Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2024, 04:26

General

  • Target

    b137fff4b205d540cccf36b16d3c5604.exe

  • Size

    4.7MB

  • MD5

    b137fff4b205d540cccf36b16d3c5604

  • SHA1

    010a3abe5fde6040fe5beb465eca26e4615ff89f

  • SHA256

    f0eef776c31bc4af21280f8b2e7f82dda4682fe97214347479b6500848324e87

  • SHA512

    2aff813bf96c90499ba21f1bcb7d78196eac3ca47cf93b1e9ade97b6e970134c4ed84e9b018f85ebe6000ea694ef2e736680a6554a523235f88c52d3de2916b2

  • SSDEEP

    98304:xZCvLUBsg3bsj4tZ+f/ufmD1H3K2lR2vOOlMi5aGFpG9jKbmdbqRF:xSLUCg3bsjl1H3Tl+lMikG29jiRF

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

pub1

C2

viacetequn.site:80

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b137fff4b205d540cccf36b16d3c5604.exe
    "C:\Users\Admin\AppData\Local\Temp\b137fff4b205d540cccf36b16d3c5604.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3312
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon1720268f847c3.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:564
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1720268f847c3.exe
          Mon1720268f847c3.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5016
          • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1720268f847c3.exe
            "C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1720268f847c3.exe" -a
            5⤵
            • Executes dropped EXE
            PID:4876
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon17f6c0b17fea56f.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17f6c0b17fea56f.exe
          Mon17f6c0b17fea56f.exe
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:820
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon1709bbd35ce59.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1709bbd35ce59.exe
          Mon1709bbd35ce59.exe
          4⤵
          • Executes dropped EXE
          PID:3112
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon17c34df3c4.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4952
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17c34df3c4.exe
          Mon17c34df3c4.exe
          4⤵
          • Executes dropped EXE
          PID:3852
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 1060
            5⤵
            • Program crash
            PID:5504
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon17c0a966a4ae2652.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4748
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17c0a966a4ae2652.exe
          Mon17c0a966a4ae2652.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2612
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon177ce99a7b2d0c381.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1804
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon177ce99a7b2d0c381.exe
          Mon177ce99a7b2d0c381.exe
          4⤵
          • Executes dropped EXE
          PID:4932
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon17bdc8f165d1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17bdc8f165d1.exe
          Mon17bdc8f165d1.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2104
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon173276f6f76039.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3228
        • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon173276f6f76039.exe
          Mon173276f6f76039.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\Windows\SysWOW64\dllhost.exe
            dllhost.exe
            5⤵
              PID:4172
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c cmd < Mummia.wmz
              5⤵
                PID:4780
                • C:\Windows\SysWOW64\cmd.exe
                  cmd
                  6⤵
                    PID:5144
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V /R "^utIhAQXzKFfZwKOfdWFWGYOHgvUbutPplngusOenUcoCKjfoSNGytadifqZtVmhGQyOCcHYBTuwlPjXeuMFabKtSouQdPYDxoCLEbNMlPtkXdusrrWXoUUouqWxgRHLUDGwhAaEzZcDzniBeO$" Pensavo.wmz
                      7⤵
                        PID:5232
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com
                        Prendero.exe.com z
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:5408
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com z
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:5636
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com
                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com z
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:5736
                      • C:\Windows\SysWOW64\PING.EXE
                        ping OAILVCNY -n 30
                        7⤵
                        • Runs ping.exe
                        PID:5440
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Mon1719bd2f41229b1c.exe
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1068
                • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1719bd2f41229b1c.exe
                  Mon1719bd2f41229b1c.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4880
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 564
                3⤵
                • Program crash
                PID:816
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4108 -ip 4108
            1⤵
              PID:900
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3852 -ip 3852
              1⤵
                PID:5464
              • C:\Windows\system32\dwm.exe
                "dwm.exe"
                1⤵
                • Checks SCSI registry key(s)
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:4704

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1709bbd35ce59.exe

                Filesize

                704KB

                MD5

                b353fa907b5efb0d93316418120ecced

                SHA1

                0fe850ad06c09c70c38fa37823ff23379cef749f

                SHA256

                961a537bf25304f0e326a57a7d6e88fe0686d13e4c4ae9763e8edf34e3e07849

                SHA512

                66daadae37b0274ab8efff03fdfb806526eb392036afa043904096c6ccdd071c92a21921037ed042782e75c05fce623300a518836e33abac2bebee973dd8ffff

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1709bbd35ce59.exe

                Filesize

                118KB

                MD5

                0098f11717eac29ba7684cf3bd49cc56

                SHA1

                9d47c25687598066888d69f5404b866ae2a0a9fe

                SHA256

                a19b0872abde5c9860a89ca574217a7115dd43af5a8c4d71dcca13361b8f6dd0

                SHA512

                b66f4fb597feca6b3e62fd8387f839f005442018a45a592e54cf47b82c79cb9770499b58207a1bc567c1ae934b3834f17b5a3d002dbd978fa490c7eb71c61885

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1719bd2f41229b1c.exe

                Filesize

                8KB

                MD5

                4ffcfe89a6f218943793ff6ea9bb5e79

                SHA1

                8ff66c6fe276857ba0ce6f533d383813e5ce6943

                SHA256

                710c8df4e791a0f4ac8a7351c0c718a6ddb685a3d57abfd2c064c398617bb9b1

                SHA512

                8c62a4e43657a7477acc630708205db74ecad794569408b7b0a57ee1ff111f798917b48c929133e8c199312ad797929a61fc69505a636347307edcd2eef2a5cb

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon1720268f847c3.exe

                Filesize

                56KB

                MD5

                c0d18a829910babf695b4fdaea21a047

                SHA1

                236a19746fe1a1063ebe077c8a0553566f92ef0f

                SHA256

                78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

                SHA512

                cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon173276f6f76039.exe

                Filesize

                701KB

                MD5

                4092fb3ea272e76f9d86066dc3c37ee5

                SHA1

                80aefddefe75afe3e350fb698a31f05ad6f5a36a

                SHA256

                f08df13fd49617c846ba9f61ef259537e2b3d6f69bf6d7d0d10c696daed0e377

                SHA512

                f17278d388064140d616ed407e98b734d1b4b820464e2b2ae03db6de8d20106196931ef9198669efc110758d9ee4184973e47cd84b5e14c32537e060ca834a2b

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon173276f6f76039.exe

                Filesize

                288KB

                MD5

                732eafc4a629ce3ccf5ebd52b6689ef0

                SHA1

                3f44e15e9b9b43ce99c19d0df0f963b6b14727b9

                SHA256

                5ca2edb422bdef189a54275ddb51eac43db79afa5d9ec97325608d5b15cde781

                SHA512

                785f44e097931fc2857ec150d69a0444c882d02d9512916473c0a20523c17fc2f7cb5b716bcc0a3f6b67a66590ae2f57f544ed84fdf2f041955db44214bad999

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon177ce99a7b2d0c381.exe

                Filesize

                601KB

                MD5

                4b112e3e932ad3ba52cb4b64a47dbfc5

                SHA1

                05cfb3eef9b4492e51e44d266bf885ba136185fb

                SHA256

                6fc2477559e46606a6499b374398a6ebb79c0be20a1cb49c0c1a27695bbb702a

                SHA512

                0da96f079cdc6b9cdb798653b21461213dfed8301d4e97434a1597f7562430c65c2c75ae5c8a6df5ddef57632047e32958abdc0ffb8996f4df2853a18cb72750

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon177ce99a7b2d0c381.exe

                Filesize

                1.4MB

                MD5

                44f8792deaec2d66c6d795bfb3716c7c

                SHA1

                c23c0f8a93402b2269124afb32bc835b7a63e212

                SHA256

                15743e8fc4534359efec59faad380fcae647748c3ee6d259a9db9335e9c8ce12

                SHA512

                9a3d8658fb719041598d2da89b7968e0c8486e93d8828f230ba5b127d9a9af01d6a955f09d8f83da760a94d97b0c156c545d589e8dbb69921f1c4b4f157a2616

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17bdc8f165d1.exe

                Filesize

                156KB

                MD5

                cda12ae37191467d0a7d151664ed74aa

                SHA1

                2625b2e142c848092aa4a51584143ab7ed7d33d2

                SHA256

                1e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e

                SHA512

                77c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17bdc8f165d1.exe

                Filesize

                121KB

                MD5

                0f3881756664040aa04daae5da6b6c92

                SHA1

                0d67160b303049b2d68c0afb579d5c1d16973c43

                SHA256

                bc04239747f2d2483cb7f3be7f48f192e9a1f88a354f24e4d2cc0e97c5abeea3

                SHA512

                21c391463975b1733556f5ec34a7d4fb0e768b096df05c649849e5f7e9c7ae3d402e912fc4f8969c85633cdfc2bfbb8d506d977850e39cbdcc391388eddb763d

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17c0a966a4ae2652.exe

                Filesize

                248KB

                MD5

                d23c06e25b4bd295e821274472263572

                SHA1

                9ad295ec3853dc465ae77f9479f8c4f76e2748b8

                SHA256

                f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c

                SHA512

                122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17c34df3c4.exe

                Filesize

                608KB

                MD5

                42b6c78fd88e0ce139615ca4a975bfc7

                SHA1

                5ec215ade32285be9a6b3e73031a9e351a5e4fdb

                SHA256

                73da47aba40b72752b6562114348f823e70e33ef2a2eb5cb16c914e6feffe0d0

                SHA512

                a7368df6e22f42c1ab60599ab4ecf2eba1fac8def2a8c411491173c881bbfafd014eb11a97067da6fbd3ded2c0daa3ae0574d259d8e13f210ecf40f16e06e6f3

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17c34df3c4.exe

                Filesize

                64KB

                MD5

                7fba81c78e59419c890276ebf4a12b6a

                SHA1

                b2f14750b608601646e97e9f403dda807c10850e

                SHA256

                0ef71f69d745b84f369f0602371a2dda98c2ad9472b5556477fb2e53ac1cbd96

                SHA512

                5a44dec24c83cdd3d4404f065a568db607a9cb3ffff5370e990c15fadea63835fbfb4047b2addf03bfc27a0aefd38e1d24659455a21def52a803e0465f37f656

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17f6c0b17fea56f.exe

                Filesize

                273KB

                MD5

                60530a7ed63de9bc252df9546aeda39a

                SHA1

                c68ff97648a93e459f15fadfdfaf093cc1ed294b

                SHA256

                59ca361ccf2ee773aa2dd151963e49af88bd8ddf099fc232a7ec7fa6f6540856

                SHA512

                5f5c208620f56cc881250fa53596248d0ab93ac83aba2897dacbfe1a79d27025b47812ccfd00dcb9375b0b1d6ec9d08af8073ef44cd3a192f7d5ded3f00a30f7

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\Mon17f6c0b17fea56f.exe

                Filesize

                116KB

                MD5

                57f8bc719231a8ff3f7d4908d61debad

                SHA1

                cb8ce31f6c65b3637eb8f757e20273b077c21a9f

                SHA256

                5840e0073ca5eb207762ed3f460d260f19d1e6cdf5e535094e6852408308c84d

                SHA512

                6aeab523293b67f155d2e87d7d0f49c39090b25d487c7b272f4cdcadc55d396105349391a8d2d151596df2d135da1a2a1abb8f4b5646188c8cdd61bd49e0e30d

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\libcurl.dll

                Filesize

                218KB

                MD5

                d09be1f47fd6b827c81a4812b4f7296f

                SHA1

                028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                SHA256

                0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                SHA512

                857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\libcurlpp.dll

                Filesize

                54KB

                MD5

                e6e578373c2e416289a8da55f1dc5e8e

                SHA1

                b601a229b66ec3d19c2369b36216c6f6eb1c063e

                SHA256

                43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                SHA512

                9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\libgcc_s_dw2-1.dll

                Filesize

                113KB

                MD5

                9aec524b616618b0d3d00b27b6f51da1

                SHA1

                64264300801a353db324d11738ffed876550e1d3

                SHA256

                59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                SHA512

                0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\libstdc++-6.dll

                Filesize

                647KB

                MD5

                5e279950775baae5fea04d2cc4526bcc

                SHA1

                8aef1e10031c3629512c43dd8b0b5d9060878453

                SHA256

                97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                SHA512

                666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\libwinpthread-1.dll

                Filesize

                69KB

                MD5

                1e0d62c34ff2e649ebc5c372065732ee

                SHA1

                fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                SHA256

                509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                SHA512

                3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\setup_install.exe

                Filesize

                2.1MB

                MD5

                67e880f38df7b1f3a84176c013fdccd0

                SHA1

                463426594a4b7b41fd5b8c71262317ffa58a88df

                SHA256

                9b2522cbe61581d04efeef855d7e9ee2018eb151ccddbdcc5e22886eaa733ada

                SHA512

                0362b12b726fe14bcf23316f24cf7f4b41f8e91a9cb740c33886d4b0d2e2e47771d5055f3138b5688d3b0a8276bea7776abd82f3ab3033bcd7e683c5b130fc20

              • C:\Users\Admin\AppData\Local\Temp\7zSC1C201E7\setup_install.exe

                Filesize

                209KB

                MD5

                659ee834cc3acc75964f38e5279f8c77

                SHA1

                a6a87a20ce6a8f9395a9bb6286799fc98bcc90c6

                SHA256

                b81c31e79f1063a86c717f7790f5da23bf53e6d0bdcd058e1548cba94a21fcd1

                SHA512

                355f5c7de7f9d554722715305757cf1d081e9488f4d0b2989ada8dfb623225c3f24e821172f755d8f9b4f07075cbc8e96ff89b0adcf1e205a8857469012c75a2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Copia.wmz

                Filesize

                576KB

                MD5

                f808367a40adeb851632267df832f1d0

                SHA1

                534119daeed8f244d271569dc642192b21e58305

                SHA256

                08820b1aaf6af53b25fdbce33d2da7dbcb26caed3c81efba69a30c20cf14dbd5

                SHA512

                a18f78c72d01b47b0b9e956a1e591f7c9327e9aff65e36f1b5d2e784d8958764c7349f2646d38b93a1f862f542b8d0d3889d01b6e4cecc87b81df4ebee6aff63

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mummia.wmz

                Filesize

                576B

                MD5

                6f6fe96279c933c2170e75f49cf43718

                SHA1

                bbe211eaebbeb120b9ca3cd204aacbbeef20cb7e

                SHA256

                e6919da4e2658c82ebbcca670053d77e1231a5a600bf5aeaba71e5852e09022f

                SHA512

                76160b79d3cbe2fca6d95b096043641a96b13007f287f8e55b94eab16cbb98691a8e8fa8d035da434e84f689bb8d36478f632976481b56c7170889553a629748

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pensavo.wmz

                Filesize

                872KB

                MD5

                3928f9cc043cfb53823761dac703fd04

                SHA1

                c825e75ae21b995996763487de07176230c2535e

                SHA256

                c2d4ebb0b7be8eb8683cc1fdcd0b95c834888c56d555e6d23497ae211835f412

                SHA512

                8739619195c9d1409819822ae3c53415ac57a1c485b6947022d81981c9a0c7811ea5a30af0ef32e0a34aacf589f74366866dc1e7e03cd4addf56b71b6b25d9c5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com

                Filesize

                640KB

                MD5

                8b38445e746b2ec0ed3bf2d56cb14303

                SHA1

                d173e734c49c09ff3cef1246148a4328a6901665

                SHA256

                bdcd123767cd44a5549c6ba42425068b2ae24b5a9375ea8911442086969b940e

                SHA512

                de080775651ab06aea070b4f7e84e331dec8b1b021d37d114e1a7d35869cb79e1a9e5d03021899a475cdb67266a74d394c6959ba4c2e787bcd71de5353a104cf

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com

                Filesize

                703KB

                MD5

                422e4dc6d007dfba8561879d79388a3c

                SHA1

                7f8c550b04e4130b2e8804d5aae08b15a2559ab5

                SHA256

                af1c8a922f720a4557411dacceaac019465d1a7bb4f24583dfda6f19baddb9c7

                SHA512

                ec176e6fb43679078c1087b9417d399fb7970083cd6a4e8ef6a01c816c00ca5ed040f008fe6f29855ffee9cc2cd73da2fd7988148dbed3f03be2f7a9b8b7656b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com

                Filesize

                832KB

                MD5

                761bbe1d198d387afdd9d47872be2f54

                SHA1

                cdbc213faf8a92b4ee24ed45ffd4a8a840847d35

                SHA256

                aa51476743f19d54c743d4b0cfae9f54beb08d8106dc184f86209bed0cefe558

                SHA512

                aee61e5cff241048741fc2f6e51f5edc7943127cbff8a17e11431b3903a60f500da31774b87228fd2008597f09b2865ea7492098e6a61c3954685c9de0b0fb31

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com

                Filesize

                872KB

                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z

                Filesize

                192KB

                MD5

                e2f46eebc7301555f4174f88ea265008

                SHA1

                d94348baac3f3bd5d6ab25537a377f90b474c982

                SHA256

                d51ac17242ee565c6f2942801608bf1067bf1f8129727dbcdcae37234e81f414

                SHA512

                bca094e8ad9350e15f19d5e5d994e6f9ddbb845bd6ef16532dbb9a844192338ed35ec69da2cf20b3cf77460847d29acd1cacfaf0bdd1ee861fc312ec70317676

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ik3r3ial.vpl.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • memory/820-145-0x0000000000400000-0x00000000023AE000-memory.dmp

                Filesize

                31.7MB

              • memory/820-107-0x0000000000400000-0x00000000023AE000-memory.dmp

                Filesize

                31.7MB

              • memory/820-104-0x00000000025A0000-0x00000000026A0000-memory.dmp

                Filesize

                1024KB

              • memory/820-105-0x0000000002510000-0x0000000002519000-memory.dmp

                Filesize

                36KB

              • memory/2104-103-0x000000001B7C0000-0x000000001B7D0000-memory.dmp

                Filesize

                64KB

              • memory/2104-125-0x00007FFE6C8E0000-0x00007FFE6D3A1000-memory.dmp

                Filesize

                10.8MB

              • memory/2104-86-0x00000000009A0000-0x00000000009CC000-memory.dmp

                Filesize

                176KB

              • memory/2104-89-0x00007FFE6C8E0000-0x00007FFE6D3A1000-memory.dmp

                Filesize

                10.8MB

              • memory/2104-88-0x0000000002A20000-0x0000000002A42000-memory.dmp

                Filesize

                136KB

              • memory/2612-192-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

                Filesize

                1024KB

              • memory/2612-193-0x0000000004CC0000-0x0000000004CE0000-memory.dmp

                Filesize

                128KB

              • memory/2612-188-0x0000000004B70000-0x0000000004B92000-memory.dmp

                Filesize

                136KB

              • memory/2612-187-0x0000000000400000-0x0000000002CCD000-memory.dmp

                Filesize

                40.8MB

              • memory/2612-206-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/2612-191-0x00000000072E0000-0x0000000007884000-memory.dmp

                Filesize

                5.6MB

              • memory/2612-194-0x0000000002D10000-0x0000000002D3F000-memory.dmp

                Filesize

                188KB

              • memory/2612-207-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/2612-208-0x00000000080D0000-0x00000000081DA000-memory.dmp

                Filesize

                1.0MB

              • memory/2612-211-0x0000000002DD0000-0x0000000002ED0000-memory.dmp

                Filesize

                1024KB

              • memory/2612-210-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/2612-196-0x0000000007890000-0x0000000007EA8000-memory.dmp

                Filesize

                6.1MB

              • memory/2612-205-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/2612-212-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/2612-197-0x0000000004D60000-0x0000000004D72000-memory.dmp

                Filesize

                72KB

              • memory/2612-203-0x0000000072C80000-0x0000000073430000-memory.dmp

                Filesize

                7.7MB

              • memory/2612-199-0x0000000007EF0000-0x0000000007F2C000-memory.dmp

                Filesize

                240KB

              • memory/2612-200-0x0000000000400000-0x0000000002CCD000-memory.dmp

                Filesize

                40.8MB

              • memory/3188-143-0x0000000002DE0000-0x0000000002DF6000-memory.dmp

                Filesize

                88KB

              • memory/3312-198-0x00000000077C0000-0x00000000077C8000-memory.dmp

                Filesize

                32KB

              • memory/3312-190-0x00000000076E0000-0x00000000076F4000-memory.dmp

                Filesize

                80KB

              • memory/3312-128-0x00000000061C0000-0x000000000620C000-memory.dmp

                Filesize

                304KB

              • memory/3312-123-0x0000000005C60000-0x0000000005FB4000-memory.dmp

                Filesize

                3.3MB

              • memory/3312-97-0x0000000002B70000-0x0000000002BA6000-memory.dmp

                Filesize

                216KB

              • memory/3312-111-0x0000000005AF0000-0x0000000005B56000-memory.dmp

                Filesize

                408KB

              • memory/3312-110-0x0000000005A80000-0x0000000005AE6000-memory.dmp

                Filesize

                408KB

              • memory/3312-204-0x0000000072C80000-0x0000000073430000-memory.dmp

                Filesize

                7.7MB

              • memory/3312-195-0x00000000077D0000-0x00000000077EA000-memory.dmp

                Filesize

                104KB

              • memory/3312-106-0x0000000005380000-0x00000000053A2000-memory.dmp

                Filesize

                136KB

              • memory/3312-99-0x0000000005450000-0x0000000005A78000-memory.dmp

                Filesize

                6.2MB

              • memory/3312-183-0x00000000071E0000-0x00000000071FA000-memory.dmp

                Filesize

                104KB

              • memory/3312-101-0x0000000004E10000-0x0000000004E20000-memory.dmp

                Filesize

                64KB

              • memory/3312-127-0x0000000006170000-0x000000000618E000-memory.dmp

                Filesize

                120KB

              • memory/3312-100-0x0000000004E10000-0x0000000004E20000-memory.dmp

                Filesize

                64KB

              • memory/3312-189-0x00000000076D0000-0x00000000076DE000-memory.dmp

                Filesize

                56KB

              • memory/3312-98-0x0000000072C80000-0x0000000073430000-memory.dmp

                Filesize

                7.7MB

              • memory/3312-186-0x00000000076A0000-0x00000000076B1000-memory.dmp

                Filesize

                68KB

              • memory/3312-164-0x0000000004E10000-0x0000000004E20000-memory.dmp

                Filesize

                64KB

              • memory/3312-185-0x0000000007710000-0x00000000077A6000-memory.dmp

                Filesize

                600KB

              • memory/3312-166-0x000000007F750000-0x000000007F760000-memory.dmp

                Filesize

                64KB

              • memory/3312-167-0x0000000007140000-0x0000000007172000-memory.dmp

                Filesize

                200KB

              • memory/3312-169-0x000000006EC20000-0x000000006EC6C000-memory.dmp

                Filesize

                304KB

              • memory/3312-179-0x0000000006710000-0x000000000672E000-memory.dmp

                Filesize

                120KB

              • memory/3312-180-0x0000000007410000-0x00000000074B3000-memory.dmp

                Filesize

                652KB

              • memory/3312-184-0x0000000007520000-0x000000000752A000-memory.dmp

                Filesize

                40KB

              • memory/3312-182-0x0000000007B40000-0x00000000081BA000-memory.dmp

                Filesize

                6.5MB

              • memory/3852-108-0x0000000004070000-0x000000000410D000-memory.dmp

                Filesize

                628KB

              • memory/3852-122-0x0000000000400000-0x0000000002402000-memory.dmp

                Filesize

                32.0MB

              • memory/3852-109-0x0000000002670000-0x0000000002770000-memory.dmp

                Filesize

                1024KB

              • memory/3852-162-0x0000000000400000-0x0000000002402000-memory.dmp

                Filesize

                32.0MB

              • memory/4108-155-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/4108-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/4108-157-0x000000006EB40000-0x000000006EB63000-memory.dmp

                Filesize

                140KB

              • memory/4108-51-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/4108-153-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/4108-154-0x0000000000400000-0x000000000051B000-memory.dmp

                Filesize

                1.1MB

              • memory/4108-151-0x0000000000400000-0x000000000051B000-memory.dmp

                Filesize

                1.1MB

              • memory/4108-55-0x0000000064940000-0x0000000064959000-memory.dmp

                Filesize

                100KB

              • memory/4108-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/4108-52-0x00000000007A0000-0x000000000082F000-memory.dmp

                Filesize

                572KB

              • memory/4108-44-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/4108-159-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/4108-152-0x0000000064940000-0x0000000064959000-memory.dmp

                Filesize

                100KB

              • memory/4108-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/4108-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/4108-53-0x000000006B440000-0x000000006B4CF000-memory.dmp

                Filesize

                572KB

              • memory/4108-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/4108-62-0x000000006B280000-0x000000006B2A6000-memory.dmp

                Filesize

                152KB

              • memory/4108-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/4108-60-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                Filesize

                1.5MB

              • memory/4880-209-0x0000000001640000-0x0000000001650000-memory.dmp

                Filesize

                64KB

              • memory/4880-96-0x0000000001640000-0x0000000001650000-memory.dmp

                Filesize

                64KB

              • memory/4880-87-0x00007FFE6C8E0000-0x00007FFE6D3A1000-memory.dmp

                Filesize

                10.8MB

              • memory/4880-85-0x0000000000D70000-0x0000000000D78000-memory.dmp

                Filesize

                32KB