Malware Analysis Report

2024-09-11 16:24

Sample ID 240618-xwehfsygjp
Target ##!!SetUp_2244_Pa$sW0rd$$!!.zip
SHA256 b09d14fbdce91d25ec9e2c680afca3ace960d85324e7639a2aa5eb70bf1ea6d2
Tags
amadey stealc vidar xmrig ffb1b9 discovery miner spyware stealer trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b09d14fbdce91d25ec9e2c680afca3ace960d85324e7639a2aa5eb70bf1ea6d2

Threat Level: Known bad

The file ##!!SetUp_2244_Pa$sW0rd$$!!.zip was found to be: Known bad.

Malicious Activity Summary

amadey stealc vidar xmrig ffb1b9 discovery miner spyware stealer trojan upx

Amadey

Vidar

Detect Vidar Stealer

xmrig

Stealc

XMRig Miner payload

UPX packed file

Executes dropped EXE

Checks computer location settings

Reads user/profile data of local email clients

Reads user/profile data of web browsers

Reads data files stored by FTP clients

Loads dropped DLL

Checks installed software on the system

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Drops file in Windows directory

Enumerates physical storage devices

Program crash

Checks processor information in registry

Suspicious use of FindShellTrayWindow

Delays execution with timeout.exe

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: MapViewOfSection

Modifies system certificate store

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 19:12

Signatures

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-18 19:11

Reported

2024-06-18 19:15

Platform

win11-20240611-en

Max time kernel

122s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe"

Signatures

Amadey

trojan amadey

Detect Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Stealc

stealer stealc

Vidar

stealer vidar

xmrig

miner xmrig

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\GDBKJDGIJE.exe N/A
N/A N/A C:\ProgramData\FHDAEHDAKE.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Watcher Com SH.job C:\Windows\SysWOW64\ftp.exe N/A
File created C:\Windows\Tasks\TWI Cloud Host.job C:\Windows\SysWOW64\ftp.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4220 wrote to memory of 4828 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 4220 wrote to memory of 4828 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 4220 wrote to memory of 4828 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 4220 wrote to memory of 4828 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 4828 wrote to memory of 3900 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 4828 wrote to memory of 3900 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 4828 wrote to memory of 3900 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 4828 wrote to memory of 3900 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 4828 wrote to memory of 3900 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 3900 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\ProgramData\GDBKJDGIJE.exe
PID 3900 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\ProgramData\GDBKJDGIJE.exe
PID 3900 wrote to memory of 4988 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\ProgramData\GDBKJDGIJE.exe
PID 3900 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\ProgramData\FHDAEHDAKE.exe
PID 3900 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\ProgramData\FHDAEHDAKE.exe
PID 3900 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\ProgramData\FHDAEHDAKE.exe
PID 4988 wrote to memory of 1596 N/A C:\ProgramData\GDBKJDGIJE.exe C:\Windows\SysWOW64\ftp.exe
PID 4988 wrote to memory of 1596 N/A C:\ProgramData\GDBKJDGIJE.exe C:\Windows\SysWOW64\ftp.exe
PID 4988 wrote to memory of 1596 N/A C:\ProgramData\GDBKJDGIJE.exe C:\Windows\SysWOW64\ftp.exe
PID 2624 wrote to memory of 2704 N/A C:\ProgramData\FHDAEHDAKE.exe C:\Windows\SysWOW64\ftp.exe
PID 2624 wrote to memory of 2704 N/A C:\ProgramData\FHDAEHDAKE.exe C:\Windows\SysWOW64\ftp.exe
PID 2624 wrote to memory of 2704 N/A C:\ProgramData\FHDAEHDAKE.exe C:\Windows\SysWOW64\ftp.exe
PID 3900 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\cmd.exe
PID 3900 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\cmd.exe
PID 3900 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\cmd.exe
PID 4728 wrote to memory of 4040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4728 wrote to memory of 4040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4728 wrote to memory of 4040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4988 wrote to memory of 1596 N/A C:\ProgramData\GDBKJDGIJE.exe C:\Windows\SysWOW64\ftp.exe
PID 2624 wrote to memory of 2704 N/A C:\ProgramData\FHDAEHDAKE.exe C:\Windows\SysWOW64\ftp.exe
PID 1596 wrote to memory of 4336 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\SysWOW64\explorer.exe
PID 1596 wrote to memory of 4336 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\SysWOW64\explorer.exe
PID 1596 wrote to memory of 4336 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\SysWOW64\explorer.exe
PID 2704 wrote to memory of 2712 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
PID 2704 wrote to memory of 2712 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
PID 1596 wrote to memory of 4336 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\SysWOW64\explorer.exe
PID 2704 wrote to memory of 2712 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
PID 2704 wrote to memory of 2712 N/A C:\Windows\SysWOW64\ftp.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
PID 2712 wrote to memory of 2340 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
PID 2712 wrote to memory of 2340 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
PID 2712 wrote to memory of 2340 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
PID 2712 wrote to memory of 2340 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
PID 2712 wrote to memory of 2340 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
PID 2712 wrote to memory of 2340 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
PID 2712 wrote to memory of 2340 N/A C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe

Processes

C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe"

C:\Windows\SysWOW64\more.com

C:\Windows\SysWOW64\more.com

C:\Users\Admin\AppData\Local\Temp\CUF.au3

C:\Users\Admin\AppData\Local\Temp\CUF.au3

C:\ProgramData\GDBKJDGIJE.exe

"C:\ProgramData\GDBKJDGIJE.exe"

C:\ProgramData\FHDAEHDAKE.exe

"C:\ProgramData\FHDAEHDAKE.exe"

C:\Windows\SysWOW64\ftp.exe

C:\Windows\SysWOW64\ftp.exe

C:\Windows\SysWOW64\ftp.exe

C:\Windows\SysWOW64\ftp.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GIEBAECAKKFC" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 10

C:\Windows\SysWOW64\explorer.exe

C:\Windows\SysWOW64\explorer.exe

C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe

C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe

C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe

C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe -a rx/0 --url=65.109.127.181:3333 -u PLAYA -p PLAYA -R --variant=-1 --max-cpu-usage=70 --donate-level=1 -opencl

Network

Country Destination Domain Proto
US 8.8.8.8:53 rs-ny.rustdesk.com udp
US 8.8.8.8:53 rs-cn.rustdesk.com udp
US 8.8.8.8:53 rs-sg.rustdesk.com udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com tcp
NL 209.250.254.15:21116 rs-ny.rustdesk.com udp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp
NL 209.250.254.15:21115 rs-ny.rustdesk.com tcp
NL 209.250.254.15:21116 rs-ny.rustdesk.com tcp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp
NL 209.250.254.15:21115 rs-ny.rustdesk.com tcp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com tcp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp
NL 209.250.254.15:21115 rs-ny.rustdesk.com tcp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp
NL 149.154.167.99:443 t.me tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
US 104.21.16.123:443 businessdownloads.ltd tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
US 199.232.192.193:443 i.imgur.com tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
DE 162.55.53.18:9000 162.55.53.18 tcp
FI 135.181.22.88:80 135.181.22.88 tcp
FI 65.109.127.181:3333 tcp
US 45.152.112.146:80 proresupdate.com tcp
FI 65.109.127.181:3333 tcp
FI 65.109.127.181:3333 tcp
FI 65.109.127.181:3333 tcp

Files

memory/4220-2-0x0000000000430000-0x00000000016D8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\a63d208c

MD5 7e5f109992400986bc604a0bca752c67
SHA1 222cdcb35db67fd6f379ea3926dcdf7b934321ce
SHA256 e1e323fe366bf9d627070adae6e26abc29fd0d5fe421b40019376d58fbcdf93e
SHA512 d6c675bc576818960eb4ac5d8d80f1018306e982be2d3d714fc3b0564c6190a9b9c10a2096d1eb98c5685a49a5dc99a36948ae22304d14e9eac64ed17e511f39

memory/4220-28-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

memory/4220-30-0x0000000072751000-0x0000000072763000-memory.dmp

memory/4220-29-0x0000000072762000-0x0000000072764000-memory.dmp

memory/4220-36-0x0000000072751000-0x0000000072763000-memory.dmp

memory/4828-37-0x0000000072750000-0x00000000728CD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ab0c89f6

MD5 adf3c19ea7034759b3fcf7a4ecbf416c
SHA1 a5f87e2e654ad861bb302d19437181fc12406477
SHA256 432bcd740796de3448fc14d9ad4281ab9c7ec9f86c62a864f6e9b06264c37d26
SHA512 ceb043cd88d3ab6aee25c1893b6e9221a2d8ed856f0ba3fc18c9ebde59b212473ea639ae762558d5a086c282a8fec89be79bf46c07f7f0557c78f2b9fd1a2019

memory/4828-39-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

memory/4828-42-0x0000000072750000-0x00000000728CD000-memory.dmp

memory/4828-41-0x0000000072750000-0x00000000728CD000-memory.dmp

memory/4828-47-0x0000000072750000-0x00000000728CD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CUF.au3

MD5 c56b5f0201a3b3de53e561fe76912bfd
SHA1 2a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512 195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

memory/3900-49-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

memory/3900-52-0x00000000000D0000-0x000000000081B000-memory.dmp

memory/3900-53-0x0000000061E00000-0x0000000061EF3000-memory.dmp

C:\ProgramData\GIEBAECAKKFC\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\GIEBAECAKKFC\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

C:\ProgramData\GDBKJDGIJE.exe

MD5 6cfddd5ce9ca4bb209bd5d8c2cd80025
SHA1 424da82e9edbb6b39a979ab97d84239a1d67c48b
SHA256 376e1802b979514ba0e9c73933a8c6a09dd3f1d2a289f420c2202e64503d08a7
SHA512 d861130d87bfedc38a97019cba17724067f397e6ffe7e1384175db48c0a177a2e7e256c3c933d0f42766e8077f767d6d4dc8758200852e8ec135736daee7c0f8

memory/4988-134-0x0000000000C30000-0x0000000001143000-memory.dmp

C:\ProgramData\FHDAEHDAKE.exe

MD5 daaff76b0baf0a1f9cec253560c5db20
SHA1 0311cf0eeb4beddd2c69c6e97462595313a41e78
SHA256 5706c6f5421a6a34fdcb67e9c9e71283c8fc1c33499904519cbdc6a21e6b071c
SHA512 987ca2d67903c65ee1075c4a5250c85840aea26647b1d95a3e73a26dcad053bd4c31df4ca01d6cc0c196fa7e8e84ab63ed4a537f72fc0b1ee4ba09cdb549ddf3

memory/4988-147-0x00000000721B0000-0x000000007232D000-memory.dmp

memory/4988-153-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

memory/2624-151-0x00000000001E0000-0x0000000000428000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\83d8e4d9

MD5 8d443e7cb87cacf0f589ce55599e008f
SHA1 c7ff0475a3978271e0a8417ac4a826089c083772
SHA256 e2aaaa1a0431aab1616e2b612e9b68448107e6ce71333f9c0ec1763023b72b2a
SHA512 c7d0ced6eb9e203d481d1dbdd5965278620c10cdc81c02da9c4f7f99f3f8c61dfe975cf48d4b93ccde9857edb881a77ebe9cd13ae7ef029285d770d767aa74a5

memory/2624-158-0x00000000721B0000-0x000000007232D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\858294e4

MD5 c62f812e250409fbd3c78141984270f2
SHA1 9c7c70bb78aa0de4ccf0c2b5d87b37c8a40bd806
SHA256 d8617477c800cc10f9b52e90b885117a27266831fb5033647b6b6bd6025380a8
SHA512 7573ecac1725f395bbb1661f743d8ee6b029f357d3ef07d0d96ee4ff3548fe06fab105ee72be3e3964d2053de2f44245cca9a061d47c1411949840c84f6e9092

memory/2624-159-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

memory/3900-178-0x00000000000D0000-0x000000000081B000-memory.dmp

C:\ProgramData\GIEBAECAKKFC\AFCFHD

MD5 59071590099d21dd439896592338bf95
SHA1 6a521e1d2a632c26e53b83d2cc4b0edecfc1e68c
SHA256 07854d2fef297a06ba81685e660c332de36d5d18d546927d30daad6d7fda1541
SHA512 eedb6cadbceb2c991fc6f68dccb80463b3f660c5358acd7d705398ae2e3df2b4327f0f6c6746486848bd2992b379776483a98063ae96edb45877bb0314874668

memory/3900-194-0x00000000000D0000-0x000000000081B000-memory.dmp

C:\ProgramData\GIEBAECAKKFC\DAKFID

MD5 04ee85098c13ccbb0dfaaf910e3f79f5
SHA1 7011925629e9e301d7e428486c9c3e81237157c3
SHA256 f4726ca1f84b909bc9675a62fe09426532f9040cebdd8711640e1e952e55f2db
SHA512 dc774020727cdb90f751035169aa87513e21395f3a146143d0ea513801900cc8f54bbebfd752bbf16f6f0275612ffae4a53f4a5e20668dd4f33d4d02b1e213f8

C:\ProgramData\GIEBAECAKKFC\HIJJEG

MD5 66e318fc11ba739995fcafa51122310e
SHA1 64316c44931b1ad011e9ae3479f3423a879416eb
SHA256 4dea47e2a0c0540ff04b47725864e5ce990c0af2bdb1f243dded4287cee0eec8
SHA512 24b0cd4889df58d77dc9b28c9c6fdf3bbf80b5ee0c4925e3455dac05179b1e0e675e3c22abcb2eb7e11fc81cee65e4d633253dee1d8632ca5d3357d2f17f8794

memory/3900-207-0x00000000000D0000-0x000000000081B000-memory.dmp

memory/4988-208-0x00000000721B0000-0x000000007232D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\85c218fd

MD5 479ff6906ed9f3491e6685f1cfff8bbc
SHA1 9eeca8397ba4f620b34b410f6f4aa1e3b46eb4e6
SHA256 b7bb5d898d6446c49480d59f0d3012715e45c0cd507164cbeb8386cee99c9bad
SHA512 84154c26fc9daaa70fe26e4a2a9525a30989827b1633f90d683903f6029d4e1acdc903e60dbba9aeb39167c42c2ab2e8a329da73ffc6390f6694599a73e2191b

memory/2624-211-0x00000000721B0000-0x000000007232D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\87ffd2c3

MD5 6795122945fa57afd7086b03bef11d6c
SHA1 62a04a059301d8bbec40f167a0b93f6af48509fe
SHA256 2d970197698ba453b2a6dcfa13caf4d9090aadf95275540cb0573ab5d08fe395
SHA512 69c4e3a63961abdcdae056bef614685756c0fd77fe8448bef43dff693aef34b015a90b220e7c1a0c62bd30309ae74bae060042a34790f62378bc859db25141a9

memory/1596-214-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

memory/2704-215-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

C:\ProgramData\GIEBAECAKKFC\softokn3.dll

MD5 4e52d739c324db8225bd9ab2695f262f
SHA1 71c3da43dc5a0d2a1941e874a6d015a071783889
SHA256 74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA512 2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

C:\ProgramData\GIEBAECAKKFC\msvcp140.dll

MD5 5ff1fca37c466d6723ec67be93b51442
SHA1 34cc4e158092083b13d67d6d2bc9e57b798a303b
SHA256 5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA512 4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

C:\ProgramData\GIEBAECAKKFC\VCRUNT~1.DLL

MD5 a37ee36b536409056a86f50e67777dd7
SHA1 1cafa159292aa736fc595fc04e16325b27cd6750
SHA256 8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA512 3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

memory/1596-222-0x00000000721B0000-0x000000007232D000-memory.dmp

memory/1596-231-0x00000000721B0000-0x000000007232D000-memory.dmp

memory/2712-235-0x00007FFA388D0000-0x00007FFA39F70000-memory.dmp

memory/4336-238-0x00007FFA5A780000-0x00007FFA5A989000-memory.dmp

memory/2712-239-0x0000000000400000-0x000000000040A000-memory.dmp

memory/4336-240-0x0000000000C20000-0x0000000000C91000-memory.dmp

memory/2340-244-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/2340-247-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/2340-248-0x000002AC9FAF0000-0x000002AC9FB10000-memory.dmp

memory/2340-246-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/2340-251-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/2340-252-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/2340-250-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/2340-249-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/2340-253-0x0000000140000000-0x00000001407DC000-memory.dmp

memory/4336-256-0x0000000000C20000-0x0000000000C91000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 19:11

Reported

2024-06-18 19:15

Platform

win7-20240221-en

Max time kernel

112s

Max time network

17s

Command Line

"C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe"

Signatures

Detect Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Stealc

stealer stealc

Vidar

stealer vidar

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 628 set thread context of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\CUF.au3

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe N/A
N/A N/A C:\Windows\SysWOW64\more.com N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 628 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2560 wrote to memory of 780 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 780 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\WerFault.exe
PID 780 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\WerFault.exe
PID 780 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\WerFault.exe
PID 780 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\WerFault.exe
PID 780 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\WerFault.exe
PID 780 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\WerFault.exe
PID 780 wrote to memory of 2852 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe"

C:\Windows\SysWOW64\more.com

C:\Windows\SysWOW64\more.com

C:\Users\Admin\AppData\Local\Temp\CUF.au3

C:\Users\Admin\AppData\Local\Temp\CUF.au3

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 252

Network

Country Destination Domain Proto
US 8.8.8.8:53 rs-ny.rustdesk.com udp
US 8.8.8.8:53 rs-sg.rustdesk.com udp
US 8.8.8.8:53 rs-ny.rustdesk.com udp
US 8.8.8.8:53 rs-cn.rustdesk.com udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com tcp
NL 209.250.254.15:21115 rs-ny.rustdesk.com tcp
NL 209.250.254.15:21116 rs-ny.rustdesk.com udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com tcp
NL 209.250.254.15:21115 rs-ny.rustdesk.com tcp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com udp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com tcp
N/A 127.0.0.1:21116 udp
NL 209.250.254.15:21116 rs-ny.rustdesk.com udp
N/A 127.0.0.1:21116 udp
N/A 127.0.0.1:21116 udp

Files

memory/628-0-0x0000000000400000-0x00000000016A8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b40de9be

MD5 7e5f109992400986bc604a0bca752c67
SHA1 222cdcb35db67fd6f379ea3926dcdf7b934321ce
SHA256 e1e323fe366bf9d627070adae6e26abc29fd0d5fe421b40019376d58fbcdf93e
SHA512 d6c675bc576818960eb4ac5d8d80f1018306e982be2d3d714fc3b0564c6190a9b9c10a2096d1eb98c5685a49a5dc99a36948ae22304d14e9eac64ed17e511f39

memory/628-28-0x0000000073830000-0x00000000739A4000-memory.dmp

memory/628-33-0x0000000077440000-0x00000000775E9000-memory.dmp

memory/628-34-0x0000000073842000-0x0000000073844000-memory.dmp

memory/628-35-0x0000000073830000-0x00000000739A4000-memory.dmp

memory/628-40-0x0000000073830000-0x00000000739A4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ba8a7d89

MD5 ac7fdcda6c2b69de461cffecf72e7627
SHA1 2042068b07481870d3f5b9839338a03f5580a60b
SHA256 39e6cda14036448dff480ef4f2a335add89e5af61f73aadc5cad18665c29ce61
SHA512 1e64f0fdb58c9c260c78b51f6d5f856014c7bba7d5413103507954b63986b4c642aa49439bdd5cb3fc5fa278510e57d18d42257a1f8d2bd82a31bba6f3346082

memory/2560-43-0x0000000077440000-0x00000000775E9000-memory.dmp

memory/2560-45-0x0000000073830000-0x00000000739A4000-memory.dmp

\Users\Admin\AppData\Local\Temp\CUF.au3

MD5 c56b5f0201a3b3de53e561fe76912bfd
SHA1 2a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512 195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

memory/780-51-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/780-50-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/780-53-0x0000000000870000-0x0000000000FBB000-memory.dmp

memory/780-61-0x0000000000870000-0x0000000000FBB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 19:11

Reported

2024-06-18 19:15

Platform

win10v2004-20240508-en

Max time kernel

49s

Max time network

53s

Command Line

"C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe"

Signatures

Detect Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Stealc

stealer stealc

Vidar

stealer vidar

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A

Reads data files stored by FTP clients

spyware stealer

Checks installed software on the system

discovery

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 6124 set thread context of 2556 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\CUF.au3 N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe N/A
N/A N/A C:\Windows\SysWOW64\more.com N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 6124 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 6124 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 6124 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 6124 wrote to memory of 2556 N/A C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe C:\Windows\SysWOW64\more.com
PID 2556 wrote to memory of 1676 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2556 wrote to memory of 1676 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2556 wrote to memory of 1676 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2556 wrote to memory of 1676 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 2556 wrote to memory of 1676 N/A C:\Windows\SysWOW64\more.com C:\Users\Admin\AppData\Local\Temp\CUF.au3
PID 1676 wrote to memory of 4940 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\cmd.exe
PID 1676 wrote to memory of 4940 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\cmd.exe
PID 1676 wrote to memory of 4940 N/A C:\Users\Admin\AppData\Local\Temp\CUF.au3 C:\Windows\SysWOW64\cmd.exe
PID 4940 wrote to memory of 5220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4940 wrote to memory of 5220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4940 wrote to memory of 5220 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe"

C:\Windows\SysWOW64\more.com

C:\Windows\SysWOW64\more.com

C:\Users\Admin\AppData\Local\Temp\CUF.au3

C:\Users\Admin\AppData\Local\Temp\CUF.au3

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\CUF.au3" & rd /s /q "C:\ProgramData\DGCBKECAKFBG" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 10

Network

Country Destination Domain Proto
US 8.8.8.8:53 rs-cn.rustdesk.com udp
US 8.8.8.8:53 rs-ny.rustdesk.com udp
US 8.8.8.8:53 rs-sg.rustdesk.com udp
US 8.8.8.8:53 poocoin.online udp

Files

memory/6124-0-0x0000000000610000-0x00000000018B8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\c4c1ba7e

MD5 7e5f109992400986bc604a0bca752c67
SHA1 222cdcb35db67fd6f379ea3926dcdf7b934321ce
SHA256 e1e323fe366bf9d627070adae6e26abc29fd0d5fe421b40019376d58fbcdf93e
SHA512 d6c675bc576818960eb4ac5d8d80f1018306e982be2d3d714fc3b0564c6190a9b9c10a2096d1eb98c5685a49a5dc99a36948ae22304d14e9eac64ed17e511f39

memory/6124-10-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmp

memory/6124-11-0x0000000072A62000-0x0000000072A64000-memory.dmp

memory/6124-12-0x0000000072A51000-0x0000000072A63000-memory.dmp

memory/6124-14-0x0000000072A51000-0x0000000072A63000-memory.dmp

memory/2556-15-0x0000000072A50000-0x0000000072BCB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\c92dea46

MD5 5a2d7e81ce0578846c52fe289c2ccca7
SHA1 6bbfbbf8683c6e5a38fa162384c192ed8229bd55
SHA256 b64a3414d146683690a831bbf19ea4af2278ecdc07dc89466493abe29a728d6f
SHA512 a3158ecef82ba920d078ef8ae8db0039ef298cdfe714ee41043262150f463b393ea9cb4f8c8c5612ecff058bd1f57b58c5ce171a6645e8a10ac0a03141507a1e

memory/2556-17-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmp

memory/2556-19-0x0000000072A50000-0x0000000072BCB000-memory.dmp

memory/2556-21-0x0000000072A50000-0x0000000072BCB000-memory.dmp

memory/2556-25-0x0000000072A50000-0x0000000072BCB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CUF.au3

MD5 c56b5f0201a3b3de53e561fe76912bfd
SHA1 2a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512 195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

memory/1676-27-0x00007FFA217B0000-0x00007FFA219A5000-memory.dmp

memory/1676-28-0x0000000061E00000-0x0000000061EF3000-memory.dmp

memory/1676-40-0x0000000000C60000-0x00000000013AB000-memory.dmp