Analysis

  • max time kernel
    572s
  • max time network
    565s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 18:04

General

  • Target

    vmpdump.7z

  • Size

    38.6MB

  • MD5

    dc64a295999fc02fa96eb8061ee2c6c5

  • SHA1

    c9a4c578f16003c89edd8101ffd7b095528a8ec8

  • SHA256

    386383d05f446f2ced1cf5a6f5f2db71bb24631b14e76a68ac2fe63b0a3a2f47

  • SHA512

    939c035c12c53a3e59cdf8f3b648a3a143a1feba14f54bed15c88b156cec61ab2532f5a86a47bf4e7170715f75a96a0bb6932ead888852fc2f16c9563e38932f

  • SSDEEP

    786432:APo+katRsnFtkQQC6QmpmjwqXlht00/Sr/Q6qS7cr9d5oekCIDEoh:AP1kIRCk6672wqvR/uUYcr+eWh

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 37 IoCs
  • Modifies system executable filetype association 2 TTPs 6 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs net.exe
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\vmpdump.7z
    1⤵
    • Modifies registry class
    PID:400
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5092
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4680
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\vmpdump.7z"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1268
    • C:\Users\Admin\Desktop\release\x96dbg.exe
      "C:\Users\Admin\Desktop\release\x96dbg.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3108
      • C:\Users\Admin\Desktop\release\x96dbg.exe
        "C:\Users\Admin\Desktop\release\x96dbg.exe" ::install
        2⤵
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Modifies registry class
        PID:3240
    • C:\Users\Admin\Desktop\Loader (2).exe
      "C:\Users\Admin\Desktop\Loader (2).exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c net start w32time
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3908
        • C:\Windows\system32\net.exe
          net start w32time
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2272
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 start w32time
            4⤵
              PID:556
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c w32tm /resync /nowait
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1028
          • C:\Windows\system32\w32tm.exe
            w32tm /resync /nowait
            3⤵
              PID:4300
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1196
            • C:\Windows\system32\taskkill.exe
              taskkill /IM RainbowSix.exe /f
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3200
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ipconfig /flushdns
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4484
            • C:\Windows\system32\ipconfig.exe
              ipconfig /flushdns
              3⤵
              • Gathers network information
              PID:2960
        • C:\Users\Admin\Desktop\release\x96dbg.exe
          "C:\Users\Admin\Desktop\release\x96dbg.exe"
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3108
          • C:\Users\Admin\Desktop\release\x64\x64dbg.exe
            "C:\Users\Admin\Desktop\release\x64\x64dbg.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            • Modifies system certificate store
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3908
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:3752
          • C:\Users\Admin\Desktop\VMPDump.exe
            VMPDump.exe 3284 "" -ep=0x7FF79E6A2000 -disable-reloc
            2⤵
            • Executes dropped EXE
            PID:392
          • C:\Users\Admin\Desktop\VMPDump.exe
            VMPDump.exe 3284 "" -ep=00007FF79E6A2000
            2⤵
            • Executes dropped EXE
            PID:2488
          • C:\Users\Admin\Desktop\VMPDump.exe
            VMPDump.exe 3284 "" -ep=00007FF79ED81000
            2⤵
            • Executes dropped EXE
            PID:4860
        • C:\Windows\regedit.exe
          "C:\Windows\regedit.exe"
          1⤵
          • Runs regedit.exe
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2016

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Execution

        Command and Scripting Interpreter

        1
        T1059

        Persistence

        Event Triggered Execution

        1
        T1546

        Change Default File Association

        1
        T1546.001

        Privilege Escalation

        Event Triggered Execution

        1
        T1546

        Change Default File Association

        1
        T1546.001

        Defense Evasion

        Modify Registry

        2
        T1112

        Subvert Trust Controls

        1
        T1553

        Install Root Certificate

        1
        T1553.004

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        3
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Desktop\Loader (2).exe
          Filesize

          4.9MB

          MD5

          c01c4d326d65d94e05361c30821b2dbd

          SHA1

          16c0e2a2dff1e06cbdc5036d13a7444edc469193

          SHA256

          6a79b18a0b6ce048bd93586272612296073c5b7c252e13f378914a9d2d7fc9a2

          SHA512

          69ef9d5870d76e8175f5749b8ab24e9574c021fa8c2a0b0ea088bcd2ad93373efac252295395eb6f0d5896474d9f22275948dd79baded12a634e97e72f50abed

        • C:\Users\Admin\Desktop\Loader (2)_dump.exe
          Filesize

          9.9MB

          MD5

          719695afe1abc9f99eb11355cd2ec8f5

          SHA1

          31c565d19fe0fc3c9fcfb2c1d840f9275628cc94

          SHA256

          f15ab9fcfb3721e84cf34aa49d4ae07b64edb59443774c7c2ecc68dffa5b1747

          SHA512

          3f4a56a94071ee467dbbd64bf92bb0a296a66243cc86a5e36206b313819cd6f4b646bd5a85b037a0b613547a09e9832374b01088d124ee4556caab0f0642c5e0

        • C:\Users\Admin\Desktop\Loader (2)_dump_SCY.exe
          Filesize

          9.9MB

          MD5

          33939855807336dfb3fd0dc9aebd5a6d

          SHA1

          84803041ae21ce8f1f7974dd2f78521aca455109

          SHA256

          8ddb210f8f49c1e354fd175cadc93939b33bce666a88d085d99cfcb136c2545a

          SHA512

          bff5eb817f8cd02acfdc61ddfd2d9cef89cdca3f4370306c275fb32172e2e4d8145e3f7bf3e90e5f003ee9c5f6d67f9744d5816cc1360e44f294d352939139a6

        • C:\Users\Admin\Desktop\release\x32\x32dbg.exe
          Filesize

          149KB

          MD5

          34cfd7ec7100b547e24ed3dfdcb542c1

          SHA1

          36ad5e2bef4a70ffc14a57d57e739a452418a0d9

          SHA256

          8b751c1c576f791b8d6f53841ad5558da15b9131219e1b072102bad1bb84ead3

          SHA512

          13b218250f7a4a77993fb44ba8b118cf24eea534c5956685368a5c32e5c47a478d1de17b9be189c86c8e624f9121a62f0faa58652ae9ec613bfe3d0053e3bee8

        • C:\Users\Admin\Desktop\release\x64\DeviceNameResolver.dll
          Filesize

          74KB

          MD5

          1a4a1e71f2e948608ba80e901bb2b969

          SHA1

          6dbd88b0dd59ea30647ccda1830d33d454044990

          SHA256

          c6702029a705fb5db2775f31331b8314566dd84d9702b0c6ff513515c160629c

          SHA512

          a285f2ae8d9021da5c2e05ecef5b62945e442cf62c234fb748a8644f77d55462b129c6583e290cc6e7aa43055509c9d75f6eafa2a76bdd324fac1d8b5a07ee8a

        • C:\Users\Admin\Desktop\release\x64\LLVMDemangle.dll
          Filesize

          593KB

          MD5

          1228e59df447f4e6476546ae24638071

          SHA1

          7ec87e01e60f8f571684cc929fec414c224156e9

          SHA256

          8de391f11ceeafa007badf71b62560368f8c71623486ff1c2e4c5373fe482834

          SHA512

          acccedd27f10123e9f572d868fe11cd5d600b4f1a45a9e38fc263dd4d75cde022eb0d3c74fc3700148b4cfba7146c45d4591cda5fcbef8814427980658975c60

        • C:\Users\Admin\Desktop\release\x64\Qt5Core.dll
          Filesize

          5.3MB

          MD5

          2f997eb6ba34065496cb088f1489aebb

          SHA1

          29fd1c8a3e71cfbc49c9f160dce2749cecaf0cb6

          SHA256

          7a4cb4ced60598ed0a4f31dfdc01a8019df5cca6cbbfd3ec7f629edd99db6007

          SHA512

          4b1fd309cae1205bd3eff3b48b21893a20211356779b29c9f7739bbe6eabfa3e83e256e8406aa0af0b223b1376ec139e9605a0451359c0cccd21d3360477c233

        • C:\Users\Admin\Desktop\release\x64\Qt5Gui.dll
          Filesize

          5.7MB

          MD5

          0097fe1fdf80e2b515ab5ab2f6bad47c

          SHA1

          fce79b37dfc8b142dfd32c233c9ac9eec248bd6d

          SHA256

          3506bd2e291fe85a675d268e705f46dd0da7c274ec43dcb2330b8cee2b8c1d24

          SHA512

          cddb67a0d4bc60d7c26dfb4f03fbccc7d82ace7605b9d8fa20b46a970ffca134d5904303b91caa1e19b9c153a4b61ece3bde27095075dce344835e2cdbc531fc

        • C:\Users\Admin\Desktop\release\x64\Qt5Network.dll
          Filesize

          1.0MB

          MD5

          911b28d088a35d3f56a23a63ee837dca

          SHA1

          c110efd1c33bd8ffc2062f92a95c8f915a8db6f7

          SHA256

          4708ed9604e731f3b7b9b1fd774f3962a80bdf36a1845a3bb7684e8507eb0be0

          SHA512

          f645cfee2c5a348f01b1aa0ff3b7a039dd47117c86390b7d5fedf253ffaac1894edc36949b29776a0ab24680d022ad468d9468fe9e470d05f7178a5e9ac8df6a

        • C:\Users\Admin\Desktop\release\x64\Qt5Svg.dll
          Filesize

          312KB

          MD5

          b2c941e7a8b23664b36c70a655acd958

          SHA1

          3fb796251fec2ed2b2bc9c87008361992616e945

          SHA256

          78a031f1a8254e20c3e63357a2a87f8f6f2ba807e8edd74df6c2539b019ec309

          SHA512

          bfea52e55261f1fbfc9b6c8c5bde587dc0fcc29dbda5a4cb05bd30fb3ebc8ad024cf75cb9bffb04b5f8228c17adb1fa1cc1023178297f6a3efbfaf3a86a37edc

        • C:\Users\Admin\Desktop\release\x64\Qt5Widgets.dll
          Filesize

          5.3MB

          MD5

          82a8cd1f9b519d1aa8e6ad779c9e5c4f

          SHA1

          536da03f5389ea83009436a3197ec860ac6f0448

          SHA256

          6fbc262e506dc957dfdf72852cfc3b2c8b7850ec5eef4dc30f9fc9e066a8b911

          SHA512

          a7f178291f65edc4d4de2dddba624dc1b0c51c1b45ed92c0c35d5b3ecb496a0b8308fc1244b8846991d7580a684a9dadda1aab6f04bf4cac13ddc0cd2be31429

        • C:\Users\Admin\Desktop\release\x64\Qt5WinExtras.dll
          Filesize

          284KB

          MD5

          de7154814975f02e171f637f8222f8b1

          SHA1

          33198b358078341748ce5ea01ed8caf85501e0ce

          SHA256

          8dc1c6ad37a164639ef75093d8a0179f6f8efdf1a22877c59bac745968738e6d

          SHA512

          dde3c8e0fa96627dfe9ffe1067a9afacde3a69fc7ddc43d5823d091e4c449182b4c90a3fe7823f8480d889da2ae72a835b088ead54e135a197e5ad63efd4f4cf

        • C:\Users\Admin\Desktop\release\x64\TitanEngine.dll
          Filesize

          616KB

          MD5

          9140a45af6c323d407b7af06aae4d816

          SHA1

          f88bbb6fcab811ba3b3459f35b390fd6bbe561f5

          SHA256

          a1e643f082115df56c10238246fd2da0a65547ee9859024e3140de0b2843019c

          SHA512

          156122f7e55316235e3599cc9bceb9e7e49f3ad66555f26cf4b62b86d4399cc7fecb20c6de7e3af1bb4494cdab930745926e8fc4c216643df289003b00273aa9

        • C:\Users\Admin\Desktop\release\x64\XEDParse.dll
          Filesize

          1.4MB

          MD5

          e9d2d4b4e5c2eaed37f9e27232339858

          SHA1

          b6ef7424c927b788e5875198c690e96be1f23f99

          SHA256

          7237ace651d8ae8e3285c9a0256bf34d50e7a4c9722ce016bbcf74e80c3071d6

          SHA512

          5444f5516c74a96cd3152039469ea79f0e7d9262f21410a8e92593e4f870c2da3b8c67a4c85c742338ee6af582fc905ecb4f3704096dca3a791377e48aa1dd2a

        • C:\Users\Admin\Desktop\release\x64\dbghelp.dll
          Filesize

          1.4MB

          MD5

          65ce67f745501049e0ca0f970e3d283f

          SHA1

          dc2ee958785e5b5ec2da602daae2e86a37bc156f

          SHA256

          5dff20c99a370dc5cc37949c2d749b084d2d7af1c29758121cb0e16ee15034f0

          SHA512

          4248bfa9797a248a450686ba5c35d09dad1a76c52f94f1eed374e2f40c379fe929ebeedcebb090422fb61f49b898bb05f4ab25455f8ad5214d4439961bbbb015

        • C:\Users\Admin\Desktop\release\x64\imageformats\qgif.dll
          Filesize

          38KB

          MD5

          506a7c157ca05b5478b513b6b52f7b71

          SHA1

          54d5d132a7aaa857d33c0e118a56283a862be84a

          SHA256

          c2fce71c35bd6e22e2ea3a7e0554fe9a726f55d7027bcdbe587fab8983c3e421

          SHA512

          d4207de7eb2fff4f305209a3f4e51190eb6d2168a333dfaafe5cf00ffd838a0f6d324d3db50a35e696cd1dec4bce593201155ce231270679a15f0deaaaa1a42e

        • C:\Users\Admin\Desktop\release\x64\imageformats\qicns.dll
          Filesize

          45KB

          MD5

          f33b24d2e545afe46385879a57f8dbc7

          SHA1

          0ae0880f9ac8f5c2c2c1064479b20f88e280101d

          SHA256

          0a0f36c046fff544e335a0d0d80a2c36ac6064f474793426172899fe85d3e91d

          SHA512

          069ff4d9acd3adf9eed58bc210d758b5c35d8e34bdf2305cb8514593be3c3b41ece216895dbed3f986bebaf3839b7c5efb5f4f02e8b4999c75e6d4595d910ad8

        • C:\Users\Admin\Desktop\release\x64\imageformats\qico.dll
          Filesize

          39KB

          MD5

          e16542376c59af7240393f39ee36781a

          SHA1

          cf35dd7d08bc091d8a48cfd46f1b0eb9f14ff5fb

          SHA256

          98aa16bc5192ec26ba1ba6b290acd984d50732a91e563eaa1016bcf923643f7e

          SHA512

          96482eef825dada740e5cbf67d69125f7f038a93b75f76027a8f7af71156b0b9f0b5fd83c9138c1b40a5ecfdc2719c1349a29cd5a9240189b884d167b8511adb

        • C:\Users\Admin\Desktop\release\x64\imageformats\qjpeg.dll
          Filesize

          240KB

          MD5

          e082093ac545273490e3dcd92116b8e1

          SHA1

          c97a9e505482cd655bcc485ce3230a1649c7df28

          SHA256

          1a0d4ded8487a727b27dff67ef2f3794d40e1bab2e4d42b8250cc1e8525f5faa

          SHA512

          cf28e70d29230eb82229db372781429ab1c3cd9f1ed9a577c12641155484c12e6052cc3061ddf3ebd970bd84768b157dcd71ca41113102259d5fa2a0b94fdc60

        • C:\Users\Admin\Desktop\release\x64\imageformats\qsvg.dll
          Filesize

          32KB

          MD5

          db0ea846f201e4eb446160d18e80fa3a

          SHA1

          0f3075f63b70cf02297c9f22ad1896bfc996eac4

          SHA256

          0548ef18dec7ee2d6d2ff51cd0e78136f9f6002fa389158df2ac841425201ec5

          SHA512

          81bcccf2d8be8857cdeb524b616175f3c707a7340b1b0753db1fa800b7d01c0e2fd66d32ad48f5935bb6f2c0cdb4eb1c64dc54e18d65391001a9ffd0492dcb38

        • C:\Users\Admin\Desktop\release\x64\imageformats\qtga.dll
          Filesize

          31KB

          MD5

          c179cb633c05651ff0cdec84cdd71b5a

          SHA1

          cd9510003824b3ed2257770a86ad5f2c29f6e676

          SHA256

          37d36178f5c4e0bc546e05951c4da799ca21fa82690c0fdef1f1761703fd1b66

          SHA512

          37ee1faaea5297d3a77ce259ec14dc528c901f59f427bb448333f5bd6298eb21958f918d1846f147968c1695fef09886453d6a741886d9e4a8b87bf7053200cb

        • C:\Users\Admin\Desktop\release\x64\imageformats\qtiff.dll
          Filesize

          355KB

          MD5

          f860955e157bbc2972d9804486c54bd9

          SHA1

          40b9340cd934046b944c7ec1abf19a355f082892

          SHA256

          b9a79722472ffaa7a8e3025254fcd053ee1193ffd59353d8e9f28de99ffe7ed4

          SHA512

          3e4731196932f93955895b2eccae29b18a6d90eee1f8dbb4a1044cf833afab69ffced1f4f673cefdd7689d4f40ad81acd642944cda01811bbbb892c70e4379b5

        • C:\Users\Admin\Desktop\release\x64\jansson.dll
          Filesize

          146KB

          MD5

          89d701f3bcd052251e023441d5fdf97f

          SHA1

          3771038e2de2135d9bfb62254fe83e5c996a9e53

          SHA256

          eb704b761c638dc9cc4690941dd0de71e4f0575280d41243a5b0d40ebd38f4e8

          SHA512

          ea377bb175ba51a63625352156ed4c848868def18af9bfdcb0eb76bab6b4b63ef091ef5ece49f47de652d508bd437f2f113766b86fe53ca1174fb1c13cd4b122

        • C:\Users\Admin\Desktop\release\x64\ldconvert.dll
          Filesize

          56KB

          MD5

          5ed39b88a4a05adde32153e5d583e424

          SHA1

          c139a5761b5e8e2cb06c3229d70ee6eea9bfad9d

          SHA256

          293539875b478fc2b554104f8c1e0e80a169e75c829a5b882e10b601e6e99744

          SHA512

          9c9e438abca22502e0430bae7cb3292ff768cb9de0ab06ec1bf261ac2b67750a0172b084b05e7b21f786feac622990edb674619602d118e94e8b0202cc5fd3e0

        • C:\Users\Admin\Desktop\release\x64\lz4.dll
          Filesize

          96KB

          MD5

          be36901afd7394b0355d787c407d2d5f

          SHA1

          1d9c3bb6d06efd4b56a55140361f747e0b40d475

          SHA256

          5cfae56f5319dc343799ac7e9738bc367f9843ce4bf4e795d2ee2ca268fa9c5d

          SHA512

          1356c7cc6ab1625d0fa055ed57fb79e4009fd354b72c4e4357d07a9c8c40e8dc2389cc9134638daea4a6f065d5457d60985a9c378fd9d53748621a4c9a14c019

        • C:\Users\Admin\Desktop\release\x64\msdia140.dll
          Filesize

          1.5MB

          MD5

          73e0349829750676b7791ac210e304e8

          SHA1

          38d8faa45f57ea050bff328bf0f23a8cd1f4e73f

          SHA256

          46351bd350799dc196481cbe2b26f628b489a280a9e2f49bace71930f3dc80d3

          SHA512

          7ae086c3dec0fb33a648cc2bd5fde69804b6b752e05c6ef4f45c00780b13ba086183a9adc4c432e38748d05c551107c3ab01fcbb8e29d966588a3ab220e4e311

        • C:\Users\Admin\Desktop\release\x64\msvcp120.dll
          Filesize

          644KB

          MD5

          edef53778eaafe476ee523be5c2ab67f

          SHA1

          58c416508913045f99cdf559f31e71f88626f6de

          SHA256

          92faedd18a29e1bd2dd27a1d805ea5aa3e73b954a625af45a74f49d49506d20f

          SHA512

          7fc931c69aca6a09924c84f57a4a2bcf506859ab02f622d858e9e13d5917c5d3bdd475ba88f7a7e537bdae84ca3df9c3a7c56b2b0ca3c2d463bd7e9b905e2ef8

        • C:\Users\Admin\Desktop\release\x64\msvcr120.dll
          Filesize

          940KB

          MD5

          aeb29ccc27e16c4fd223a00189b44524

          SHA1

          45a6671c64f353c79c0060bdafea0ceb5ad889be

          SHA256

          d28c7ab34842b6149609bd4e6b566ddab8b891f0d5062480a253ef20a6a2caaa

          SHA512

          2ec4d768a07cfa19d7a30cbd1a94d97ba4f296194b9c725cef8e50a2078e9e593a460e4296e033a05b191dc863acf6879d50c2242e82fe00054ca1952628e006

        • C:\Users\Admin\Desktop\release\x64\platforms\qwindows.dll
          Filesize

          1.2MB

          MD5

          0cdac0e449902682182f78a552c35de2

          SHA1

          c370e79c472c4973178a9b666194edceb1c02a62

          SHA256

          85dbcaf6965fb146cde7825465add3e890e13d2c67390b8b3c6fbcaecd503c68

          SHA512

          9516091abb61b91dd0c90d2e85f6de1463f075e64451dab48b535a119d5a04e66cfe674ee85c8ac41772c98d22c946f8be85f0d80c2e50c247939fc66aaa7cff

        • C:\Users\Admin\Desktop\release\x64\x64bridge.dll
          Filesize

          79KB

          MD5

          58a5476c8e0b246c94af424bf6ac702c

          SHA1

          01892338b713c4bee324cb66e10219ca388a86b4

          SHA256

          1083e59d245346dfd3ef63be9f1356566d7477dd01b590af6fa561906db340ff

          SHA512

          eeee314efa5b51bd0750c00a7033768d626576879d3128c178cb0938b0dc8d6f25691a373114f84705fe1f288e3b46395ea8f7848fe91cc0383667040fc432d1

        • C:\Users\Admin\Desktop\release\x64\x64dbg.dll
          Filesize

          2.3MB

          MD5

          6354d60af7f57c4632c747b89bbbec67

          SHA1

          ab39ad955c55414e11ef35d604fb7a7909e02580

          SHA256

          71311f45295cab63218b09249c91d10db550a3e0e256b374ea6c5245df4cb098

          SHA512

          7dfc65f53fb86218e78323c675e06444b35469bb6864f50e090e257b34a78e79314e0a0b71106976c8531d12892d7b9d6298badce10b533ee981680dbbb7bb81

        • C:\Users\Admin\Desktop\release\x64\x64dbg.exe
          Filesize

          168KB

          MD5

          482234b3d240cb76ba010d5c6a311203

          SHA1

          3931de392e3aec3375bd44abd6891e173c2ac8c0

          SHA256

          2be029aff5ca913a79a505c234ecafd815aa9db2c9a7f5840c7cdcbc3c5b725a

          SHA512

          d570022a18a9fd72a0a332d158ab5b24dd43841454cbed21de114fc97af838d66145570b6bb0b123ee1ba4d8603ab3eced47a0aca319757768c4ded656f4840f

        • C:\Users\Admin\Desktop\release\x96dbg.exe
          Filesize

          157KB

          MD5

          ca6a7c940d14398ea38a64f553bbb42a

          SHA1

          55555cd5e6586101e1a59972241906c1533f07c9

          SHA256

          f5f705c491a6cb11e14e1ea30523e76351996aa23ded1382382dfd96d01678ca

          SHA512

          9f7db35c4fe0b7717912f6d51fba104ed7771b368265a2f21ff104e3949ad0291adffd6fc268c412fa5c7e4110052e9677f9bfc95522fd324f58ef556f6ff8fb

        • C:\Users\Admin\Desktop\release\x96dbg.ini
          Filesize

          122B

          MD5

          45c1e010baaeb6b086b93c73cbfa1433

          SHA1

          6570b66b77103aac30dc7cccfacde1e42413890a

          SHA256

          672875a23347e407ff4a54c6baa35090c7041fa45568437f12b86b50bc2fbebc

          SHA512

          6b00d4050ad80dc575b056e40b3fdae831e57d1b035fc7500c1523c70c7f03f344e8b53b070ec3c8482fcb7c300d401260502ba4c04076ee23db66c236d3ad50

        • memory/3284-373-0x00007FF79E3A0000-0x00007FF79ED83000-memory.dmp
          Filesize

          9.9MB

        • memory/3908-432-0x000000005EB70000-0x000000005F0BA000-memory.dmp
          Filesize

          5.3MB

        • memory/3908-455-0x000000005F620000-0x000000005F635000-memory.dmp
          Filesize

          84KB

        • memory/3908-456-0x0000012E1D130000-0x0000012E1D131000-memory.dmp
          Filesize

          4KB

        • memory/3908-459-0x0000012E1D130000-0x0000012E1D131000-memory.dmp
          Filesize

          4KB

        • memory/3908-453-0x00007FF9C80F0000-0x00007FF9C8675000-memory.dmp
          Filesize

          5.5MB

        • memory/3908-510-0x0000012E1D120000-0x0000012E1D130000-memory.dmp
          Filesize

          64KB

        • memory/3908-511-0x000000005F620000-0x000000005F635000-memory.dmp
          Filesize

          84KB

        • memory/3908-522-0x000000005F620000-0x000000005F635000-memory.dmp
          Filesize

          84KB

        • memory/3908-523-0x0000012E1D120000-0x0000012E1D130000-memory.dmp
          Filesize

          64KB