Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2024, 21:42

General

  • Target

    Guide.exe

  • Size

    25.1MB

  • MD5

    298759d9863879a080bdb0f10b634947

  • SHA1

    e68509da202d00f5396a78ff9ad57333c23ccf82

  • SHA256

    7e2458cfe24cb649c259bfd4993f8d9650ba086f99a225408111a37aa21f71d2

  • SHA512

    1447b44ce49794fa20ea35e5abda531468570395c70cc91ed890fcb5c867627a13fa64fb6cfc3a58606a3fc348fde4f6299a594a62f473206a454adcb58ed05e

  • SSDEEP

    786432:FSgY6GZrzqKmTmb1zOKNQHNgoG49hwpgYZV/:FNgqKmab1kZ/BYZ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Guide.exe
    "C:\Users\Admin\AppData\Local\Temp\Guide.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Roaming\POPE\rndll86.exe
      "C:\Users\Admin\AppData\Roaming\POPE\rndll86.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2616
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x39c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1016
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4752
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:1360
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:644
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2064
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2336
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\AL72F0OC\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ACKB59U\network[1].js

    Filesize

    14KB

    MD5

    a36f25447b3d55d31fdfdc30fa31c3f6

    SHA1

    81154e36fdda94a482fb7f079ef683fa3af68f1b

    SHA256

    1432216f926190d39c5e9b17f38a4e075c692650eddb3df32e2a55d6b3eb6f9f

    SHA512

    2b396c5f278953dfb1ffa324e35150cd375218cc993510fc1643df68847d7d951efe2208423fd8f467a46f4b14fd8b3d7af06c7d24ab8f1753789cfc920587fe

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ACKB59U\www-main-desktop-player-skeleton[1].css

    Filesize

    2KB

    MD5

    2a5f27d8d291d864d13eaa1f5cd9cd51

    SHA1

    b39f9b99b924e5251ac48fad818d78999cfd78d4

    SHA256

    056232b6127143e2f8bf4218db355d978e1e96f5dedcce59a9f5d6ab92b437f1

    SHA512

    1b54f1e13cb38e41f2a65db3cdc2bc702a9e963751b1ef0338d67b95816441b0143e1d4dabc99f276a04f9c00570bb8933f1bd87394998b3878c268b08ecf24a

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ACKB59U\www-main-desktop-watch-page-skeleton[1].css

    Filesize

    8KB

    MD5

    64c8e3b11cfffc8ebf2240e4f46ab492

    SHA1

    71276680811731f983502e477a87e87cfe72d75f

    SHA256

    3acc199c41eb3c884ee9884c15e6b78975499be2255aa203dba38ef24440181c

    SHA512

    497a48233bb198e05517e2cba003c2c5ba25183e1654b5b8252b9823f0859497ccab66a77e243238b27ea6eb826ae4fc72efb2f32b2b378edee7f9dfb87f4756

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BKT0RXTR\css2[1].css

    Filesize

    2KB

    MD5

    5912f3bba71c222672dfa244a60acef0

    SHA1

    317a49729bb8654c3986e6b32278258a1d692d81

    SHA256

    48708ab3b01bc53a736f7f85e0badd9174872faa981e78b32c16c4efcaa59d99

    SHA512

    770f13af0d6ebe7ff9d925efccd05b0b2e5afd5fbe19770562d88936d541a298a49aea028f5122a255fb5026b4a5f37c0cf52831212ecaaf378a5769ff0379f7

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BKT0RXTR\rs=AGKMywHxO4NIyQ65o9RWqNu4v7yvPPaDWQ[1].css

    Filesize

    2.7MB

    MD5

    b67f6051f814c5085479d1b6509e09f4

    SHA1

    3036e0693c90aca42cb19a02b46ade8a98c9ab22

    SHA256

    e8433ea97ddfe418371f99ef50be9d288661dc8cf348b0cfa39a985edc7fb509

    SHA512

    1a1e2a5cad6ff27616b620fa464efc69dc44eddb9ad5e53daf906e6512cff1816b76b5d2b13265e9ae96b75a49dfd42a4a3319799e70af79c5cd52ca3b315e7b

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\BKT0RXTR\www-onepick[1].css

    Filesize

    739B

    MD5

    9ace9ca4e10a48822a48955cbd3f94d0

    SHA1

    1f0efa2ee544e5b7a98de5201fb8254b6f3eb613

    SHA256

    f8fdbb9c5cdceb1363bb04c5e89b3288ea30d79ef1a332e7a06c7195dd2e0ec4

    SHA512

    25354aeecb224fd6d863c0253cd7ad382dce7067f4147790ee0ce343f8c3e0efb84e54dd174116e7ad52d4a7e05735039fa1085b739abbe80f9e318e432eed73

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\HD22TT6X\intersection-observer.min[1].js

    Filesize

    5KB

    MD5

    936a7c8159737df8dce532f9ea4d38b4

    SHA1

    8834ea22eff1bdfd35d2ef3f76d0e552e75e83c5

    SHA256

    3ea95af77e18116ed0e8b52bb2c0794d1259150671e02994ac2a8845bd1ad5b9

    SHA512

    54471260a278d5e740782524392249427366c56b288c302c73d643a24c96d99a487507fbe1c47e050a52144713dfeb64cd37bc6359f443ce5f8feb1a2856a70a

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\HD22TT6X\scheduler[1].js

    Filesize

    9KB

    MD5

    dac3d45d4ce59d457459a8dbfcd30232

    SHA1

    946dd6b08eb3cf2d063410f9ef2636d648ddb747

    SHA256

    58ae013b8e95b7667124263f632b49a10acf7da2889547f2d9e4b279708a29f0

    SHA512

    4f190ce27669725dac9cf944eafed150e16b5f9c1e16a0bbf715de67b9b5a44369c4835da36e37b2786aaf38103fdc1f7de3f60d0dc50163f2528d514ebe2243

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\HD22TT6X\www-i18n-constants[1].js

    Filesize

    5KB

    MD5

    f3356b556175318cf67ab48f11f2421b

    SHA1

    ace644324f1ce43e3968401ecf7f6c02ce78f8b7

    SHA256

    263c24ac72cb26ab60b4b2911da2b45fef9b1fe69bbb7df59191bb4c1e9969cd

    SHA512

    a2e5b90b1944a9d8096ae767d73db0ec5f12691cf1aebd870ad8e55902ceb81b27a3c099d924c17d3d51f7dbc4c3dd71d1b63eb9d3048e37f71b2f323681b0ad

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\HD22TT6X\www-player[1].css

    Filesize

    372KB

    MD5

    23e4fc48ac24d8114a5713a0d4cf1472

    SHA1

    19803fc9a9e999144e7dc61fa97fa5f136b49dde

    SHA256

    f8e82dfee82ba0db0ddeb04e79a82fa7b2e3a6bcb22736cc1397851adec3607f

    SHA512

    eae622fdbb8613ba03c416c413ba7af7772cb03ce493b223a787910653a68bc5af281cb34ceefd079a986d819098518b0de188423ea05563dd3f94bb46a8daea

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SGZ717YQ\base[1].js

    Filesize

    2.4MB

    MD5

    3e9bcc3a02e10c215e76e8f10776aacd

    SHA1

    2d0ea8d5ac893ce05e5d5754b6c8685d8a24a614

    SHA256

    8fad8504afcb6cf84a4671ec06aa9bb1bec195180a3bc02274c9446658991dbf

    SHA512

    59ee0c704e8b2e9916fe60ef7de98f1260d8a5a9373f5ae11d64fdfc776694b4988294f93245de6b6e370b7bcc5d80930ed4d94d519dfd62b7ee8cf6e362243b

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SGZ717YQ\spf[1].js

    Filesize

    38KB

    MD5

    9df260ef5f689e597011f8a110bf0156

    SHA1

    7cf9959f50ee5c0eb7653cd7b9d56e9e13c61325

    SHA256

    8e184352e6a0026e43c829910615fc408a900dad2f388d1b284756d1a7b0b62e

    SHA512

    099ea70bc08630b933e83c3033ae049c19940ca9e8f0eb42eb764552a9649493606eab56f683aa72df356ef53a9b37a63493a349e86a098fa82aa0ef75387cd8

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SGZ717YQ\web-animations-next-lite.min[1].js

    Filesize

    49KB

    MD5

    44ca3d8fd5ff91ed90d1a2ab099ef91e

    SHA1

    79b76340ca0781fd98aa5b8fdca9496665810195

    SHA256

    c12e3ac9660ae5de2d775a8c52e22610fff7a651fa069cfa8f64675a7b0a6415

    SHA512

    a5ce9d846fb4c43a078d364974b22c18a504cdbf2da3d36c689d450a5dc7d0be156a29e11df301ff7e187b831e14a6e5b037aad22f00c03280ee1ad1e829dac8

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SGZ717YQ\webcomponents-ce-sd[1].js

    Filesize

    95KB

    MD5

    c1d7b8b36bf9bd97dcb514a4212c8ea5

    SHA1

    e3957af856710e15404788a87c98fdbb85d3e52e

    SHA256

    2fed236a295c611b4be5b9bc8608978e148c893e0c51944486982583b210668a

    SHA512

    0d44065c534313572d90232eb3f88eb308590304c879e38a09d6f2891f92385dc7495aabd776433f7d493d004001b714c7f89855aa6f6bec61c77d50e3a4b8e6

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    9ed6fed9b6e5aaa9afcba833c1b8c259

    SHA1

    2ed30daf7f0277a0718b3d9ce46b0658640cc2ba

    SHA256

    c90743b555faf3ed141c4c83e5002c4da6445c3be1ad82b01c98da2201cf6818

    SHA512

    a9abd9ca06479e56d08e1649b344cfd06beec24567d1053616670afd7f47757d7ab186c2cd20d21f53a901ede92b14382fc42ab21df6605d69702c0368106367

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    ac89a852c2aaa3d389b2d2dd312ad367

    SHA1

    8f421dd6493c61dbda6b839e2debb7b50a20c930

    SHA256

    0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

    SHA512

    c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_6E4381F77BE6F6EB436B295D285593C5

    Filesize

    471B

    MD5

    27b630ace2a19cfc3c2cf2401dc8e5b5

    SHA1

    503f072a8b4e8d0d1fcfaf94f9550751c64b4f48

    SHA256

    d5267104785bbda96b38a3e1bf0c7c30aa4c57dd178d1cfac0fe31ed9411d185

    SHA512

    81d2feb1641fb2001528b8ee1e682c031aaf1826ed36a581cd02326a165e0446fd6be74263c32fde3aabbe5a307c7c53676e1cd902755d1b526133cc878d007e

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_C1E2A77661EBC4E08BAA8B13AD8BA2EF

    Filesize

    471B

    MD5

    ad99448b10452ec688569a10a99733d4

    SHA1

    a8c544dd64d8acc0865026eea2bb8df9c5c4cd0d

    SHA256

    431cc0b3e1cf54221452dfdcc4428f5e256745f9d4f9869dce756777959a6ba0

    SHA512

    79b7a110fd8d11deb33f48fc24ec24a0fa7d3e957cf99c2aa2b676fbdd65ecfc762a736a32b3d4d08bf09423fd31239cc2b214daa85c9813bbae067ad5ee4e7d

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    679e54bfad55f0977343407a19cfdc60

    SHA1

    1f9eff4caa99a12e9c9b4e1c9ef9eeb4ffacbd00

    SHA256

    b2aa4048ea8eff181fccbe9034c85fc6c9aa4f1f8fa916a132119d6936cfd1e2

    SHA512

    c580ad6089a7fa9cb535a98ec3b48a3731ddb7576bdd16627a78e47b300c3a04dee6f6a278f3193477d9c14d3385e2f5c1a9a8d1b0b2ba12ee857842ec2f8074

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    817e19a50952c87dad520c2ce227a1fa

    SHA1

    4873e3fea75aa74f1d922d8ed4c1737d9e63a73f

    SHA256

    191260494976df8f5830f8be82223eaa75935257d64072b14bb6eb3eb8751217

    SHA512

    751e90847ae7d07ac0b9a501261b311755ec3553a1500e97153fcbcf0cfe665776fdd768c13bec4f8556cf4c9e953d71b1a0d897ff96220d4bd508d386b455c1

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_6E4381F77BE6F6EB436B295D285593C5

    Filesize

    418B

    MD5

    7b565faba68753258b77e93b2a925afd

    SHA1

    d343718ec63c434a5039eef4f410008ba1c26fb9

    SHA256

    bf7e74c9eaeff317aaff4e7b9378bcf062a349f45ea930858fb79fd335628ea5

    SHA512

    6fbc647f8d9277bce3b7beae87c9b7ed6facf640750b7989dc9dfb2603ae3c6afe0a973fd6d915d937f5de62145acd05b5949cad1bc5311dd069337668550344

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_C1E2A77661EBC4E08BAA8B13AD8BA2EF

    Filesize

    410B

    MD5

    5ecdcaa5f56946c65b41a74d80f6ceba

    SHA1

    25b412e849702d9c18ad021c53a8d0a966575ef1

    SHA256

    0689bfae2eaef1dafde8a95aaa3b7fdad1e4ae1439285bf0c32b544e48f90501

    SHA512

    0eb46a261e45a3c501f505c9f23a1e763177bda627ce10160c2959e5b24c93d6032d199a1645bf84f579e104c9346d3f0d2b24567fd05fa8073d4ab243955f60

  • C:\Users\Admin\AppData\Roaming\POPE\rndll86.exe

    Filesize

    25.0MB

    MD5

    0b35a40310502adf3657d4e6311c1b6e

    SHA1

    e5da2878c8ccd40c4c357d6acfcfd7711e8f45f8

    SHA256

    36fadb37e85e42a758140f8c1c9296f80034b9d3ce7d1e2bcc6f106084c3de4e

    SHA512

    ade77fa180ee300e39f871a1f80573fe7606f5abc9605e7cd87e3f56f1118c4302c5777ea32605808c2e48d171972c1d41e43d6cfc53bf73681dc3d5920dd63a

  • memory/644-68-0x0000027E68100000-0x0000027E68200000-memory.dmp

    Filesize

    1024KB

  • memory/1688-221-0x0000015A816C0000-0x0000015A817C0000-memory.dmp

    Filesize

    1024KB

  • memory/1688-228-0x0000015A91DF0000-0x0000015A91DF2000-memory.dmp

    Filesize

    8KB

  • memory/1688-222-0x0000015A816C0000-0x0000015A817C0000-memory.dmp

    Filesize

    1024KB

  • memory/1688-223-0x0000015A816C0000-0x0000015A817C0000-memory.dmp

    Filesize

    1024KB

  • memory/1688-232-0x0000015A91E30000-0x0000015A91E32000-memory.dmp

    Filesize

    8KB

  • memory/1688-249-0x0000015A92B50000-0x0000015A92B53000-memory.dmp

    Filesize

    12KB

  • memory/1688-251-0x0000015A92B70000-0x0000015A92B72000-memory.dmp

    Filesize

    8KB

  • memory/1688-226-0x0000015A81670000-0x0000015A81672000-memory.dmp

    Filesize

    8KB

  • memory/2064-89-0x0000022167740000-0x0000022167742000-memory.dmp

    Filesize

    8KB

  • memory/2064-93-0x00000221677B0000-0x00000221677B2000-memory.dmp

    Filesize

    8KB

  • memory/2064-120-0x0000022179260000-0x0000022179360000-memory.dmp

    Filesize

    1024KB

  • memory/2064-86-0x0000022167A10000-0x0000022167B10000-memory.dmp

    Filesize

    1024KB

  • memory/2064-91-0x0000022167760000-0x0000022167762000-memory.dmp

    Filesize

    8KB

  • memory/2064-119-0x0000022178300000-0x0000022178320000-memory.dmp

    Filesize

    128KB

  • memory/2336-199-0x000001D7CFAA0000-0x000001D7CFAC0000-memory.dmp

    Filesize

    128KB

  • memory/2336-200-0x000001D7D0C10000-0x000001D7D0D10000-memory.dmp

    Filesize

    1024KB

  • memory/2616-20-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-22-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-21-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-9-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-12-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-13-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-14-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-11-0x0000000000430000-0x0000000001D2A000-memory.dmp

    Filesize

    25.0MB

  • memory/2740-0-0x00007FFE9BC73000-0x00007FFE9BC74000-memory.dmp

    Filesize

    4KB

  • memory/2740-10-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2740-2-0x00007FFE9BC70000-0x00007FFE9C65C000-memory.dmp

    Filesize

    9.9MB

  • memory/2740-1-0x0000000000E50000-0x000000000276A000-memory.dmp

    Filesize

    25.1MB

  • memory/4752-39-0x000001F177A20000-0x000001F177A30000-memory.dmp

    Filesize

    64KB

  • memory/4752-23-0x000001F177920000-0x000001F177930000-memory.dmp

    Filesize

    64KB

  • memory/4752-58-0x000001F174E00000-0x000001F174E02000-memory.dmp

    Filesize

    8KB

  • memory/4752-256-0x000001F101300000-0x000001F101301000-memory.dmp

    Filesize

    4KB

  • memory/4752-257-0x000001F101310000-0x000001F101311000-memory.dmp

    Filesize

    4KB