

            72KB

          • memory/400-131-0x00000000730A0000-0x0000000073850000-memory.dmp

            Filesize

            7.7MB

          • memory/400-128-0x0000000005050000-0x0000000005060000-memory.dmp

            Filesize

            64KB

          • memory/400-127-0x0000000005050000-0x0000000005060000-memory.dmp

            Filesize

            64KB

          • memory/400-138-0x0000000005650000-0x000000000569C000-memory.dmp

            Filesize

            304KB

          • memory/736-93-0x0000000000F40000-0x0000000000F46000-memory.dmp

            Filesize

            24KB

          • memory/736-90-0x0000000000760000-0x0000000000792000-memory.dmp

            Filesize

            200KB

          • memory/736-99-0x0000000000F80000-0x0000000000F86000-memory.dmp

            Filesize

            24KB

          • memory/736-139-0x00007FFD58D70000-0x00007FFD59831000-memory.dmp

            Filesize

            10.8MB

          • memory/736-168-0x00007FFD58D70000-0x00007FFD59831000-memory.dmp

            Filesize

            10.8MB

          • memory/736-101-0x000000001B460000-0x000000001B470000-memory.dmp

            Filesize

            64KB

          • memory/736-161-0x000000001B460000-0x000000001B470000-memory.dmp

            Filesize

            64KB

          • memory/736-89-0x00007FFD58D70000-0x00007FFD59831000-memory.dmp

            Filesize

            10.8MB

          • memory/736-98-0x0000000000F50000-0x0000000000F76000-memory.dmp

            Filesize

            152KB

          • memory/968-94-0x000000001BBF0000-0x000000001BC00000-memory.dmp

            Filesize

            64KB

          • memory/968-92-0x00007FFD58D70000-0x00007FFD59831000-memory.dmp

            Filesize

            10.8MB

          • memory/968-140-0x000000001BBF0000-0x000000001BC00000-memory.dmp

            Filesize

            64KB

          • memory/968-147-0x00007FFD58D70000-0x00007FFD59831000-memory.dmp

            Filesize

            10.8MB

          • memory/968-87-0x0000000000F00000-0x0000000000F08000-memory.dmp

            Filesize

            32KB

          • memory/1908-88-0x0000000000B90000-0x0000000000BF6000-memory.dmp

            Filesize

            408KB

          • memory/1908-91-0x0000000005410000-0x0000000005486000-memory.dmp

            Filesize

            472KB

          • memory/1908-95-0x00000000053D0000-0x00000000053EE000-memory.dmp

            Filesize

            120KB

          • memory/1908-96-0x00000000730A0000-0x0000000073850000-memory.dmp

            Filesize

            7.7MB

          • memory/1908-97-0x0000000005500000-0x0000000005510000-memory.dmp

            Filesize

            64KB

          • memory/1908-146-0x00000000730A0000-0x0000000073850000-memory.dmp

            Filesize

            7.7MB

          • memory/2184-103-0x0000000002680000-0x000000000271D000-memory.dmp

            Filesize

            628KB

          • memory/2184-102-0x0000000000AC0000-0x0000000000BC0000-memory.dmp

            Filesize

            1024KB

          • memory/2184-109-0x0000000000400000-0x00000000009F4000-memory.dmp

            Filesize

            6.0MB

          • memory/2184-160-0x0000000002680000-0x000000000271D000-memory.dmp

            Filesize

            628KB

          • memory/2184-159-0x0000000000400000-0x00000000009F4000-memory.dmp

            Filesize

            6.0MB

          • memory/3416-120-0x000000006EB40000-0x000000006EB63000-memory.dmp

            Filesize

            140KB

          • memory/3416-47-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3416-113-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/3416-126-0x0000000000EF0000-0x0000000000F7F000-memory.dmp

            Filesize

            572KB

          • memory/3416-34-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-50-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3416-66-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-65-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-64-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-63-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-62-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-60-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3416-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3416-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3416-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3416-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3416-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3416-52-0x0000000000EF0000-0x0000000000F7F000-memory.dmp

            Filesize

            572KB

          • memory/3416-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3416-111-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3416-53-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/3416-61-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3416-123-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/3416-67-0x0000000000400000-0x000000000051E000-memory.dmp

            Filesize

            1.1MB

          • memory/3416-118-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/3416-119-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3500-163-0x0000000002D90000-0x0000000002DA5000-memory.dmp

            Filesize

            84KB

          • memory/3600-149-0x00000000050B0000-0x00000000050C0000-memory.dmp

            Filesize

            64KB

          • memory/3600-148-0x00000000730A0000-0x0000000073850000-memory.dmp

            Filesize

            7.7MB

          • memory/3600-142-0x0000000000400000-0x000000000041E000-memory.dmp

            Filesize

            120KB

          • memory/3600-179-0x00000000730A0000-0x0000000073850000-memory.dmp

            Filesize

            7.7MB

          • memory/3600-180-0x00000000050B0000-0x00000000050C0000-memory.dmp

            Filesize

            64KB

          • memory/4076-162-0x0000000000AF0000-0x0000000000AF9000-memory.dmp

            Filesize

            36KB

          • memory/4076-166-0x0000000000400000-0x0000000000999000-memory.dmp

            Filesize

            5.6MB

          • memory/4076-112-0x0000000000400000-0x0000000000999000-memory.dmp

            Filesize

            5.6MB

          • memory/4076-110-0x0000000000C80000-0x0000000000D80000-memory.dmp

            Filesize

            1024KB

          • memory/4076-104-0x0000000000AF0000-0x0000000000AF9000-memory.dmp

            Filesize

            36KB