Analysis

  • max time kernel
    44s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2024 07:02

General

  • Target

    setup_installer.exe

  • Size

    5.2MB

  • MD5

    d1f5ab6925535de239ea9f865dc00567

  • SHA1

    183134c16067b16ce99c9a8d82ca129c612863ef

  • SHA256

    987a2417a285a7e885e5acdd635d3e2dfa1cf00bb98b6a39fbc17bc7c3fb4993

  • SHA512

    c050ef1219d8c1977a1f67e36bd1232c487502a77419567f8372081e3e04064a80822b3c46e1bc931b921bbf013722660b961e4e88f6c5bd44fbf2bf872fb153

  • SSDEEP

    98304:xHCvLUBsgPc9Owr3MRJV1057hNd0ZkqAMUsy1X5rj8lXlWssUhndP3TsJQXtKOJe:xkLUCgPEMRJVQFgGIUNX5r4lUUhlTXti

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 3 IoCs
  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon02be65150e08b99.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3836
        • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02be65150e08b99.exe
          Mon02be65150e08b99.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3864
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 564
        3⤵
        • Program crash
        PID:2932
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon022fbe36b52bd.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4104
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon02c4d42768d7.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4900
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon02bee09ab5e7cf.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4564
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon02983a8f4b8e1dbe.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:760
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon025947de558e.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3644
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon02b24a3b9593.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3972
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon0230849f536.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4064
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon0260d56d9853.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1260
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3632
  • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon0260d56d9853.exe
    Mon0260d56d9853.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    PID:3500
    • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon0260d56d9853.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon0260d56d9853.exe" -a
      2⤵
      • Executes dropped EXE
      PID:3248
  • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon022fbe36b52bd.exe
    Mon022fbe36b52bd.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\dllhost.exe
      dllhost.exe
      2⤵
        PID:2848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Sfaldavano.xls
        2⤵
          PID:2308
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            3⤵
              PID:4392
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1868 -ip 1868
          1⤵
            PID:4428
          • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon0230849f536.exe
            Mon0230849f536.exe
            1⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:4488
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 376
              2⤵
              • Program crash
              PID:4136
          • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02bee09ab5e7cf.exe
            Mon02bee09ab5e7cf.exe
            1⤵
            • Executes dropped EXE
            PID:2636
          • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02b24a3b9593.exe
            Mon02b24a3b9593.exe
            1⤵
            • Executes dropped EXE
            PID:2632
          • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02c4d42768d7.exe
            Mon02c4d42768d7.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4544
          • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon025947de558e.exe
            Mon025947de558e.exe
            1⤵
            • Executes dropped EXE
            PID:5008
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1028
              2⤵
              • Program crash
              PID:656
          • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02983a8f4b8e1dbe.exe
            Mon02983a8f4b8e1dbe.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:748
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            1⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4216
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y
            1⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:492
          • C:\Windows\SysWOW64\PING.EXE
            ping AAKWQUEG -n 30
            1⤵
            • Runs ping.exe
            PID:2424
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com
            Amica.exe.com Y
            1⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3856
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5008 -ip 5008
            1⤵
              PID:3928
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^fARmmICHAETEVIAiewsqLILJhRoBwBFrurUNyycHHdHtUkLfezrMoLJHPojHmwGYYPnRONeXFJaxqGOwySnHnTVxzjYWSOiGKIutNTBfsuin$" Serravano.xls
              1⤵
                PID:4948
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4488 -ip 4488
                1⤵
                  PID:2704

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon022fbe36b52bd.exe

                  Filesize

                  268KB

                  MD5

                  8ba4d1ec4b0feaeb03d50e1dc5ea9e67

                  SHA1

                  4b4e078f0a7872f55e90d54ad937a40a808a049b

                  SHA256

                  c6c2cb7221e8972fb441b08e277092eebd53c6cd0cbc2e97f3a2260b60433c64

                  SHA512

                  c763837015f1efc655d787bd224d471648c35038720d9e2ac6ebdb3ee77f690850a1ab684cd7fb4429098abc7b91a3c5f28648ad7471d5ac642e1581e0b7932d

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon022fbe36b52bd.exe

                  Filesize

                  129KB

                  MD5

                  9fc69c82ca97cb304cf68c2dc5a01cff

                  SHA1

                  d9b87fbf08c056e90c58f17b6b72edfe79d5b640

                  SHA256

                  5fb534889f882eac0718be79666e379e1f07d9c1752fe559f36d086ec5d6db67

                  SHA512

                  640e99b4b12cc9f3980cb2bab02936c0699f2da84998dc3b2927ef3a8c846615b74bb7109934748797866a19e3da96284cbd415db18cd11e0c75c8fc8bfe867c

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon0230849f536.exe

                  Filesize

                  240KB

                  MD5

                  65253e0b27ff95199a7e4dc742043ce0

                  SHA1

                  bd21f63b22ab6b8b4939ba9a70e13a22070dbd32

                  SHA256

                  13dc4839c75b12d876c7f6ce9a1476e094acd41776afc356a637cd666f30d9a8

                  SHA512

                  edc369b7e713a17f073be6f5f4b1d9fc1d7ddc84ad25347f9695286a066ba39d768648fa34b4e253580b8bdca7094765a693ced84a485f4a53e0e89463425a75

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon0230849f536.exe

                  Filesize

                  259KB

                  MD5

                  cdf3f396570fcb67a58c818bc667e6ce

                  SHA1

                  d4672bd2cefba257aeaecac3c7e8bed8e6e880b2

                  SHA256

                  ffdc9c539337a003afc0f8c3b3c59daf4c62df3c6fc3df148bdde7debaef42a8

                  SHA512

                  4eab55fceb2bfd08348b83a7d92a3ce598b31e1be72200473c10e8b7e767fb5476ba165c3a333cf4ac7ceb53689cc04da73305842ab6e96b96bf411aaae444bc

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon025947de558e.exe

                  Filesize

                  513KB

                  MD5

                  08bebdc8f3e43102ae807549601ed592

                  SHA1

                  1751b2e359ee09ba6394066c369471605a1b6d24

                  SHA256

                  7c728360d4cd9d44143f008368e3e86aa0c2a1a74bcb445f1c332ba966c65062

                  SHA512

                  ea3c2512bc44cddef836c7c21f3f0026c3daf189fc026e16cf37dfa213fbbc0b5d3cadc3c32b04e464cafc016bd9a12d31b6deb14266cc966cf7adac7d3bc870

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon025947de558e.exe

                  Filesize

                  270KB

                  MD5

                  16bdba6c01c04b463202d9e575ff9c4e

                  SHA1

                  ccac25be56181b578d9681fee3fb2348cb6f4877

                  SHA256

                  1d41750281a24678d967e2760b6e2899d35b950e2a5a00b5a958a10fd4dc97a8

                  SHA512

                  a3d87ac22ff747ae300a234cb6354b49ac6dff3725fca74595b7e34953f8ed35afbfcd66a7776c7e2787fb18d3485e66596611f71d83251c0a217c8587d44b3d

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon0260d56d9853.exe

                  Filesize

                  56KB

                  MD5

                  c0d18a829910babf695b4fdaea21a047

                  SHA1

                  236a19746fe1a1063ebe077c8a0553566f92ef0f

                  SHA256

                  78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

                  SHA512

                  cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02983a8f4b8e1dbe.exe

                  Filesize

                  248KB

                  MD5

                  d23c06e25b4bd295e821274472263572

                  SHA1

                  9ad295ec3853dc465ae77f9479f8c4f76e2748b8

                  SHA256

                  f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c

                  SHA512

                  122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02b24a3b9593.exe

                  Filesize

                  481KB

                  MD5

                  f470c7165d18346b28fc9b452c4511e1

                  SHA1

                  7ed848a6b9802012efd6c2f23882335bc1edbe9c

                  SHA256

                  50cebe1326203dd2d9fb65956764e889fb29ff91728d9607b8f07f883f8f8550

                  SHA512

                  f1b6c41548bf0b65c25830e4ca8ae4a81874024d53d74bb5a9a18df0190700d4e84c75b01ee049a05685692919ee3b25e121a81d88a905030216df50a9127c09

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02b24a3b9593.exe

                  Filesize

                  197KB

                  MD5

                  2b6aa50ba2d8d776a7e2acad68da6aa8

                  SHA1

                  bf5b94f00e1cd516586cf4f5c7c506b6e5da018a

                  SHA256

                  d629dbf85f019397719464c26af785c4bb6ef776f61a643b5ef87964035feae6

                  SHA512

                  07567e5270f82a4c012ff91f7376fcc02cd993bd10db5d7b8a023a7569a25f1ce98349b044f05c1d5b75db7f119fa00eb21324bbd00c686a91b152857c92c62f

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02be65150e08b99.exe

                  Filesize

                  8KB

                  MD5

                  408f2c9252ad66429a8d5401f1833db3

                  SHA1

                  3829d2d03a728ecd59b38cc189525220a60c05db

                  SHA256

                  890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664

                  SHA512

                  d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02bee09ab5e7cf.exe

                  Filesize

                  277KB

                  MD5

                  9e4a31fd03c1c86cff1bd38a6ac8c119

                  SHA1

                  8100888b3151cbf8dd2d8a8299b3fc0e7cb3e028

                  SHA256

                  c624b863e631dceda42ced47e4dc7c4604642ff7550d66ef854536ea2a1656a6

                  SHA512

                  3715c3065f5d2a5dc9c9be5bb45231c226fb1c08033db11e79aea2c97912a88c1636b7e37d788d629ab1baffbc0b0018ccfd1561f4850bb46c63c4f30f5fc816

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02bee09ab5e7cf.exe

                  Filesize

                  140KB

                  MD5

                  c03b39ceaaddf3a7d58b591d6ac3fa39

                  SHA1

                  7c8f192260ddde4b146b9c49a60a0951edc30318

                  SHA256

                  a7e3b4b27beeb882607f904f5486bfb11438f35f6752b908a4b92b5d2832393b

                  SHA512

                  6377d9c6b7ac3a85e53e1a8b699102729f79c1be9b3579778e25a211fecbe375e774af0d56e6c719c9ad65956f092694228b8775906085c5d014a9bb267143f5

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02c4d42768d7.exe

                  Filesize

                  156KB

                  MD5

                  cda12ae37191467d0a7d151664ed74aa

                  SHA1

                  2625b2e142c848092aa4a51584143ab7ed7d33d2

                  SHA256

                  1e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e

                  SHA512

                  77c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\Mon02c4d42768d7.exe

                  Filesize

                  154KB

                  MD5

                  74f804c545e2c3a28b4772d167ea72d1

                  SHA1

                  6df0ac4f4113a7339c6e0a26e0d93490b4900085

                  SHA256

                  391bb1ef64591d1250463a6706d3e941117000e1e7ce06a9d8cea23c57ad3333

                  SHA512

                  08dd4bdcfd871df3471ad37f7a50d0542fe68d637668ca9071e52986250ddeaa859d25ee23198015ad6ea7d48273b955f707b92e3ad4b06ccf7cc54728dec5d8

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\libcurl.dll

                  Filesize

                  218KB

                  MD5

                  d09be1f47fd6b827c81a4812b4f7296f

                  SHA1

                  028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                  SHA256

                  0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                  SHA512

                  857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\libcurlpp.dll

                  Filesize

                  54KB

                  MD5

                  e6e578373c2e416289a8da55f1dc5e8e

                  SHA1

                  b601a229b66ec3d19c2369b36216c6f6eb1c063e

                  SHA256

                  43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                  SHA512

                  9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\libgcc_s_dw2-1.dll

                  Filesize

                  113KB

                  MD5

                  9aec524b616618b0d3d00b27b6f51da1

                  SHA1

                  64264300801a353db324d11738ffed876550e1d3

                  SHA256

                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                  SHA512

                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\libstdc++-6.dll

                  Filesize

                  436KB

                  MD5

                  4d41e25bda411d7cd894ef163f020728

                  SHA1

                  6d11cea313dfb43dfb951006e13ad857ce3a52c1

                  SHA256

                  8be5a1c9f22ce29deef01b2c2b9e15cff4ed6a176ddccdd7a7c0181595ba3912

                  SHA512

                  9273d087d342338e075f5e826453f6ef2c2ad3a34b317d764f4deddfd32cac30413f2618ddd3fd513cfb33dfbd8182c5fea85b83f0e0cfdc23e608e784580ab5

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\libstdc++-6.dll

                  Filesize

                  426KB

                  MD5

                  75f8bd7cca7d2ccec00b9e6b28f61c8e

                  SHA1

                  437bcf97274f3732fe04bc6d297b0a4d2acb6aff

                  SHA256

                  5dc2365ce8b760f4bef650bccb9ee54c9e718741aaf68567825f9641068f34b0

                  SHA512

                  fbcf6c1a884b0766cabc5e2dd67a784ad005926f9985a9928ea3cf2e92d17b764f509b15e91dbed366c42f002d60323e909b84d4ed615ba5046bb63f0964dad0

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\libwinpthread-1.dll

                  Filesize

                  69KB

                  MD5

                  1e0d62c34ff2e649ebc5c372065732ee

                  SHA1

                  fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                  SHA256

                  509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                  SHA512

                  3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\setup_install.exe

                  Filesize

                  1.8MB

                  MD5

                  980547b28f69cbe260e309c69a66653c

                  SHA1

                  8644f895d5966038f3ea30bd165f902809ffb66e

                  SHA256

                  3b17eb22b6a3f7bb44e16860f8f3075d3984c55a9b1fe3054e7ad375a7c95d4c

                  SHA512

                  fbd15408d70b567a8506a61a551bcf6b10b807f7042de94811444121b14bf0a6383732ed4b6372577b0a2245b0237cafd35c380d8ac9fdf900f4cfe8a8163f95

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\setup_install.exe

                  Filesize

                  599KB

                  MD5

                  3d5488967db1db3ef9742c6c25fedb4f

                  SHA1

                  8c733054fbd21c3507c1569784ddffed0c8d1ca3

                  SHA256

                  a091d69d097d1144d787905229c53df8007b78084e2529c82b9f6eda5a4bdb76

                  SHA512

                  e7ac0a5ea258618183b24069efe148664546ec41adfd649ee327f0332eaef8c415a0599543886e1c213e5893418bfde1b65f68bf34adcecc30ab21f0d1adf752

                • C:\Users\Admin\AppData\Local\Temp\7zSC5E00457\setup_install.exe

                  Filesize

                  319KB

                  MD5

                  f34373bb056015d341480143c4f0ebde

                  SHA1

                  123d4f52fefe8b145e2f75435af172f96f22f186

                  SHA256

                  b64b9859cd73e980e4cdc96bea41b6d58fedab350937861c2026acd3eb5e0749

                  SHA512

                  0221c70ae3889083064a8d698e25b883f593cc392bf82524f41f0919c0e9dd7d31e49d5ba2b83bd3f81815d78d765c16742c8c86b640cbead7b12c105b5f33e2

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                  Filesize

                  57KB

                  MD5

                  507e9c060e3ba87ee33fde655b2ec37c

                  SHA1

                  28e798d30fc916dc0dbed793c277ca4d390de640

                  SHA256

                  f14d90f0d47460622cb155b96f42cb4a08f785e2f19f98e9cdc2c296f8272c7d

                  SHA512

                  772f6de065d8de864c28d2ebefec1f1d6331048b9d373eb89e2494a60fb5ea74d95dead4b6bea6b652d04bec3217588046b16d850c3495806891ca9a05d4e84d

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                  Filesize

                  55KB

                  MD5

                  8cac3012e99372db65e2690e83d4d81e

                  SHA1

                  aadb32883634210de5e71d4b7d54c02dae61eb43

                  SHA256

                  96d6504294ac001f08c7e129c0cc1b7b89448614dfa4ca95c20f44157d294ccf

                  SHA512

                  4f6d6099aede202b53d1c10422cba04adc3fb784b44c47e049810383800ac930afece0f3f2b81327b514f5919da316072268df3775c4b7f2298031380917cf4b

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com

                  Filesize

                  658KB

                  MD5

                  733f5ee8c2b6208fa4ffad16446397df

                  SHA1

                  794570249276213113f7f40a8008762998f7ef56

                  SHA256

                  aab7990179a8793d934d40f60e28f23d103c9a233b62f47d3e51101619b4d2ef

                  SHA512

                  b2db99470dd80a28b1f7b42d304010ffb1f02680bf9b4b07467be19030cad2701cbc4dfc4eab50b3021555c8cbcf8be7248c383c59612221b85e7c2a10dc9a69

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Dov.xls

                  Filesize

                  1KB

                  MD5

                  cb021cacd68711f42fce889336cc199d

                  SHA1

                  301b86b89f45f1567830754af7bda0be0d85ef18

                  SHA256

                  e244db99d3c5300c63d7b2d3529a58d12015bd32f86986f09cd4cce0fd0b4d36

                  SHA512

                  bab57d49739e6e127a9e00ea23c80eb3e4365823b2298376d3f1856bbf79ac70a03383f49f78c91e49eca85602128ad9a398c37fec6e004dca228180b760ff36

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Serravano.xls

                  Filesize

                  189KB

                  MD5

                  bd784aee2bab3bcaafea4653cab46ce3

                  SHA1

                  15cfdb3493cc5d3a477bb7b00514ff0d06fe713c

                  SHA256

                  3745196766fd9ab7eedda387df13c6569fc1c37fcffbc87dbf945b7821f7dcfc

                  SHA512

                  160bb8c24e8b85399c6ac973db94e0bd4f41eec1382d638f6de7fadf6306d9f013365b039b8167adfba458107ad9fa5d98e293be19e790d8f9cf6619ccfbc964

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sfaldavano.xls

                  Filesize

                  526B

                  MD5

                  26ebbe10f1e4b7581ee0137b3263c744

                  SHA1

                  7f5b7949216744cbe8cde40f8b4762224cce8cc0

                  SHA256

                  376c16f256225ebadc257dab804c5bfbc1dde251a7aea7b55239d30261098495

                  SHA512

                  48014f2f9de728f0d5af3b072a11552e798e6de07f86ed2ff6448b7ac3dbacf582801ee128a175d17df2be9e0d7c27caf6dc455b4b4f5786868567aa41a4f8ed

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tornano.xls

                  Filesize

                  40KB

                  MD5

                  cf0f151aacfdfa6b7037caef352648ba

                  SHA1

                  9db1a90b72ff845b44e788a709d4a47e4eff9f2b

                  SHA256

                  6ac1f3db895dfce12e1d17a2bfe65ad0e1d4803043487b80a05cd6e46f58e2d2

                  SHA512

                  d5c86ab55137b7ad05fbdead37490238ae255f42312a8527bb96f17f3a1d440bac8e0b87fc0ef9923b93273fdda7b79c40c8e729369a36d7ddb58644d3322436

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Y

                  Filesize

                  74KB

                  MD5

                  c0e7a28e20f963f937ce864e6d4c879c

                  SHA1

                  263a775825e70f92c1b4bdcbacb571740934503f

                  SHA256

                  b28ae7610b81bce5fe28bd5eff689b6df6b08c2e1678dd553f2378d42add949e

                  SHA512

                  ade8d3adbcde4760ff50c6aee8e013a0e1f6620f11129914324766b31c6ab0d8af3d5c5bb55100c2754e729aaa02856e0c6e9c531782625165c717ee11314c95

                • C:\Users\Admin\AppData\Local\Temp\RgChLq3jw7oX\_Files\_Information.txt

                  Filesize

                  7KB

                  MD5

                  8656b92642b1956a2f728250a958f030

                  SHA1

                  d0a458252c1ac78fc0e512011ebe2c6307533e27

                  SHA256

                  a69449ce58928b5f3b6e815438e9bc5cec8773dd18df91666cf35a19dc8b3ce1

                  SHA512

                  696b5fb8a02a06ae2fa02de9a7061174b8d043e99f7b9699724a29897a0da300c6d274822d371971f942be4630e67553b326a410a8c63701cf4123f4d719e9e9

                • C:\Users\Admin\AppData\Local\Temp\RgChLq3jw7oX\_Files\_Screen_Desktop.jpeg

                  Filesize

                  46KB

                  MD5

                  9cae3add05697ef8a9750a83dd25016d

                  SHA1

                  36d2297780b64eeedd4d89318cbce7c603d9ad79

                  SHA256

                  2a0aea526c0ee37c33698760d0b0e3181a96da26baa3f5d24e7f41e3c8c72795

                  SHA512

                  768e94dde56f01a75f47341302ef366b8c8ed15ff350a049a3912c517bbe819d980809c62c57838a22c37f7e87100397457d59a0606c7903e75c633f57c7f541

                • C:\Users\Admin\AppData\Local\Temp\RgChLq3jw7oX\files_\system_info.txt

                  Filesize

                  7KB

                  MD5

                  9819197596bbebe58e7ff19ee10fc98b

                  SHA1

                  de0344fc2a53274c142571a27879539cb5953461

                  SHA256

                  5192f6a774e354489c929b3b9114265281a337c79a57541c3dc8b628dfc4dbf2

                  SHA512

                  87e2a150bce35480e7537c9bf60c7501308c5e2d7a290bae9e317e39273a4d87c545638c7359b128806005544b6d39907553c9386518f53d412d08adbaa5d072

                • C:\Users\Admin\AppData\Local\Temp\RgChLq3jw7oX\kP3Sxz0hmMQZ.zip

                  Filesize

                  40KB

                  MD5

                  c44c6f092d9b0a11e0ce60c046748d59

                  SHA1

                  0e52b5ebdb43474c329a4bb565e9950b5185aec8

                  SHA256

                  dfd4c91e6e205e16bd304a2877b3cbe360762b7850335bf9c1b9b1aff9da8eab

                  SHA512

                  80aa182ec014d68f08d79c39de623fed72811b4e8bd6339a5325670baf532ef2e89f5089e2a72631bbc8bfd6bcea0f3fb0d261f4978e8b696b084063f1125fbe

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rrkyzkuu.zs1.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • memory/492-222-0x0000000004830000-0x00000000048D3000-memory.dmp

                  Filesize

                  652KB

                • memory/492-221-0x0000000004830000-0x00000000048D3000-memory.dmp

                  Filesize

                  652KB

                • memory/492-219-0x0000000004830000-0x00000000048D3000-memory.dmp

                  Filesize

                  652KB

                • memory/492-220-0x0000000004830000-0x00000000048D3000-memory.dmp

                  Filesize

                  652KB

                • memory/492-223-0x0000000004830000-0x00000000048D3000-memory.dmp

                  Filesize

                  652KB

                • memory/492-224-0x0000000004830000-0x00000000048D3000-memory.dmp

                  Filesize

                  652KB

                • memory/748-207-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

                  Filesize

                  1024KB

                • memory/748-151-0x0000000007410000-0x0000000007420000-memory.dmp

                  Filesize

                  64KB

                • memory/748-152-0x0000000007410000-0x0000000007420000-memory.dmp

                  Filesize

                  64KB

                • memory/748-150-0x0000000007AB0000-0x0000000007BBA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/748-148-0x0000000007410000-0x0000000007420000-memory.dmp

                  Filesize

                  64KB

                • memory/748-147-0x00000000730A0000-0x0000000073850000-memory.dmp

                  Filesize

                  7.7MB

                • memory/748-144-0x00000000072E0000-0x00000000072F2000-memory.dmp

                  Filesize

                  72KB

                • memory/748-146-0x0000000000400000-0x0000000002CCD000-memory.dmp

                  Filesize

                  40.8MB

                • memory/748-145-0x0000000007300000-0x000000000733C000-memory.dmp

                  Filesize

                  240KB

                • memory/748-142-0x0000000007FF0000-0x0000000008608000-memory.dmp

                  Filesize

                  6.1MB

                • memory/748-135-0x0000000004C10000-0x0000000004C32000-memory.dmp

                  Filesize

                  136KB

                • memory/748-138-0x0000000007420000-0x00000000079C4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/748-139-0x0000000004EE0000-0x0000000004F00000-memory.dmp

                  Filesize

                  128KB

                • memory/748-137-0x00000000048D0000-0x00000000048FF000-memory.dmp

                  Filesize

                  188KB

                • memory/748-149-0x0000000007410000-0x0000000007420000-memory.dmp

                  Filesize

                  64KB

                • memory/748-136-0x0000000002DF0000-0x0000000002EF0000-memory.dmp

                  Filesize

                  1024KB

                • memory/1868-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1868-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/1868-130-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1868-52-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/1868-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1868-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/1868-128-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/1868-60-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/1868-125-0x0000000000400000-0x000000000051B000-memory.dmp

                  Filesize

                  1.1MB

                • memory/1868-50-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/1868-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1868-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/1868-62-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/1868-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1868-126-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/1868-56-0x0000000000770000-0x00000000007FF000-memory.dmp

                  Filesize

                  572KB

                • memory/1868-127-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/1868-129-0x000000006EB40000-0x000000006EB63000-memory.dmp

                  Filesize

                  140KB

                • memory/3480-200-0x0000000002660000-0x0000000002676000-memory.dmp

                  Filesize

                  88KB

                • memory/3864-85-0x00007FFDDFE70000-0x00007FFDE0931000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3864-79-0x00000000009B0000-0x00000000009B8000-memory.dmp

                  Filesize

                  32KB

                • memory/3864-171-0x00007FFDDFE70000-0x00007FFDE0931000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3864-206-0x000000001B660000-0x000000001B670000-memory.dmp

                  Filesize

                  64KB

                • memory/3864-100-0x000000001B660000-0x000000001B670000-memory.dmp

                  Filesize

                  64KB

                • memory/4216-99-0x00000000027F0000-0x0000000002800000-memory.dmp

                  Filesize

                  64KB

                • memory/4216-131-0x0000000005D70000-0x0000000005D8E000-memory.dmp

                  Filesize

                  120KB

                • memory/4216-173-0x00000000027F0000-0x0000000002800000-memory.dmp

                  Filesize

                  64KB

                • memory/4216-180-0x0000000006DE0000-0x0000000006DFA000-memory.dmp

                  Filesize

                  104KB

                • memory/4216-179-0x0000000007740000-0x0000000007DBA000-memory.dmp

                  Filesize

                  6.5MB

                • memory/4216-182-0x0000000007120000-0x000000000712A000-memory.dmp

                  Filesize

                  40KB

                • memory/4216-167-0x00000000062F0000-0x000000000630E000-memory.dmp

                  Filesize

                  120KB

                • memory/4216-186-0x0000000007310000-0x00000000073A6000-memory.dmp

                  Filesize

                  600KB

                • memory/4216-190-0x00000000072A0000-0x00000000072B1000-memory.dmp

                  Filesize

                  68KB

                • memory/4216-157-0x0000000074E30000-0x0000000074E7C000-memory.dmp

                  Filesize

                  304KB

                • memory/4216-132-0x0000000005E20000-0x0000000005E6C000-memory.dmp

                  Filesize

                  304KB

                • memory/4216-156-0x0000000006310000-0x0000000006342000-memory.dmp

                  Filesize

                  200KB

                • memory/4216-192-0x00000000072E0000-0x00000000072F4000-memory.dmp

                  Filesize

                  80KB

                • memory/4216-193-0x00000000073D0000-0x00000000073EA000-memory.dmp

                  Filesize

                  104KB

                • memory/4216-194-0x00000000073C0000-0x00000000073C8000-memory.dmp

                  Filesize

                  32KB

                • memory/4216-197-0x00000000730A0000-0x0000000073850000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4216-86-0x0000000002780000-0x00000000027B6000-memory.dmp

                  Filesize

                  216KB

                • memory/4216-98-0x00000000730A0000-0x0000000073850000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4216-191-0x00000000072D0000-0x00000000072DE000-memory.dmp

                  Filesize

                  56KB

                • memory/4216-172-0x0000000007010000-0x00000000070B3000-memory.dmp

                  Filesize

                  652KB

                • memory/4216-97-0x0000000004F70000-0x0000000005598000-memory.dmp

                  Filesize

                  6.2MB

                • memory/4216-103-0x00000000027F0000-0x0000000002800000-memory.dmp

                  Filesize

                  64KB

                • memory/4216-122-0x00000000058F0000-0x0000000005C44000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4216-121-0x0000000005880000-0x00000000058E6000-memory.dmp

                  Filesize

                  408KB

                • memory/4216-118-0x00000000056A0000-0x0000000005706000-memory.dmp

                  Filesize

                  408KB

                • memory/4216-108-0x0000000004DB0000-0x0000000004DD2000-memory.dmp

                  Filesize

                  136KB

                • memory/4488-204-0x00000000024F0000-0x00000000024F9000-memory.dmp

                  Filesize

                  36KB

                • memory/4488-110-0x0000000000400000-0x00000000023AB000-memory.dmp

                  Filesize

                  31.7MB

                • memory/4488-106-0x0000000002720000-0x0000000002820000-memory.dmp

                  Filesize

                  1024KB

                • memory/4488-107-0x00000000024F0000-0x00000000024F9000-memory.dmp

                  Filesize

                  36KB

                • memory/4488-203-0x0000000000400000-0x00000000023AB000-memory.dmp

                  Filesize

                  31.7MB

                • memory/4544-90-0x00000000012E0000-0x0000000001302000-memory.dmp

                  Filesize

                  136KB

                • memory/4544-84-0x0000000000B10000-0x0000000000B3C000-memory.dmp

                  Filesize

                  176KB

                • memory/4544-143-0x00007FFDDFE70000-0x00007FFDE0931000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4544-87-0x00007FFDDFE70000-0x00007FFDE0931000-memory.dmp

                  Filesize

                  10.8MB

                • memory/5008-104-0x0000000002900000-0x000000000299D000-memory.dmp

                  Filesize

                  628KB

                • memory/5008-198-0x0000000000400000-0x00000000023F9000-memory.dmp

                  Filesize

                  32.0MB

                • memory/5008-123-0x0000000000400000-0x00000000023F9000-memory.dmp

                  Filesize

                  32.0MB

                • memory/5008-105-0x0000000002440000-0x0000000002540000-memory.dmp

                  Filesize

                  1024KB

                • memory/5008-199-0x0000000002900000-0x000000000299D000-memory.dmp

                  Filesize

                  628KB