Analysis

  • max time kernel
    92s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 11:10

General

  • Target

    pic4.jpg.exe

  • Size

    2.6MB

  • MD5

    2881d62826eb02ac92a022b2155e4007

  • SHA1

    6f4f17a34a7c0d0511e417440f40eb6094fa7f11

  • SHA256

    913c27a9d6e08e37f8fee60c6d5f424d8e220c930071baea68390aaa028ebc72

  • SHA512

    a8b09aa3db334e8ab0c7a09749743979bd74e62457a997f3014357c852e6c6875f59dd8f1c09f62c5bb317f7a04f9dc31c9cdd24b2a56fee44c7d600b519010b

  • SSDEEP

    49152:8PHN1/Gcsd7TY1vb6JxKrcETkA6RbsgoT2LsjGjxP5Dr5rAmskf7Wd:CHNNGcG7TY1vM/ETduQBT2LQGjbDrimc

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pic4.jpg.exe
    "C:\Users\Admin\AppData\Local\Temp\pic4.jpg.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Dressed Dressed.bat & Dressed.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3088
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa opssvc"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2516
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2544
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2484
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 128101
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2320
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "MailingWesternAxisTravelers" Eclipse
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Elderly + ..\Suggests + ..\Wait + ..\Cock + ..\Revolution + ..\Pending + ..\Copyright + ..\Comic + ..\Searching + ..\Carries + ..\Architectural + ..\Ethical + ..\Usb + ..\Known + ..\Experiences + ..\Quebec + ..\Writes + ..\Galleries + ..\Potato + ..\Handheld + ..\Properly + ..\Malta + ..\Autos + ..\Proteins + ..\Opt + ..\Bonds + ..\Adware + ..\Compilation G
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4188
      • C:\Users\Admin\AppData\Local\Temp\128101\Pen.pif
        Pen.pif G
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Users\Admin\AppData\Local\Temp\128101\RegAsm.exe
          C:\Users\Admin\AppData\Local\Temp\128101\RegAsm.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3924
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\128101\G

    Filesize

    2.0MB

    MD5

    60573c1dc93c8dd959f30993b6dad706

    SHA1

    da80558066e9f9c5bfb1b21d7e0d3d5e711e7f50

    SHA256

    44523b0ec58ad7465bd105e0cd06115edf1fa219f034b2471087dbdbf10a54cd

    SHA512

    210b4ca3452de7b0f18b475373d79f999f938efbf2078762775264fb807760b3efda9379e31a3d91638b6592744925a45d2fabd3f606dc7a013b5adc0c7ebfa5

  • C:\Users\Admin\AppData\Local\Temp\128101\Pen.pif

    Filesize

    872KB

    MD5

    18ce19b57f43ce0a5af149c96aecc685

    SHA1

    1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

    SHA256

    d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

    SHA512

    a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

  • C:\Users\Admin\AppData\Local\Temp\128101\RegAsm.exe

    Filesize

    63KB

    MD5

    0d5df43af2916f47d00c1573797c1a13

    SHA1

    230ab5559e806574d26b4c20847c368ed55483b0

    SHA256

    c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

    SHA512

    f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

  • C:\Users\Admin\AppData\Local\Temp\Adware

    Filesize

    88KB

    MD5

    185060b157de87c5604f5d17816212fc

    SHA1

    61bfb2029f39fe6c50771722153f44d1829f84ec

    SHA256

    32525398aac649a50b0bf08e438805c318649dc793c2469df5b21cc86658e92d

    SHA512

    c3b43cfff6cb03b302812b1e6021c25d593835c444eb252db0b0691f60ac7ecb781f1ef8f77b0be235aef8526175793b58ad58654be108393390703b0bf09183

  • C:\Users\Admin\AppData\Local\Temp\Architectural

    Filesize

    82KB

    MD5

    dbf6b9c8deabb23821028b99e66f94e5

    SHA1

    1531ee9deff33fd7a3ca1ae05b3826896be6b6e1

    SHA256

    7554f86895353261131b1a3fd229df3327ed561baba5802eef457b244a77a838

    SHA512

    591ab83f6ddac6835b4055f6288448c03ef7017e7c48ae7170b42b38aba6e4781a718055a84fed5659382c1e2535d19a3f0d5937ecd72a516c0da4bbb6c95fa9

  • C:\Users\Admin\AppData\Local\Temp\Autos

    Filesize

    96KB

    MD5

    64e3f6982e87c287749c07fc2c97262b

    SHA1

    4200b4ad1686eaeccea6ed85c6f2eb77a54cb366

    SHA256

    e2ad4b54eca3d23fa2d599d24bc2818bda7ee049c6fdd00ccaa61695afd384d9

    SHA512

    742ca722d7a9203051ffc33f520ce79679a4232b948cda340212f518fe92d3cf42153c5196c21ed29a0d41561792923cc80d2a7dd77a3f2f6118fceb9d070631

  • C:\Users\Admin\AppData\Local\Temp\Bonds

    Filesize

    50KB

    MD5

    2ca55669e1595317b26e283fb47e9ace

    SHA1

    e3679fbc8f669ba10da347ec1037ff496ae3a2aa

    SHA256

    c2b1519b50721672a2263894982061688d74a7ba06689ef4fcca5363713d9da3

    SHA512

    60ab1d9cdbbd792fa13df94baaff10295d43378f4bb0f013b477e6ab7cf5e8c68c92bfbe60b19b539722caa85016cdea8d1583e688d1aa2018a6c7a50ea8470b

  • C:\Users\Admin\AppData\Local\Temp\Carries

    Filesize

    77KB

    MD5

    4e3ddefaf464a4bfdb35bc3b7f5faf17

    SHA1

    69a8fb7097719bbacd5d1835997ff91217e3329b

    SHA256

    6ca3e5e78021c12ccf8e1ee240b410bc1fe1eb8220635c53fca40b03e0b937d6

    SHA512

    3f46bab9695cd2d98f1d5722528b45b2c90b8a653bc50990633c95337960c9bb526a47a6fcfc2d2b71f9e0a38168fb5a595d45fc53214d8199787534de7094aa

  • C:\Users\Admin\AppData\Local\Temp\Cock

    Filesize

    79KB

    MD5

    c372151930d57e15713a51af2d7e717b

    SHA1

    9d6d0ac06e7ac366fa15d0aa9e9ea284b2e8ae1a

    SHA256

    0fcb5d3577def516ae8512b99feefab62f8409c3fd2b4b84266ae22b6ac66022

    SHA512

    bc76277ce4a24c209376012829486cd77f2515ae4ef422b70676ad4f405edffaa737c035edb131f59b5b1bd116185f5cfe4c995c57ff5458e4ec2a34d4de8ec5

  • C:\Users\Admin\AppData\Local\Temp\Comic

    Filesize

    51KB

    MD5

    804b300715ae230d497ce4b4137a708c

    SHA1

    d7ee6cf572115aba448c4400f30d5d28580590c9

    SHA256

    4112a298a301f4d65d6d11c50fa3fdc67eb76daf97442ba4e7bbada17a4198f7

    SHA512

    e306d4eecf09720156383e53f5c20133746dde1ffe767281552d719daca4ffe0ef1a8471dd1b7a70c14b6a490859d43b718f667fe18e71d095457d6b512ffbbb

  • C:\Users\Admin\AppData\Local\Temp\Compilation

    Filesize

    74KB

    MD5

    1c584bd5668efe9ba9868c5ca2e90926

    SHA1

    010c7b31a0a360d0c46125bdb0595c926f9cbb18

    SHA256

    913a7ea7b7357de6ebb232cb783aa9f1e045d6994e6e3a607079d8d69f5da96b

    SHA512

    4972f645b4b3238450c9fe17ad0dcd880b34d1e1ac33861babd7df9db6a136f94ab132355444eb9105f40c68b999caf63d9c96016cd8214690dd1a3809e9ebec

  • C:\Users\Admin\AppData\Local\Temp\Copyright

    Filesize

    62KB

    MD5

    5f0840a6162ed821b763a295816e983c

    SHA1

    76193e07d1e12040a229c99d1349f96744c8261c

    SHA256

    33a0822c7b1783d96fdeeabc5ed083d13983a81e924eb80061c7cacead86bfdf

    SHA512

    b2611d585377e44f147d69d94f3222cc1d72d9832954362cc9107db7124b1ea27262987971297c786fb6b305c4f6a939b5b9403a28fcd1581f825640c2805807

  • C:\Users\Admin\AppData\Local\Temp\Dressed

    Filesize

    8KB

    MD5

    81741968ae06bb455a610094eaea8f22

    SHA1

    c86e5e062c50bcaf90064d36e0520796cce05d59

    SHA256

    e8bb0bbeb58703962d392b5220ff65d91307e8e29887f6f69992dd85cdc8cdb4

    SHA512

    2901b7a8b14dcc39f78ea1e016ebe27a5e7ae2237fc0adf50afb895bedaf35699c4c3a2813ba0c930c4fbe1bab002e6c3b71a9d136c6438859400b74328ab03b

  • C:\Users\Admin\AppData\Local\Temp\Eclipse

    Filesize

    5KB

    MD5

    b698ecbcc3a86fd40d09a5566558e98d

    SHA1

    02deee4fc732f9843fa44d3f26842879686efefb

    SHA256

    43ffbe18ebb46b2f2ef37cffff210af01a7a019cfee6458228501acd2f86f595

    SHA512

    a85aa4dacead9037f057b924337a0fa4a41c36ec651a59b28ab749d4663d610c251fb25476c6c8492caf8ebf980fc9b0c8f98c662397c7f20f2d564ac86e5d33

  • C:\Users\Admin\AppData\Local\Temp\Elderly

    Filesize

    53KB

    MD5

    0a7e086df6d6edd1cd899e4572e3b621

    SHA1

    54a29c835ca0538e214a2208f5519bc6091df090

    SHA256

    f1e563211cb198d057f8a5370bd9308a8fd3558f5091dbf2175277aac7cf2b4b

    SHA512

    2dd1a0cc8dfa96aaf8c00e477e3ce0e28ee72f34a7bd023dfaf5a185a871dacb5428e30a3947c3acd4e748cd785578d5f0b55aea003865db4e041a58bb73226c

  • C:\Users\Admin\AppData\Local\Temp\Ethical

    Filesize

    86KB

    MD5

    d383991b2cea0d30b6ec1ed00f300060

    SHA1

    f267fe5f63edb88ec7e934b6516a1904716e15ea

    SHA256

    e6d13b12f4e6b332a1a0050353044a1c949a25e5344bde8360f21ae5e5701f99

    SHA512

    b0d8677a94266bce7b0fb7314e25d2b32704b1e626a490597a1af31c2e726e5cefb72cb5e859f804adab64e3059c693b720943b78214bfb89b876521bbb0740f

  • C:\Users\Admin\AppData\Local\Temp\Expedia

    Filesize

    867KB

    MD5

    ad9318cdaec5b1b2417db92b55b51bfd

    SHA1

    ad6c0f51bcecf8a6721449d64135ee0b329d1609

    SHA256

    d2047d8782ebe0861a42497b15f436340f1a5cae35061aeae0af7c47dc757929

    SHA512

    2f0d2c0e937d827d95ad5d0ee58f867b229a7d195717b994f9ffbf686cf4a4e9ec5c37c5e0923f2f40bbaf5d044fe32de3b27c4495394554bde0b63195ccf837

  • C:\Users\Admin\AppData\Local\Temp\Experiences

    Filesize

    96KB

    MD5

    e4dc2149ecf3bf18bfe5d1fb16f88a0d

    SHA1

    926ef980efbc660f3293e10808c48b071b4bf346

    SHA256

    718935bb499928bcbf799ba08b9d49e6441e9254311e2acce5ca79e7d81db4c1

    SHA512

    9e24c77f841bcd525bb490b6fda198a8f329f4697b85cb108a8f0bdf2dc035a2504357781e9d9dd3243f32b9ba6db4003e562f35922fb09b0bd092018b74783d

  • C:\Users\Admin\AppData\Local\Temp\Galleries

    Filesize

    92KB

    MD5

    a349216f02db0690187ef446fd362015

    SHA1

    74517f9d48d2ae96f3432d80104c0c69b50cc657

    SHA256

    ba24a1de1c00857364551fe0b9a390c5db48cf842065dd9adf674b1500d7a495

    SHA512

    eaea26c3cdeba56b771afa8e6112798aa34f08c2bbacf919c5e8baa18d8b341dd0119812e90a6d9f576f57fd227c5c2d8a2f642acfe6a925fea1c6cb856e2ca9

  • C:\Users\Admin\AppData\Local\Temp\Handheld

    Filesize

    84KB

    MD5

    769f407b57d2d5b5f484bfefe70d6963

    SHA1

    12dc60f6e9b9fee96f764b18031f8499760b5207

    SHA256

    5b12c09daeadc3232eba67873ac22524e1dfbc84579764705cb89e3e2885881b

    SHA512

    b0dba31ca780675b020c11bcccb9abb5722b71335f5d0dd54ce83df1fb8ac2dbf057e9c21545890f479199fcdb586833046025a0df2a6e264ea36790c3074296

  • C:\Users\Admin\AppData\Local\Temp\Known

    Filesize

    71KB

    MD5

    8faaf0ec1bc9693770ad872e59b1c7d0

    SHA1

    7fbe2ee9efa114b376501ad54ba5b4157b382096

    SHA256

    8e6e76259fa6495a1db850754c36c7f508c0a047ff09e9c75deb6392b87e3deb

    SHA512

    f10f385806ca65110326e16cb933fca43fce06d1c60c60dd144c20a0dcabf9b4c012f2049852054a04f259620671ae98703ec069c800d26d8469a5add4b0a646

  • C:\Users\Admin\AppData\Local\Temp\Malta

    Filesize

    92KB

    MD5

    4a4919fc37587cf6949156832158576c

    SHA1

    15c776da36450058e7a7e338e26b1c5a7c036ec3

    SHA256

    29e4396940aaea7157d8755163b4f7b3545406c5c5223d14652216638ff83d00

    SHA512

    017a9891ebdac63bab5521690190e6060cdff701be60e275201cbce671f455d4855fac70f2bb1d3a76fade301cc24c400112bc0fbfbe91113376a28e5a28bd37

  • C:\Users\Admin\AppData\Local\Temp\Opt

    Filesize

    53KB

    MD5

    2cf24f4ac05b691cfe7d6ed071315462

    SHA1

    78ef61623158f22c609650132a57d5098990d053

    SHA256

    bb45b77c6691256b1561c33931b330c4bfe528b5a5f680b6512330f94cc411ee

    SHA512

    2cbc589c8e1b37a754fa9e5be3d4922103b729e8bf48425be6c723268a7dea57bbaea50a29e39fa231d008d1290a3d6b4808e592ffa42a65b64d5050023c08e6

  • C:\Users\Admin\AppData\Local\Temp\Pending

    Filesize

    70KB

    MD5

    b10f52b301eb059a6d01c021741f7fc0

    SHA1

    fd776b7bc136e16ae8f5a4396aaf215904219a49

    SHA256

    2260460e3f5f18958044ba98d0c1cbc94332ec0b1e410e8e021f1cd4393cd62e

    SHA512

    6994617d6ad95ecf53c67fcc66bf7351e48f3a336b94060d2723672ec8657162ea48996d82ff09d4d08fed696affff19a7999f50b4fe64f5c6c6ff7b58e29b59

  • C:\Users\Admin\AppData\Local\Temp\Potato

    Filesize

    67KB

    MD5

    d0346f4c06df8bfb318f3299fbea9aef

    SHA1

    74cfcaf03bd0b695f359456e1619aae0f0946ec4

    SHA256

    abb298e4d8bebdc5c926ebf8d598334b9988e69dc104163b34364736d3c92f1a

    SHA512

    329250da4209705fe55e6877b66e138d31fdfecbe5a92fbabb825eb1b9b49551a8972be1738f722c269c19da4e72db6da950400680f94476183344a10de07f52

  • C:\Users\Admin\AppData\Local\Temp\Properly

    Filesize

    60KB

    MD5

    c549512f992d04a808b5064dde4c65eb

    SHA1

    8bb827d24cc1a7b7d507845a56c9649f7a6538b1

    SHA256

    d4d85a0d3eaf9d90283b46c93fddbeeac6d8ddf6c0f0902e71f2c0443d3a823b

    SHA512

    b26ba2e0d3380d180b2432752cad65d30d63614cc521c1edb21e50ed27973e8970cae4887d478d675aa78dda539ab9fb74685c951aa98ef80233a3c74bba8112

  • C:\Users\Admin\AppData\Local\Temp\Proteins

    Filesize

    50KB

    MD5

    8688209150402afe41e2dc7d355c3ded

    SHA1

    bd44c9ff0e46532b7b8deace8fc4c59a5cfc6092

    SHA256

    45c8ea049b5872a781c381e520594dce735d0b17a59a648cdcaad8a6e264e9c8

    SHA512

    424083502ae0a6865ac8c9974b5ef33a27a622608570fcd35c7aaf5ba3cc7b455c5cb29b9ad5cb43ff3c9cca364a2314c695a801cb8cc658246a4cb0d501d5f2

  • C:\Users\Admin\AppData\Local\Temp\Quebec

    Filesize

    90KB

    MD5

    1c9ab1dd79d513aac12049c7fd1b4d8c

    SHA1

    443efe139cdf3a7d29bfd38d02138a4643486435

    SHA256

    8bd0c77874db120031a358933e08e1947da820a497e3b56a78eb7527da5f3d60

    SHA512

    3075f5d186e2156397bca61737b9be4954eb34c86179f79c14fcdffe41102ee6f077470a4fac61f47990ac7bfa1c746def6bb1ba2e05b215ce30b48896933118

  • C:\Users\Admin\AppData\Local\Temp\Revolution

    Filesize

    74KB

    MD5

    080c6fb2f87c8b278a8606d5784eeb3f

    SHA1

    cc1553f041dd42ee9c922ff3f5def71017b7b081

    SHA256

    d3e08ceb67b8a136b57c07d4747cbe31d15ada6c068ef537f82658f4834d3e2d

    SHA512

    690b02474533426017812274e17beea34a2bba9ec3220dfca67cffae3c538572bef51af0a8c3f3a3e213ea61676d7e3c4252d2c0482902a548f82e910ddad1c9

  • C:\Users\Admin\AppData\Local\Temp\Searching

    Filesize

    90KB

    MD5

    cb3112591430ff9b0a15bf9c25c6ef80

    SHA1

    0b605f9466c8e63d4348293798891567e7348f21

    SHA256

    401a40589950f2c7a691b1c8eabe397d2adce97ce1e83ebdf278b6623c631bec

    SHA512

    24db34cf00b326ea9dab8ab1a0ce1b57e01085b43655ffb9336f87cd9793bf2b143722c4d4de576f98710944e199dfe88b8cfc59fc9b2f652cf7badacf5ad5e1

  • C:\Users\Admin\AppData\Local\Temp\Suggests

    Filesize

    80KB

    MD5

    8905886558c75ea0adeb32a9e7b6d585

    SHA1

    394dd0ef5823d5fb982fca0220266424dfcf3365

    SHA256

    fc157065936a58eea8b09385c9fb7b28c28e1ab05bc40e2cf45d3ded37a0e900

    SHA512

    24b6b49b1c9809e35c4ece11de8ebbdfe53ba8a696a29f9b207f52614de62ece4cf563539788830395c32b2d08abe4198d040b836094c56cfc1f1faf9fce5ba3

  • C:\Users\Admin\AppData\Local\Temp\Usb

    Filesize

    66KB

    MD5

    dbd57e07377d2f2d03713355c8a526a2

    SHA1

    2fb3ddf1fa2778a774643f71b7602cd56767f082

    SHA256

    33892e724136d72078b2cf74cba6b755e9ca8251724ea611f0debe423823b447

    SHA512

    a73f452491171c489887e3f4426fe2afdd4a8faecb008e6d5bd314545eb9e616206ddb78b1409bc8859ddcb70f0e6b161b5015ba8ea16fa16750c6b100c77cda

  • C:\Users\Admin\AppData\Local\Temp\Wait

    Filesize

    74KB

    MD5

    d9c1c7c19fd093aac3c388f34ef736fa

    SHA1

    825a70b81896decac9a2ce156ef9088d182d1efd

    SHA256

    8d936e3e06886e58b04b40494427abfe867000ee4307f648da94dbf4dba1d281

    SHA512

    578747a02dcf751cdb52e483ab78396efd85bfeb6aaca0d1094933612e5e0191464ca4e9732fc85dd3e7db272dd274d449621e3ce1c237f51ba638d0652df26c

  • C:\Users\Admin\AppData\Local\Temp\Writes

    Filesize

    62KB

    MD5

    df6284a5ff634ad453454748101ba3ce

    SHA1

    fe0442ec306aa3322c024b2a4236477582dad4a1

    SHA256

    e728581fbe1bd8e9cae31b8de81baaa830bb8feecb312f27e52392a78ebdcebb

    SHA512

    5ebec770668b33440049861d01826b290448efc9ad8b7f2ca64d3fd77a5b85626047e7a5437b567a6b0e82b74eb109039770352cc170eb40f9dfe49baeb782b4

  • memory/3924-71-0x0000000000970000-0x0000000000BBC000-memory.dmp

    Filesize

    2.3MB

  • memory/3924-74-0x0000000005900000-0x0000000005EA4000-memory.dmp

    Filesize

    5.6MB

  • memory/3924-76-0x0000000005610000-0x00000000056A2000-memory.dmp

    Filesize

    584KB

  • memory/3924-77-0x00000000055D0000-0x00000000055DA000-memory.dmp

    Filesize

    40KB

  • memory/3924-80-0x0000000006830000-0x00000000068CC000-memory.dmp

    Filesize

    624KB

  • memory/3924-81-0x0000000006320000-0x0000000006386000-memory.dmp

    Filesize

    408KB