Analysis

  • max time kernel
    107s
  • max time network
    98s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-08-2024 18:47

General

  • Target

    https://gitea.com/quivingss/S0lara/src/branch/main/BootstrapperV1.13.exe

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1267765281216794646/lx9j6q1Dzqb93V7znVQDCxb5MQYo-P_nPkX7SZyoUosbxCFbPkNDLm9ahT6TFD_sDEWT

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gitea.com/quivingss/S0lara/src/branch/main/BootstrapperV1.13.exe
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd5c5e3cb8,0x7ffd5c5e3cc8,0x7ffd5c5e3cd8
      2⤵
        PID:2044
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1964 /prefetch:2
        2⤵
          PID:1428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3356
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:8
          2⤵
            PID:4784
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:3328
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:3608
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1548
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
                2⤵
                  PID:2704
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:1
                  2⤵
                    PID:2000
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
                    2⤵
                      PID:1448
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                      2⤵
                        PID:4808
                      • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1880
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:1
                        2⤵
                          PID:3000
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6196 /prefetch:8
                          2⤵
                            PID:1788
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5972 /prefetch:8
                            2⤵
                              PID:1808
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1932,18022664974449377491,11992027580945050179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:8
                              2⤵
                              • Subvert Trust Controls: Mark-of-the-Web Bypass
                              • NTFS ADS
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2920
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4612
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1472
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:3308
                                • C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe
                                  "C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4376
                                • C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe
                                  "C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  PID:4308
                                • C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe
                                  "C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  PID:3484
                                • C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe
                                  "C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  PID:328

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BootstrapperV1.13.exe.log

                                  Filesize

                                  1KB

                                  MD5

                                  b51beb4423c86427f672916554030c47

                                  SHA1

                                  9b97736d8434b62ef627a4ee8484e26c719924a8

                                  SHA256

                                  df796564c34fb36085aa25452d44ead56fba39aa18e80cb4ba1c30becca0dfea

                                  SHA512

                                  262fc9e9cddee9ae3c733bb961f44f27628783961db101aabc868765ba0e2aafdcb8f9b689f1abd4613836ed9cf3064e92cbd10495c83fe04dd2a496db3485d9

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  9af507866fb23dace6259791c377531f

                                  SHA1

                                  5a5914fc48341ac112bfcd71b946fc0b2619f933

                                  SHA256

                                  5fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f

                                  SHA512

                                  c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  b0177afa818e013394b36a04cb111278

                                  SHA1

                                  dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5

                                  SHA256

                                  ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d

                                  SHA512

                                  d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  144B

                                  MD5

                                  0bfb94e0a1501d4767d7e2db25911691

                                  SHA1

                                  41a145026f0bdd08fe8476e4454c400c11a94ca9

                                  SHA256

                                  8d409ad85a4081bca7caf33786683014c6cce8caed9a38f5bede4a7fd72b6e21

                                  SHA512

                                  3071eae7a8d2842a6a3b497d17b5b15dcdb6bbf129138b0a48d99b2c9891b5977c5fa1669de94086e7fffbd8de0e59c56cba60480450c8ba377b1a080af5c68e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  3326bcd0d54339d26be5022ee6081526

                                  SHA1

                                  783bfac3b3c96bb202ecc38f5c02ba51563a6e52

                                  SHA256

                                  6c54e1a1a89a89ed44d13f67e62cff79b4d997ba2bf326ee813549fe1c7760f1

                                  SHA512

                                  0def0e23408122d88f7e79f16e8b13b1b9fba305bc49762bfc782944517936a2800cffa1872bcc33ccc11f134ded402287fbce9ca7f741a1a02bf0a5293a525d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  48ec3f79dd67cd65421f956776d7262b

                                  SHA1

                                  263fb2545405f3718294b8da464a20e44a51c3bb

                                  SHA256

                                  0ad435043618bd7c2eb01ccce078092655b511504b365892d875e89435b09974

                                  SHA512

                                  3821fba9116473563816b8f853cea76c547df9d7bef317ca70d2ebec02db937dbc3239bea5730f64f54775611f35cfa53cb1ebc45053cf4befa1aa8377c41202

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  a98d939760406ca9c1ad84edc98c8420

                                  SHA1

                                  7b82ffd206ae3a34041fc42dd7d54956029a0d58

                                  SHA256

                                  622d0336425bac2330995bebfd9ed8eefc0349eea7c9b5085a87da0050dbc056

                                  SHA512

                                  fdabd8952d3f3c7e0218de5f9c9dab31a69a899d3cbcc8c8617f1a91780c9d86c5de3951f2bf43382b6572fcb09046a8baed15aa6ffc80f34d4ee06c492f6b07

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  fa3bf12b91054880cfacd69c35a5c0e1

                                  SHA1

                                  9d50e4f2ba07df9821b6cd1e48907772e7b098a0

                                  SHA256

                                  cb2e64f8ac96455d8a867963f0966aa4575cab5a96257bf89ca462757bfb235e

                                  SHA512

                                  ce6b69bb829d8cb835f1856625032db82cbdc051aa257cffe7d5ae1997efddafea1d5038e1b5a653d5e5b57559a78989a113c5d3906d459f7d8ca1edb9caa544

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  7e5f8b3d223fa8cba928533b3944a969

                                  SHA1

                                  ec1d4b09db75c30a86385933aef512632cbadb2a

                                  SHA256

                                  c7ca7d2c308c2f146ff11ebce0af8394ea5712b61193fcf5487ca03b514bb793

                                  SHA512

                                  0e155c019932ff3b521799e779adef032c8b6fb646ff1454166c3307d91fa5c2ecea5fca5eb709a3ca70221d1d0ce6f1e150c5e93b7e2f35ea3fb42200b9f755

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  9b6ea5b24d3f43e83f707f8d162abb5d

                                  SHA1

                                  8411c360d380d011eac5c110a8c811fbd7b16804

                                  SHA256

                                  34db03f9ca897450445cfb7d276663d04001a839efa728b3b1a94ed8ec8b7eb2

                                  SHA512

                                  224b7ee178e3c437c83a550e04796493864a509b9882bcdd193a27910069f5d6a3387e8b88b4d27d637d6cf679307b849fe4568ebbb2ca2c6365263a3dc13c81

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  8f41ccbe7c1c3478743530ff461d72d0

                                  SHA1

                                  17d530afbc06873ea2c327ebba0e24638bec5c00

                                  SHA256

                                  1917ec88e7b979f4eb868a65a13a819c83525f803c98093ee9b6a3db41888579

                                  SHA512

                                  ad4032d665215ac0a419eda56e9c2d24f06b2f96959144db50404ecff7ebc3b0d362a4b0e6893de8137ae89e58f826ac27d2a06b89fb6977e2219583dacf2954

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  92362e3640ccf508f6fb47a013fd4578

                                  SHA1

                                  5f3ea3967d6c8dd85c4215c4910c705fd87f9f2b

                                  SHA256

                                  22600b84f7417e0039a642ce8fe0c2d55b3eb1bd2f1a6c8dd5db215e83806470

                                  SHA512

                                  52130f84946bf2d00054603deb911aa9828164aabb2af8ef8f3d7d6ed1424128deffb8efc29b87dcb57e083fb97b4b4aa4c1f8ba89bd6c7cc3b354df12035ca6

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  561b5ae8bdfeee4fb17cd587359d0ac3

                                  SHA1

                                  978dfe70fac0a60346c930a032b1a10409e8ab0c

                                  SHA256

                                  48013b6359bbe85445f093e7f454b8998776db6c88dc6eb1f21285fba221f156

                                  SHA512

                                  af2286f28967278ab098ea55f9ee0a7e20673edf177a2eb7f1c7dd4eef8eb5574860e095ba1068c49356f9788e298e8666cf00bfa011939c2d5df36d44c9b455

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  dfd3906efa2c7abb76d46af1570b4536

                                  SHA1

                                  b4cf5084779d36f26b7eeea923f3c43b58d5c09e

                                  SHA256

                                  0ef92481cd4519cb862112684efcc70c5f1cc3504a64775b91bf9c8e3f9b0189

                                  SHA512

                                  5acf6259346be3bdc0e3be5b97363b80b0a219f983372d85c4c3e52bc64d49b237f986b394ef17b499f1eee2a20d10dc9b54a7f37dcf29ad1a0e242672fee5ee

                                • C:\Users\Admin\Desktop\solara\BootstrapperV1.13.exe

                                  Filesize

                                  231KB

                                  MD5

                                  282abb0f0ec32631b00061b682a1d930

                                  SHA1

                                  48497f3020dbbe6d1f74654d3df0995ccbee2f16

                                  SHA256

                                  78f8fb8537ad3b8545788459cb6429ebbae3bfca197b6396bf197857789cc32f

                                  SHA512

                                  1a90ccba732d8d4eb6db1b79c496c536f9021cc63a5202619fb7a133b06c61e5875df62c39a532230cdd1ab81c3a9d8b14d80f430925f05eb760a66d63f76ce2

                                • C:\Users\Admin\Downloads\BootstrapperV1.13.exe:Zone.Identifier

                                  Filesize

                                  108B

                                  MD5

                                  4fee4af905bdd9015a623fa94f361113

                                  SHA1

                                  86a8a7962ea94932bb4ed1a71e84fcf2db1ea6a2

                                  SHA256

                                  a3d5db82189e18a64994d5f6725446086e0a3b80392968c1218914a9da6cb7bd

                                  SHA512

                                  d97cf07fb85799d834129f4335537de5f1f97e9c5aeb9f1cdca82d97c129342049af554c4b96b962a7633ca028ba017d3dcfa978fc242102e2b7024fc27f7baa

                                • C:\Users\Admin\Downloads\Unconfirmed 425865.crdownload

                                  Filesize

                                  135KB

                                  MD5

                                  2a3ff2b5541c50707ccf779227697304

                                  SHA1

                                  830833e5bdd6eadb18a876175ff8f8f25ec3ad53

                                  SHA256

                                  9deca05f68de1a762237541a537b9248187554e8500b38ec7cec04a484612058

                                  SHA512

                                  7518535cb8be492cc0042c698eb9f3605e2cdc386d8c18dc350c0fc12addfe816d984e735ea2072be8ec537029900ed57814f4d3e2b3b568bfbc9b545df20c96

                                • memory/4376-266-0x00000235A0A40000-0x00000235A0A80000-memory.dmp

                                  Filesize

                                  256KB