Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 11:05

General

  • Target

    Setup.exe

  • Size

    7.2MB

  • MD5

    20fef5bdc027fe134921818ab892bcb3

  • SHA1

    c3518867499e42b056714182a634fc45fb61f64c

  • SHA256

    805fc3213ba46745a9c522edbdd0a694b12cf45ae3807a2713476e7267a7f6f6

  • SHA512

    974ea0386635e7fc7f055994dd4e559e4313c94fae301caaa3c4392c088071fcd726bc0e80d084bd76df53fde731717321b9f2e2575f57fcb2e53a379f62ee65

  • SSDEEP

    196608:GXcUFzaxXA+VdwZyCAKgkBAKf6AqZJj1ZWw:GFxSDKfAAGNbRZWw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\is-R9BE8.tmp\Setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-R9BE8.tmp\Setup.tmp" /SL5="$13003A,7027008,227840,C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Program Files (x86)\DODI-Repacks\Grand Theft Auto IV\Uninstall\unins000.exe
        "C:\Program Files (x86)\DODI-Repacks\Grand Theft Auto IV\Uninstall\unins000.exe" /verysilent
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp
          "C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Program Files (x86)\DODI-Repacks\Grand Theft Auto IV\Uninstall\unins000.exe" /FIRSTPHASEWND=$4024A /verysilent
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          PID:4700
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.dodi-repacks.site/
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3440
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9723d46f8,0x7ff9723d4708,0x7ff9723d4718
          4⤵
            PID:4468
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
            4⤵
              PID:1560
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3492
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:8
              4⤵
                PID:3216
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:1
                4⤵
                  PID:2260
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1
                  4⤵
                    PID:2536
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:1
                    4⤵
                      PID:4756
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
                      4⤵
                        PID:3360
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3152344683483917157,443968451598584291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3468
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:2252
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:4500

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Program Files (x86)\DODI-Repacks\Grand Theft Auto IV\Uninstall\unins000.dat

                      Filesize

                      142KB

                      MD5

                      3021097336cb5e1ad9001f315c825007

                      SHA1

                      3ada66047c39d45e266d0061319e995ead964e36

                      SHA256

                      640567acc9d6100fc430edc34d16d21b15a80d2fb5b7c6536d69d004ebbd9914

                      SHA512

                      8092b2926011a0678c1415a63e701cd30912721874defe2322204f1025c772ee3c3bf3a5795c46ce252c40da4ff5e142d7a98ddf53ef48041c314202dce6f804

                    • C:\Program Files (x86)\DODI-Repacks\Grand Theft Auto IV\Uninstall\unins000.exe

                      Filesize

                      1.5MB

                      MD5

                      7f4b797246584e5e44828d8b3369186e

                      SHA1

                      bda4cf732f17dba4fcf536a1a52bbcb21af52357

                      SHA256

                      5b5efd358310de18959f63cadc81ca8fad5ff83f1f61888383658dd554c7f2e6

                      SHA512

                      ce1b29b34d9c962935be9697ac99223cdd201c162bee5c0ca1960a3f789ed4fff1b5bf5eb05bb4406871514b8d12fbe28541537427c85f63d8e25776999f3577

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      983cbc1f706a155d63496ebc4d66515e

                      SHA1

                      223d0071718b80cad9239e58c5e8e64df6e2a2fe

                      SHA256

                      cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c

                      SHA512

                      d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      111c361619c017b5d09a13a56938bd54

                      SHA1

                      e02b363a8ceb95751623f25025a9299a2c931e07

                      SHA256

                      d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc

                      SHA512

                      fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                      Filesize

                      264B

                      MD5

                      8e007bfc9347dd771e7815cfe2fc74b4

                      SHA1

                      c2c39bfd938a1414874bbd527d734309161e1e54

                      SHA256

                      d0141cf8e8e1df58b0e17207c920f2cda88ed0b38823aa70bcb588111498cdf1

                      SHA512

                      54c1cfe1684c57d8f92ab4af158c45b901aebb7c03aa36e3c387af108340e5870e226e3db291cb02351fafbeb0eb0462292581edf703b5c683e02d49270b1095

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                      Filesize

                      549B

                      MD5

                      99f938ca018fba6164493f0ea3955422

                      SHA1

                      c05935f4b59f812101c0b1ddf77a375ba4e04ac7

                      SHA256

                      b176ed970f5d41926911b41be2b9c3d5d78d7c9fa3f1428dc402fa378c8b68b7

                      SHA512

                      0588790dd69d17d91cab8cd5d8020052f8a1b6589bef6333e62e7a4a5f467e30c13e65d1d00a49669328225ecd39e8f735cb403340b61cd3fbdcc721ad0f505c

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      7KB

                      MD5

                      be603a7d3c85fe2b2744945ee516a232

                      SHA1

                      b10bda1f038a1b551eff6cf93ea2f394b1606cb5

                      SHA256

                      8f7998365b52b4b1eda136d622583dffb62d4ad068194abba97355c5c27a3c97

                      SHA512

                      69a8630ff0d66152995c04e749695905f1f43aa7ea88a84b832fcea319decb4cdaa8ecdbc4509550e2de73ed8386a91a75e16c42d84a2955e125f7e6d9d4b289

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      0ec211c9d266824cf6c1b7512b8df56d

                      SHA1

                      59db2e64125fc4f7f1eae094b9449edb346030f9

                      SHA256

                      bf15b7f194eab2854eeba0467885c2a49e7c5da14a187802c3197f0b06f140fd

                      SHA512

                      033816824292cedffac430e3252b88b52c655d2b98ff747fb3ecfbbb37dd398ea6f2f9f1bede222018ebf9090d91c61135ec940d6a602a67e61aa43e335501b2

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                      Filesize

                      16B

                      MD5

                      6752a1d65b201c13b62ea44016eb221f

                      SHA1

                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                      SHA256

                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                      SHA512

                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      10KB

                      MD5

                      e33c5edf32f3abc35afb1ca98bc650c2

                      SHA1

                      2a6e893375e1e6e5628972f5184d11ae84734b31

                      SHA256

                      675eff83ef0770169ec87ce495159d86a5e5422d3f5f8f81a42e8d0429d9d2f4

                      SHA512

                      b8ee24b98d19a7bc290c7f025400e3100767abb2dc231e321171d6295f86af503ca09ed7a65843b4d0cb71193deb4e023337bc4528ea6f5c726e56f97952efeb

                    • C:\Users\Admin\AppData\Local\Temp\is-0JN3V.tmp\_isetup\_shfoldr.dll

                      Filesize

                      22KB

                      MD5

                      92dc6ef532fbb4a5c3201469a5b5eb63

                      SHA1

                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                      SHA256

                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                      SHA512

                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Autorun1.jpg

                      Filesize

                      219KB

                      MD5

                      89bd51b41cbc8404d25f49f4fb72ce15

                      SHA1

                      643753d4f52ac861d9d03c6ff63df76f5aff79be

                      SHA256

                      df8b74c58ec5263c53968d7839a5bbe02d94816bf2339c4215f37d7bf5452414

                      SHA512

                      5236b97bcdccc38ea49860934ad5a71ec5f3a40fb54a8d3ebb2a7418eafe6242feae7fd1894db718625ec7a3ac5765da0f27f9183326b3c69405cef9da15acc7

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Dark.png

                      Filesize

                      65KB

                      MD5

                      185d31c702a861fd7026c693513eb3fb

                      SHA1

                      4857cba77bce860ee34df70d2ed06ac51958b53f

                      SHA256

                      56e1b926b344ef760fea6a4fd862e066ea5295f7e5671fc7c0d1f1bc148e2009

                      SHA512

                      9cabac5d73a9dada0d809fdfbbb552c105d0de975a545fef70322b8c86b001691af6e2dc58e980343342a953bed12d91553dc253928cd6357836b6aaf5efb8e4

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Exit.png

                      Filesize

                      9KB

                      MD5

                      91f97aa4b051e7b2991e5456d2c8655b

                      SHA1

                      901dd406613f3e97d8d6141bb061b242a3b5fb4f

                      SHA256

                      0ff3fbfbb177d5ffc8b577f821a91f9d39f13f5f548f9570c12cb85ccef526e3

                      SHA512

                      b664f7aff75308d416c9e479bbd9a9b840816d41fb1dc218187c01636e443c4c7976a635459f626f971961c89d0b8e3c91bb0d61940e487a36179437fb0aa296

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\ISDone.dll

                      Filesize

                      452KB

                      MD5

                      4feafa8b5e8cdb349125c8af0ac43974

                      SHA1

                      7f17e5e1b088fc73690888b215962fbcd395c9bd

                      SHA256

                      bb8a0245dcc5c10a1c7181bad509b65959855009a8105863ef14f2bb5b38ac71

                      SHA512

                      d63984ee385b4f1eba8e590d6de4f082fb0121689295ec6e496539209459152465f6db09e6d8f92eec996a89fc40432077cbfa807beb2de7f375154fef6554bc

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Install.png

                      Filesize

                      22KB

                      MD5

                      3a104b9ff4b59bba6dc3b30114c5b31b

                      SHA1

                      3a03ebe2b3ff5d4bac88355c82a86da3bb30cfde

                      SHA256

                      1a72008c2393b330c3a9e05bcba070e538d9d5078767adc49a86a05473226ced

                      SHA512

                      8d4d985d5003b2b7739c9f5549b8ea143adcfa78188fea45de49a73f82dd1e88709ef35a62bdcfdf360a1d3face0cb40fb8ff782d15f5081127dd6121a7e0289

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Light.png

                      Filesize

                      56KB

                      MD5

                      5036fbdd45fec2ad2f18c0fa51a584be

                      SHA1

                      83c012dd5808248e27b611ad921d729e230cfaf7

                      SHA256

                      9813c13b925ca95d4038c827e5efa1bf6c00aed41c65b7e7d5907ddf68866847

                      SHA512

                      7c554d62e09410c4ae9a6cc02102ec618a35e93c2c74cb59b26e9c5d0bc4eee68a12c051c30cbef1c7c6ea5730e67ec551a3548834f1251e01bbb4bd561e7736

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Lockscreen.jpg

                      Filesize

                      423KB

                      MD5

                      f4eef1e7abe64904222f57d4e2f02170

                      SHA1

                      7be1e10fc5779659a5f858103e50ca27b5d78555

                      SHA256

                      26a26ed55d124c8097dce33eecb4da1f27c81b6f07653918f58535f33d1c6b2f

                      SHA512

                      7228a27f3d75b47fedcf55e728c4ae4a1e38101c8fcec877cbc3da6f214527dca103e96a90f71d0b0f982e8e5d926c7b32b8ae3d184e2105c48d945a72dc981c

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Lockscreen_overlay.png

                      Filesize

                      77KB

                      MD5

                      f5f4fe2b811e5a07ae1184579cf36557

                      SHA1

                      9ae1594e259f1aa06734c8653796596113f2d08b

                      SHA256

                      d66bbf3a8d5f5890c3dbc95e77068abb10f3db4ebd0c71ae5dbf15d99174889c

                      SHA512

                      eded97ed79f84916e5727f83e170f3999478df537bebe39767c49a3bedf4c86cd5bc3dcfd5d767559b9333ce9e06bddeceb96469e5a70eaae47145a838438f56

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Setup1.jpg

                      Filesize

                      219KB

                      MD5

                      4e26d2992d2c04e13378c59526312226

                      SHA1

                      5ee45130d48c812f3b4debf7a558bf29f9a57239

                      SHA256

                      72b54dfea4009022be17e9ad053d2eb6901bcf4100607ba09fa23c7954feef08

                      SHA512

                      61b54bf0bc6d678674e1f5e5776f428f46b0f2689ddc699e1503015a13e1612f6540e2725c263a89455232faaf75666162ac812271a605550640a2ad87249638

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Tile1_Background.jpg

                      Filesize

                      422KB

                      MD5

                      29e2a41ad9ca77ee358c78c719b2a460

                      SHA1

                      0cd937df548021a906c6c2aac3fccf459f672ec5

                      SHA256

                      12d248e3cd3cf7d1009c6b1c2564f0814dce5f585881f2dd6905918c3a2a0170

                      SHA512

                      f60e6056377f6a0228147b7db1dc45650a523ce273a79d9a292b6cd9f508f70c9b0be027777914499dca4c9e511f6ae0c696d6281f775062f2a499d3cc36fe6d

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Tile1_Icon1.png

                      Filesize

                      12KB

                      MD5

                      688231d073c8260004d860b29726e589

                      SHA1

                      33ef340a8671fe0b74cab319e7c3f2a197eb6c3e

                      SHA256

                      81ddf630398427b4d81e15b6feb595669d06923a5e95954cb36a442d7f0e26c3

                      SHA512

                      94aa5fbede7d9da05b8216c2cf451e927edbcc0f8808f89fb3ce612870e849836d2df477c9630358b92bead596d2a900fe1879b3c99fdd630a4c8cecbf5f6a6a

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\Uninstall.png

                      Filesize

                      9KB

                      MD5

                      1dbec7e15bb3fe912ea362c7f5305cb8

                      SHA1

                      8ee2dca3f834cd7809dd50681bb432fa17f982f6

                      SHA256

                      43bfe50a575e87237abe4f65eee18b23e667c0a6c9fa1fd6fc2176948edfa527

                      SHA512

                      dc46536df17a17410a4aa2b6afaee9a620612e23498d009e766411bf2d17c87da0ac3b3f5a950375c34f4355f6b2924dfdc99c52102e1e702fd55f29333fc55f

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\botva2.dll

                      Filesize

                      37KB

                      MD5

                      619bf9ddcb5fe39ee9e5b0167e7f4f0d

                      SHA1

                      6da8c0d2407d5221172765b00452efa0f361902f

                      SHA256

                      609661a14733f6e9c2c2f2ff9c274f8a4cbedaff4dd32049aa5161f8d7083d6a

                      SHA512

                      a89fc731805e83f889f408fe3fea769d0e44faf1e1dd37d3569bbf57a6086b1ffc8783778e0be8236447c7661c44051b2d4b1d3a643f7ebc35f6ef0625c6897a

                    • C:\Users\Admin\AppData\Local\Temp\is-JJ2LP.tmp\logo.png

                      Filesize

                      16KB

                      MD5

                      248b333173b622a3eec2ade3f118bf5e

                      SHA1

                      a760487d8ed71677500b6a80a2f1ad401e40622f

                      SHA256

                      6ca365efbe7906bdaf35a99c483b37a6383a7e69408597924cefb2d6616163e5

                      SHA512

                      e377c2ac34ec56962dec4e270f2c2bf6bb24bebe61981280f65c110a0eff995a8b87503d561d976f5c320d89a186ee9859887bbe9b37bfd3abdf97a28ad1c6ad

                    • C:\Users\Admin\AppData\Local\Temp\is-R9BE8.tmp\Setup.tmp

                      Filesize

                      1.5MB

                      MD5

                      6e4e83302159ec46e10280abe1d62ce1

                      SHA1

                      eb439d7b73e64605eb9f37b9b057722861ada267

                      SHA256

                      bb22238b9de45d10013cdf18b66d13646137bf5ddc075c781a160ef8739b2fd7

                      SHA512

                      22331088377154be8b11825c95c1a2a8765d71c3394714faed00a6185ab84afac63ae95103f20f1a9e4fe447259976734e1bd905e4a45bbe0567cee5241f1033

                    • memory/1348-212-0x0000000000400000-0x000000000058E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1348-181-0x0000000000400000-0x000000000058E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1828-35-0x00000000033E0000-0x00000000033EF000-memory.dmp

                      Filesize

                      60KB

                    • memory/1828-83-0x0000000000400000-0x000000000058E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1828-123-0x0000000000400000-0x000000000058E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1828-277-0x0000000000400000-0x000000000058E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1828-7-0x0000000000400000-0x000000000058E000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1828-84-0x0000000003250000-0x00000000032C7000-memory.dmp

                      Filesize

                      476KB

                    • memory/1828-16-0x0000000003250000-0x00000000032C7000-memory.dmp

                      Filesize

                      476KB

                    • memory/1828-85-0x00000000033E0000-0x00000000033EF000-memory.dmp

                      Filesize

                      60KB

                    • memory/1828-125-0x00000000033E0000-0x00000000033EF000-memory.dmp

                      Filesize

                      60KB

                    • memory/2520-0-0x0000000000400000-0x0000000000442000-memory.dmp

                      Filesize

                      264KB

                    • memory/2520-278-0x0000000000400000-0x0000000000442000-memory.dmp

                      Filesize

                      264KB

                    • memory/2520-82-0x0000000000400000-0x0000000000442000-memory.dmp

                      Filesize

                      264KB

                    • memory/2520-2-0x0000000000401000-0x0000000000417000-memory.dmp

                      Filesize

                      88KB

                    • memory/4700-200-0x0000000004970000-0x000000000497F000-memory.dmp

                      Filesize

                      60KB

                    • memory/4700-292-0x0000000000400000-0x000000000058E000-memory.dmp

                      Filesize

                      1.6MB