Analysis

  • max time kernel
    121s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2024 20:05

General

  • Target

    CoolR6.exe

  • Size

    17.6MB

  • MD5

    6fdd3c3462d1a4a39b9fb67af06395db

  • SHA1

    7f06a83384d4d79b570db166cb91daf5afe82bf2

  • SHA256

    5781c5466d7da49fd3e1bf1d69794a52b4fa77c173bb5127198b55923e3d7d54

  • SHA512

    93299f7be003ffe93ba25745b9a5b5ed795cf6a6b2f3bf1c05d85c68899f1c1cba0b8f28118048172c5a2de4b6d221ccdfd30684ebdde1b01857857c1adbc846

  • SSDEEP

    393216:ELQtsuwT+X41+TtIiFq8uARuAQsFXmb6CqzWImE:8QtsH6o1QtI18uAgs8yCxE

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Loads dropped DLL 45 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CoolR6.exe
    "C:\Users\Admin\AppData\Local\Temp\CoolR6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\CoolR6.exe
      "C:\Users\Admin\AppData\Local\Temp\CoolR6.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:1524
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:4272
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\WriteUnblock.rtf" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3008
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\DismountNew.docx" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4256
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UnlockRestore.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:3220

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Loginvault.db

      Filesize

      40KB

      MD5

      a182561a527f929489bf4b8f74f65cd7

      SHA1

      8cd6866594759711ea1836e86a5b7ca64ee8911f

      SHA256

      42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

      SHA512

      9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\Cryptodome\Cipher\_raw_cbc.pyd

      Filesize

      12KB

      MD5

      6840f030df557b08363c3e96f5df3387

      SHA1

      793a8ba0a7bdb5b7e510fc9a9dde62b795f369ae

      SHA256

      b7160ed222d56925e5b2e247f0070d5d997701e8e239ec7f80bce21d14fa5816

      SHA512

      edf5a4d5a3bfb82cc140ce6ce6e9df3c8ed495603dcf9c0d754f92f265f2dce6a83f244e0087309b42930d040bf55e66f34504dc1c482a274ad8262aa37d1467

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\Cryptodome\Cipher\_raw_cfb.pyd

      Filesize

      13KB

      MD5

      7256877dd2b76d8c6d6910808222acd8

      SHA1

      c6468db06c4243ce398beb83422858b3fed76e99

      SHA256

      dbf703293cff0446dfd15bbaeda52fb044f56a353dda3beca9aadd8a959c5798

      SHA512

      a14d460d96845984f052a8509e8fc44439b616eeae46486df20f21ccaa8cfb1e55f1e4fa2f11a7b6ab0a481de62636cef19eb5bef2591fe83d415d67eb605b8e

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\Cryptodome\Cipher\_raw_ctr.pyd

      Filesize

      14KB

      MD5

      b063d73e5aa501060c303cafbc72dad3

      SHA1

      8c1ca04a8ed34252eb233c993ddba17803e0b81e

      SHA256

      98baca99834de65fc29efa930cd9dba8da233b4cfdfc4ab792e1871649b2fe5c

      SHA512

      8c9ad249f624bdf52a3c789c32532a51d3cc355646bd725553a738c4491ea483857032fb20c71fd3698d7f68294e3c35816421dff263d284019a9a4774c3af05

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\Cryptodome\Cipher\_raw_ecb.pyd

      Filesize

      10KB

      MD5

      1c74e15ec55bd8767968024d76705efc

      SHA1

      c590d1384d2207b3af01a46a5b4f7a2ae6bcad93

      SHA256

      0e3ec56a1f3c86be1caa503e5b89567aa91fd3d6da5ad4e4de4098f21270d86b

      SHA512

      e96ca56490fce7e169cc0ab803975baa8b5acb8bbab5047755ae2eeae177cd4b852c0620cd77bcfbc81ad18bb749dec65d243d1925288b628f155e8facdc3540

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\Cryptodome\Cipher\_raw_ofb.pyd

      Filesize

      12KB

      MD5

      134f891de4188c2428a2081e10e675f0

      SHA1

      22cb9b0fa0d1028851b8d28dafd988d25e94d2fd

      SHA256

      f326aa2a582b773f4df796035ec9bf69ec1ad11897c7d0ecfab970d33310d6ba

      SHA512

      43ce8af33630fd907018c62f100be502565bad712ad452a327ae166bd305735799877e14be7a46d243d834f3f884abf6286088e30533050ed9cd05d23aacaeab

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\Cryptodome\Util\_strxor.pyd

      Filesize

      10KB

      MD5

      16f42de194aaefb2e3cdee7fa63d2401

      SHA1

      be2ab72a90e0342457a9d13be5b6b1984875edea

      SHA256

      61e23970b6ced494e11dc9de9cb889c70b7ff7a5afe5242ba8b29aa3da7bc60e

      SHA512

      a671ea77bc8ca75aedb26b73293b51b780e26d6b8046fe1b85ae12bc9cc8f1d2062f74de79040ad44d259172f99781c7e774fe40768dc0a328bd82a48bf81489

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\VCRUNTIME140.dll

      Filesize

      116KB

      MD5

      be8dbe2dc77ebe7f88f910c61aec691a

      SHA1

      a19f08bb2b1c1de5bb61daf9f2304531321e0e40

      SHA256

      4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

      SHA512

      0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\VCRUNTIME140_1.dll

      Filesize

      48KB

      MD5

      f8dfa78045620cf8a732e67d1b1eb53d

      SHA1

      ff9a604d8c99405bfdbbf4295825d3fcbc792704

      SHA256

      a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

      SHA512

      ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_asyncio.pyd

      Filesize

      63KB

      MD5

      07a6e6dcc30e1c4c7e0cdc41a457a887

      SHA1

      53bc820b63d88cbe889944e242b50662b4b2cb42

      SHA256

      746bc8fa88282afe19dc60e426cc0a75bea3bd137cca06a0b57a30bd31459403

      SHA512

      837f1e40db9bdf1bc73b2a700df6086a3acdb7d52afc903239410b2d226ffd1dd5e8b5f317401bcf58dd042bd56787af6cdc49af96fcb588bcf0127d536b6c6d

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_bz2.pyd

      Filesize

      82KB

      MD5

      aa1083bde6d21cabfc630a18f51b1926

      SHA1

      e40e61dba19301817a48fd66ceeaade79a934389

      SHA256

      00b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3

      SHA512

      2df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_cffi_backend.cp311-win_amd64.pyd

      Filesize

      177KB

      MD5

      210def84bb2c35115a2b2ac25e3ffd8f

      SHA1

      0376b275c81c25d4df2be4789c875b31f106bd09

      SHA256

      59767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf

      SHA512

      cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_ctypes.pyd

      Filesize

      121KB

      MD5

      565d011ce1cee4d48e722c7421300090

      SHA1

      9dc300e04e5e0075de4c0205be2e8aae2064ae19

      SHA256

      c148292328f0aab7863af82f54f613961e7cb95b7215f7a81cafaf45bd4c42b7

      SHA512

      5af370884b5f82903fd93b566791a22e5b0cded7f743e6524880ea0c41ee73037b71df0be9f07d3224c733b076bec3be756e7e77f9e7ed5c2dd9505f35b0e4f5

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_decimal.pyd

      Filesize

      249KB

      MD5

      c88282908ba54510eda3887c488198eb

      SHA1

      94ed1b44f99642b689f5f3824d2e490252936899

      SHA256

      980a63f2b39cf16910f44384398e25f24482346a482addb00de42555b17d4278

      SHA512

      312b081a90a275465787a539e48412d07f1a4c32bab0f3aa024e6e3fe534ac9c07595238d51dc4d6f13c8d03c2441f788dff9fe3d7ca2aad3940609501d273bd

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_hashlib.pyd

      Filesize

      63KB

      MD5

      b4ff25b1aca23d48897fc616e102e9b6

      SHA1

      8295ee478191eb5f741a5f6a3f4ab4576ceec8d2

      SHA256

      87dd0c858620287454fd6d31d52b6a48eddbb2a08e09e8b2d9fdb0b92200d766

      SHA512

      a7adcf652bc88f8878dae2742a37af75599936d80223e62fe74755d6bafaafd985678595872fb696c715f69a1f963f12e3d52cd3d7e7a83747983b2ee244e8a2

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_lzma.pyd

      Filesize

      155KB

      MD5

      b86b9f292af12006187ebe6c606a377d

      SHA1

      604224e12514c21ab6db4c285365b0996c7f2139

      SHA256

      f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5

      SHA512

      d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_multiprocessing.pyd

      Filesize

      33KB

      MD5

      cf0b31f01a95e9f181d87197786b96ca

      SHA1

      6214361452f7eaef5c710719a5cfb6109906975c

      SHA256

      975c1947798e3c39898c86675ca1eb68249f77361f41f172f9800275227213b9

      SHA512

      d56b096780bb263e3f7282f163da02353ed5d8767f964937deaff997156e95749312180f25582d5963d3c351260b8ff196221652e7bf088a8c6a4e766118abd3

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_overlapped.pyd

      Filesize

      50KB

      MD5

      78e8049e26df6fd3a4011562ff8e74a0

      SHA1

      d5a91c720e4672c40e1dd6d54b3197b4a1f8b633

      SHA256

      ca106e4dfdeafeabf9e98956d3d8d0cb73e109f1a96f1a7e35bc47dbd7c7e164

      SHA512

      ea7a54d38cefed870cee65dd9460b6c51131ae5219933ddc998a86d12bb093784242cb5471c77bc324ccf59fa42c2914865dcf582f74c440fa52b7d15d9faeac

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_queue.pyd

      Filesize

      31KB

      MD5

      7f52ef40b083f34fd5e723e97b13382f

      SHA1

      626d47df812738f28bc87c7667344b92847fdf6a

      SHA256

      3f8e7e6aa13b417acc78b63434fb1144e6319a010a9fc376c54d6e69b638fe4c

      SHA512

      48f7723a8c039abd6ccb2906fbd310f0cfa170dcbdf89a6437dd02c8f77f20e6c7c402d29b922cdaabd357d3a33e34c3ad826127134f38d77a4d6d9c83371949

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_socket.pyd

      Filesize

      77KB

      MD5

      b77017baa2004833ef3847a3a3141280

      SHA1

      39666f74bd076015b376fc81250dff89dff4b0a6

      SHA256

      a19e3c7c03ef1b5625790b1c9c42594909311ab6df540fbf43c6aa93300ab166

      SHA512

      6b24d0e038c433b995bd05de7c8fe7dd7b0a11152937c189b8854c95780b0220a9435de0db7ac796a7de11a59c61d56b1aef9a8dbaba62d02325122ceb8b003d

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_sqlite3.pyd

      Filesize

      117KB

      MD5

      68d89aaab48b82a7d76fb65e9c613a24

      SHA1

      b872497ebe4aba49025c9f836f4b2a3f1f033e5e

      SHA256

      ff6a2a2f38b21b7784f97d604c99961d8c07ef455f7908110a4e893835d42b76

      SHA512

      5eec9169ab29c291010f0e171c3123552d8c68e943a615dc2f8e1ae75f809a54343572737279d9582b585997ed390af856f551dadeada85ae2f1aa908fc9b39c

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\_ssl.pyd

      Filesize

      174KB

      MD5

      0f02eccd7933b7a7c2bdedca2a72aab6

      SHA1

      0b4c551d8fe34d8128e5cf97daa19eb4c97db06e

      SHA256

      ba5388d6a6557d431e086734a3323621dc447f63ba299b0a815e5837cf869678

      SHA512

      90a64082dab51380e05c76047ee40e259c719d7170fb4acb247b68a03b710461b350da3821b426fd13167895ded32f9c5ec0e07587ad4125683a18a3495f5ed5

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\base_library.zip

      Filesize

      1.4MB

      MD5

      8655a1dec8c488da57682f7242ca3c2d

      SHA1

      13a4778a0a1a4308cf7c001d7501817973da1a0b

      SHA256

      3d0c33dd160978b8234f520a944fcef69f41369ea87d48904a64e8c68f28d151

      SHA512

      e89ac49b26abde229b63632381c08d17fbef86be64c59e633a711782cc6b391c9d7c66192886f3d3b9b88a964e8dfac2d25169c009a3af3e4c8b5dc854ca726c

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\libcrypto-3.dll

      Filesize

      5.0MB

      MD5

      e547cf6d296a88f5b1c352c116df7c0c

      SHA1

      cafa14e0367f7c13ad140fd556f10f320a039783

      SHA256

      05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

      SHA512

      9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\libffi-8.dll

      Filesize

      38KB

      MD5

      0f8e4992ca92baaf54cc0b43aaccce21

      SHA1

      c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

      SHA256

      eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

      SHA512

      6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\libssl-3.dll

      Filesize

      768KB

      MD5

      19a2aba25456181d5fb572d88ac0e73e

      SHA1

      656ca8cdfc9c3a6379536e2027e93408851483db

      SHA256

      2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006

      SHA512

      df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\pyexpat.pyd

      Filesize

      194KB

      MD5

      79561bc9f70383f8ae073802a321adfb

      SHA1

      5f378f47888e5092598c20c56827419d9f480fa7

      SHA256

      c7c7564f7f874fb660a46384980a2cf28bc3e245ca83628a197ccf861eab5560

      SHA512

      476c839f544b730c5b133e2ae08112144cac07b6dfb8332535058f5cbf54ce7ed4a72efb38e6d56007ae755694b05e81e247d0a10210c993376484a057f2217c

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\python311.dll

      Filesize

      5.5MB

      MD5

      387bb2c1e40bde1517f06b46313766be

      SHA1

      601f83ef61c7699652dec17edd5a45d6c20786c4

      SHA256

      0817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364

      SHA512

      521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\pywin32_system32\pythoncom311.dll

      Filesize

      654KB

      MD5

      f98264f2dacfc8e299391ed1180ab493

      SHA1

      849551b6d9142bf983e816fef4c05e639d2c1018

      SHA256

      0fe49ec1143a0efe168809c9d48fe3e857e2ac39b19db3fd8718c56a4056696b

      SHA512

      6bb3dbd9f4d3e6b7bd294f3cb8b2ef4c29b9eff85c0cfd5e2d2465be909014a7b2ecd3dc06265b1b58196892bb04d3e6b0aa4b2ccbf3a716e0ff950eb28db11c

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\pywin32_system32\pywintypes311.dll

      Filesize

      131KB

      MD5

      90b786dc6795d8ad0870e290349b5b52

      SHA1

      592c54e67cf5d2d884339e7a8d7a21e003e6482f

      SHA256

      89f2a5c6be1e70b3d895318fdd618506b8c0e9a63b6a1a4055dff4abdc89f18a

      SHA512

      c6e1dbf25d260c723a26c88ec027d40d47f5e28fc9eb2dbc72a88813a1d05c7f75616b31836b68b87df45c65eef6f3eaed2a9f9767f9e2f12c45f672c2116e72

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\select.pyd

      Filesize

      29KB

      MD5

      e4ab524f78a4cf31099b43b35d2faec3

      SHA1

      a9702669ef49b3a043ca5550383826d075167291

      SHA256

      bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90

      SHA512

      5fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\sqlite3.dll

      Filesize

      1.5MB

      MD5

      89c2845bd090082406649f337c0cca62

      SHA1

      956736454f9c9e1e3d629c87d2c330f0a4443ae9

      SHA256

      314bba62f4a1628b986afc94c09dc29cdaf08210eae469440fbf46bcdb86d3fd

      SHA512

      1c467a7a3d325f0febb0c6a7f8f7ce49e4f9e3c4514e613352ef7705a338be5e448c351a47da2fb80bf5fc3d37dbd69e31c935e7ff58ead06b2155a893728a82

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      fd9132f966ee6d214e0076bf0492fb30

      SHA1

      89b95957f002bf382435d015e26962a42032cb97

      SHA256

      37c68617fa02a2cadced17ef724e2d450ef12a8a37215da789a4679fde1c5c02

      SHA512

      e35729abc45e5561aae1fb9e0e7c711dd7d3c1491520aa5c44fcc50c955f549f81d90897959327e930d02a5356afe08d6195adf002c87801a7a11235670639b5

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\win32\win32api.pyd

      Filesize

      130KB

      MD5

      1d6762b494dc9e60ca95f7238ae1fb14

      SHA1

      aa0397d96a0ed41b2f03352049dafe040d59ad5d

      SHA256

      fae5323e2119a8f678055f4244177b5806c7b6b171b1945168f685631b913664

      SHA512

      0b561f651161a34c37ff8d115f154c52202f573d049681f8cdd7bba2e966bb8203780c19ba824b4a693ef12ef1eeef6aeeef96eb369e4b6129f1deb6b26aaa00

    • C:\Users\Admin\AppData\Local\Temp\_MEI42802\win32\win32crypt.pyd

      Filesize

      121KB

      MD5

      5390ade0ed5428024f3d854b5b9bfe9f

      SHA1

      dada7b44887dcb7b77dcadb9690baecf3ee2b937

      SHA256

      9771f09be29bd7a69abe774e28472a392382883c18a3cc524f8141e84b1be22c

      SHA512

      92e82eff79f45d4de1cf27946a357f122c5337a85315d7c139458a1a6a51dffbf3cbfcf832851fbdcd0ec1bd0f82e7089125ffbbe3275675433089bddbff865b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      292B

      MD5

      8597f5354bbc8edfadbd6d7925752c33

      SHA1

      fda50a3c5ed800f0e9144726ff6d9b51649d103a

      SHA256

      3ea95896e3db4449be4035a21c63238f63baf52007520d361ea43343a9e7e55f

      SHA512

      62c334c7fd00d72fb8f0d9af3dc6fcab32c4b0afb8d488ebd84e53fe2d95619fa6937697c9cb90eef92588b1624e8c4c1ae1c9b85069c16762dad6e560c995fb

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      16B

      MD5

      d29962abc88624befc0135579ae485ec

      SHA1

      e40a6458296ec6a2427bcb280572d023a9862b31

      SHA256

      a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

      SHA512

      4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/3008-204-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-201-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-203-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-202-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-238-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-205-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-206-0x00007FF965280000-0x00007FF965290000-memory.dmp

      Filesize

      64KB

    • memory/3008-207-0x00007FF965280000-0x00007FF965290000-memory.dmp

      Filesize

      64KB

    • memory/3008-239-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-240-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/3008-241-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-244-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-242-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-243-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-245-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-246-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-294-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-295-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-293-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4256-296-0x00007FF967730000-0x00007FF967740000-memory.dmp

      Filesize

      64KB

    • memory/4280-200-0x00007FF7E4110000-0x00007FF7E4184000-memory.dmp

      Filesize

      464KB

    • memory/4280-158-0x00007FF7E4110000-0x00007FF7E4184000-memory.dmp

      Filesize

      464KB

    • memory/4436-163-0x00007FF7E4110000-0x00007FF7E4184000-memory.dmp

      Filesize

      464KB

    • memory/4436-159-0x00007FF7E4110000-0x00007FF7E4184000-memory.dmp

      Filesize

      464KB