Analysis

  • max time kernel
    164s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    19-01-2022 08:10

General

  • Target

    7zS850A099E/61e74fd53f766_Tue23ec97445e.exe

  • Size

    160KB

  • MD5

    8f70a0f45532261cb4df2800b141551d

  • SHA1

    521bbc045dfb7bf9fca55058ed2fc03d86cf8d00

  • SHA256

    aa2c0a9e34f9fa4cbf1780d757cc84f32a8bd005142012e91a6888167f80f4d5

  • SHA512

    3ea19ee472f3c7f9b7452fb4769fc3cc7591acff0f155889d08dadbd1f6ae289eaa310e220279318ac1536f99ea88e43ff75836aee47f3b4fbe8aa477cb9d099

Malware Config

Extracted

Family

socelars

C2

http://www.nvdmzf.com/

Extracted

Family

vidar

Version

49.6

Botnet

937

C2

https://noc.social/@banda5ker

https://mastodon.social/@banda6ker

Attributes
  • profile_id

    937

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 7 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 17 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 23 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 17 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 5 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe
    "C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd53f766_Tue23ec97445e.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\Pictures\Adobe Films\UutwfczMHDgpbGQxEisZgY85.exe
      "C:\Users\Admin\Pictures\Adobe Films\UutwfczMHDgpbGQxEisZgY85.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3756
    • C:\Users\Admin\Pictures\Adobe Films\Aaaqc0ni0gGTSXCoNAuV03Py.exe
      "C:\Users\Admin\Pictures\Adobe Films\Aaaqc0ni0gGTSXCoNAuV03Py.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im chrome.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im chrome.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1548
    • C:\Users\Admin\Pictures\Adobe Films\oiY4fhwAHdS9UYmdAXebByCe.exe
      "C:\Users\Admin\Pictures\Adobe Films\oiY4fhwAHdS9UYmdAXebByCe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3184
      • C:\Users\Admin\Pictures\Adobe Films\oiY4fhwAHdS9UYmdAXebByCe.exe
        "C:\Users\Admin\Pictures\Adobe Films\oiY4fhwAHdS9UYmdAXebByCe.exe"
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:2872
    • C:\Users\Admin\Pictures\Adobe Films\cmkaxKnjs2gDkWIYgfdtVZvg.exe
      "C:\Users\Admin\Pictures\Adobe Films\cmkaxKnjs2gDkWIYgfdtVZvg.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 1284
        3⤵
        • Program crash
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:2412
    • C:\Users\Admin\Pictures\Adobe Films\yNVbB1if52dc3M04MimzUBst.exe
      "C:\Users\Admin\Pictures\Adobe Films\yNVbB1if52dc3M04MimzUBst.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\Pictures\Adobe Films\yNVbB1if52dc3M04MimzUBst.exe
        "C:\Users\Admin\Pictures\Adobe Films\yNVbB1if52dc3M04MimzUBst.exe" -u
        3⤵
        • Executes dropped EXE
        PID:3520
    • C:\Users\Admin\Pictures\Adobe Films\gl2lG_VTtD5rBdKPjAUTSCz6.exe
      "C:\Users\Admin\Pictures\Adobe Films\gl2lG_VTtD5rBdKPjAUTSCz6.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3252
      • C:\Users\Admin\AppData\Local\Temp\11111.exe
        C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        PID:2168
    • C:\Users\Admin\Pictures\Adobe Films\EXNBcuiLvy_JCRs_X1pzHIWQ.exe
      "C:\Users\Admin\Pictures\Adobe Films\EXNBcuiLvy_JCRs_X1pzHIWQ.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:3944
      • C:\Users\Admin\AppData\Local\Temp\filename.exe
        "C:\Users\Admin\AppData\Local\Temp\filename.exe"
        3⤵
        • Executes dropped EXE
        PID:3600
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 1436
          4⤵
          • Program crash
          • Checks processor information in registry
          • Enumerates system info in registry
          PID:1060
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/2qFJj6
        3⤵
        • Adds Run key to start application
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        PID:3384
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff41f446f8,0x7fff41f44708,0x7fff41f44718
          4⤵
            PID:1648
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2312 /prefetch:2
            4⤵
              PID:480
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:8
              4⤵
                PID:840
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:3
                4⤵
                  PID:3820
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:1
                  4⤵
                    PID:2440
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:1
                    4⤵
                      PID:2168
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5376 /prefetch:8
                      4⤵
                        PID:3520
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                        4⤵
                          PID:3088
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:1
                          4⤵
                            PID:2412
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
                            4⤵
                              PID:3916
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                              4⤵
                              • Drops file in Program Files directory
                              PID:3340
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff62be55460,0x7ff62be55470,0x7ff62be55480
                                5⤵
                                  PID:2480
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2300,4399091506577736416,4390206586205755488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
                                4⤵
                                  PID:2288
                            • C:\Users\Admin\Pictures\Adobe Films\US164A3myC8WPIfGGxXtFHWe.exe
                              "C:\Users\Admin\Pictures\Adobe Films\US164A3myC8WPIfGGxXtFHWe.exe"
                              2⤵
                              • Executes dropped EXE
                              • Checks computer location settings
                              • Loads dropped DLL
                              • Checks processor information in registry
                              • Suspicious use of WriteProcessMemory
                              PID:3364
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c taskkill /im US164A3myC8WPIfGGxXtFHWe.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\US164A3myC8WPIfGGxXtFHWe.exe" & del C:\ProgramData\*.dll & exit
                                3⤵
                                  PID:372
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /im US164A3myC8WPIfGGxXtFHWe.exe /f
                                    4⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2484
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 6
                                    4⤵
                                    • Delays execution with timeout.exe
                                    PID:812
                              • C:\Users\Admin\Pictures\Adobe Films\htnGJ_FVPOsj7P1fTWa9NlaH.exe
                                "C:\Users\Admin\Pictures\Adobe Films\htnGJ_FVPOsj7P1fTWa9NlaH.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2120
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1164
                                  3⤵
                                  • Program crash
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  PID:3432
                              • C:\Users\Admin\Pictures\Adobe Films\MPe_y0rzNhCheY4NN3KQoUh7.exe
                                "C:\Users\Admin\Pictures\Adobe Films\MPe_y0rzNhCheY4NN3KQoUh7.exe"
                                2⤵
                                • Executes dropped EXE
                                PID:1840
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 440
                                  3⤵
                                  • Program crash
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2940
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 452
                                  3⤵
                                  • Program crash
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  PID:2148
                              • C:\Users\Admin\Pictures\Adobe Films\hqfpP7ITbWduR0kCPoWGgFiF.exe
                                "C:\Users\Admin\Pictures\Adobe Films\hqfpP7ITbWduR0kCPoWGgFiF.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2116
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 1788
                                  3⤵
                                  • Program crash
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  PID:1912
                              • C:\Users\Admin\Pictures\Adobe Films\lia4XUPpIYjObfwMd5z95N_J.exe
                                "C:\Users\Admin\Pictures\Adobe Films\lia4XUPpIYjObfwMd5z95N_J.exe"
                                2⤵
                                • Executes dropped EXE
                                • Checks computer location settings
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3012
                                • C:\Users\Admin\AppData\Local\Temp\svcli.exe
                                  "C:\Users\Admin\AppData\Local\Temp\svcli.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:2668
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1840 -ip 1840
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Suspicious use of WriteProcessMemory
                              PID:3452
                            • C:\Windows\system32\rundll32.exe
                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                              1⤵
                              • Process spawned unexpected child process
                              • Suspicious use of WriteProcessMemory
                              PID:2896
                              • C:\Windows\SysWOW64\rundll32.exe
                                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                2⤵
                                • Loads dropped DLL
                                PID:1648
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 600
                                  3⤵
                                  • Program crash
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  PID:3928
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1648 -ip 1648
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Suspicious use of WriteProcessMemory
                              PID:3744
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1840 -ip 1840
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              • Suspicious use of WriteProcessMemory
                              PID:2220
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2176 -ip 2176
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              PID:1164
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2116 -ip 2116
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              PID:3460
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2120 -ip 2120
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              PID:3516
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3600 -ip 3600
                              1⤵
                              • Suspicious use of NtCreateProcessExOtherParentProcess
                              PID:1228
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:552
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
                                1⤵
                                  PID:920

                                Network

                                MITRE ATT&CK Matrix ATT&CK v6

                                Persistence

                                Modify Existing Service

                                1
                                T1031

                                Registry Run Keys / Startup Folder

                                1
                                T1060

                                Defense Evasion

                                Modify Registry

                                2
                                T1112

                                Disabling Security Tools

                                1
                                T1089

                                Credential Access

                                Credentials in Files

                                3
                                T1081

                                Discovery

                                Query Registry

                                5
                                T1012

                                System Information Discovery

                                5
                                T1082

                                Peripheral Device Discovery

                                1
                                T1120

                                Collection

                                Data from Local System

                                3
                                T1005

                                Command and Control

                                Web Service

                                1
                                T1102

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\freebl3.dll
                                  MD5

                                  ef2834ac4ee7d6724f255beaf527e635

                                  SHA1

                                  5be8c1e73a21b49f353c2ecfa4108e43a883cb7b

                                  SHA256

                                  a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba

                                  SHA512

                                  c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2

                                • C:\ProgramData\mozglue.dll
                                  MD5

                                  8f73c08a9660691143661bf7332c3c27

                                  SHA1

                                  37fa65dd737c50fda710fdbde89e51374d0c204a

                                  SHA256

                                  3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                                  SHA512

                                  0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                                • C:\ProgramData\mozglue.dll
                                  MD5

                                  8f73c08a9660691143661bf7332c3c27

                                  SHA1

                                  37fa65dd737c50fda710fdbde89e51374d0c204a

                                  SHA256

                                  3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                                  SHA512

                                  0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                                • C:\ProgramData\msvcp140.dll
                                  MD5

                                  109f0f02fd37c84bfc7508d4227d7ed5

                                  SHA1

                                  ef7420141bb15ac334d3964082361a460bfdb975

                                  SHA256

                                  334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                  SHA512

                                  46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                • C:\ProgramData\nss3.dll
                                  MD5

                                  bfac4e3c5908856ba17d41edcd455a51

                                  SHA1

                                  8eec7e888767aa9e4cca8ff246eb2aacb9170428

                                  SHA256

                                  e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                                  SHA512

                                  2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                                • C:\ProgramData\nss3.dll
                                  MD5

                                  bfac4e3c5908856ba17d41edcd455a51

                                  SHA1

                                  8eec7e888767aa9e4cca8ff246eb2aacb9170428

                                  SHA256

                                  e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                                  SHA512

                                  2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                                • C:\ProgramData\softokn3.dll
                                  MD5

                                  a2ee53de9167bf0d6c019303b7ca84e5

                                  SHA1

                                  2a3c737fa1157e8483815e98b666408a18c0db42

                                  SHA256

                                  43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

                                  SHA512

                                  45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

                                • C:\ProgramData\vcruntime140.dll
                                  MD5

                                  7587bf9cb4147022cd5681b015183046

                                  SHA1

                                  f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                  SHA256

                                  c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                  SHA512

                                  0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
                                  MD5

                                  54e9306f95f32e50ccd58af19753d929

                                  SHA1

                                  eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

                                  SHA256

                                  45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

                                  SHA512

                                  8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
                                  MD5

                                  9cea3df509498437800c653f38c04bc4

                                  SHA1

                                  c3314a2a6f76d27a6003a4e83b488b4ddf5b8ebc

                                  SHA256

                                  7fdf67bf9471af9177a274437f080326f8c30026d60dbe61fe32c78ff605a9d9

                                  SHA512

                                  4ceacdc74184035a3db2c35713f747d4a3201c20a9f6738cc0158569b95f4f0560fed001a622e1eba3105fb6ccb78d9b2cf4343c65efa13fa611469b3c23e65a

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico
                                  MD5

                                  e5e3377341056643b0494b6842c0b544

                                  SHA1

                                  d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                  SHA256

                                  e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                  SHA512

                                  83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                  MD5

                                  d0527733abcc5c58735e11d43061b431

                                  SHA1

                                  28de9d191826192721e325787b8a50a84328cffd

                                  SHA256

                                  b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45

                                  SHA512

                                  7704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5

                                • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                  MD5

                                  d0527733abcc5c58735e11d43061b431

                                  SHA1

                                  28de9d191826192721e325787b8a50a84328cffd

                                  SHA256

                                  b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45

                                  SHA512

                                  7704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5

                                • C:\Users\Admin\AppData\Local\Temp\filename.exe
                                  MD5

                                  dcd2ba66af42fff364af946261bc1874

                                  SHA1

                                  5e02cde7427a5f97978dddd56f3a689c4698f5ef

                                  SHA256

                                  6475ee3b24246e1edeacf96e2de0e245a302424c21957f0cf20480060c92161f

                                  SHA512

                                  88ddd382ef54ecf18166e2cd9b7feb0b646f0a855b2949195dd2d1cc2b10ef31a7ec9bd55ca57d74d548314664eae4922645644eddf6733f2aaf30fa2e47d32f

                                • C:\Users\Admin\AppData\Local\Temp\filename.exe
                                  MD5

                                  dcd2ba66af42fff364af946261bc1874

                                  SHA1

                                  5e02cde7427a5f97978dddd56f3a689c4698f5ef

                                  SHA256

                                  6475ee3b24246e1edeacf96e2de0e245a302424c21957f0cf20480060c92161f

                                  SHA512

                                  88ddd382ef54ecf18166e2cd9b7feb0b646f0a855b2949195dd2d1cc2b10ef31a7ec9bd55ca57d74d548314664eae4922645644eddf6733f2aaf30fa2e47d32f

                                • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                  MD5

                                  1260763403cd6c8c8f71f3f29acc4744

                                  SHA1

                                  33bd943683ffe7ce5ca4f6018f1071b8a6fa0adf

                                  SHA256

                                  59c8f656bc1871e425a8610af17dc1e9794f0345876f04254d4b87855533fe19

                                  SHA512

                                  4fb6b69d1da1958d0d3cee299099dc2048790bbf1eea1958bb75d5896362472261b227eca1e2084b449cb0d2bd152fbf337ed4fb4cb9ad6816670159b534ca79

                                • C:\Users\Admin\AppData\Local\Temp\sqlite.dat
                                  MD5

                                  083fb9f36e88adb0d79abd762a0c769f

                                  SHA1

                                  2fcb1b8d4b2657b2bce7df4cfbbd8922e81231d2

                                  SHA256

                                  8174282f688d468273e3bb953a258a26eb2d4b22d57a91bed3414cca89d1d622

                                  SHA512

                                  4169c710d2910dee1a2311ee3e9d477fcb0ec836e40699418042f57de939bdc9ce9a9b34916fc7918b76d7d3dbace711ebac22a946fce2ea975bb2668adf4e5e

                                • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                                  MD5

                                  e7232d152ca0bf8e9e69cfbe11b231f6

                                  SHA1

                                  9c00ea3d8b2ccfb24b9fbd1772944ea26b5bb0f5

                                  SHA256

                                  dd19804b5823cf2cab3afe4a386b427d9016e2673e82e0f030e4cff74ef73ce1

                                  SHA512

                                  3d87325fbea81b4559d435725e58670222d12478bdbc10dd97033c6f3e06314de89b7b5fa27881a9020a0395fa861c5e992f61f99b3271c4ac7e8616bd0d3bbf

                                • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                                  MD5

                                  e7232d152ca0bf8e9e69cfbe11b231f6

                                  SHA1

                                  9c00ea3d8b2ccfb24b9fbd1772944ea26b5bb0f5

                                  SHA256

                                  dd19804b5823cf2cab3afe4a386b427d9016e2673e82e0f030e4cff74ef73ce1

                                  SHA512

                                  3d87325fbea81b4559d435725e58670222d12478bdbc10dd97033c6f3e06314de89b7b5fa27881a9020a0395fa861c5e992f61f99b3271c4ac7e8616bd0d3bbf

                                • C:\Users\Admin\AppData\Local\Temp\svcli.exe
                                  MD5

                                  2757c321b1f2bb338bbafa112123cced

                                  SHA1

                                  f76eefaab781a477419c00fcbfbb81ffc607c54a

                                  SHA256

                                  0d97fe7534555fceb0cbe20ce1d5bac4f2ee375c8c687791a2f2be655f4901ee

                                  SHA512

                                  fc943624596a4f7326fdd4470e551d2ff662648e209cfbe194245eba66d0ccd526310976dd44bf37526f084ffb2cac045ca52e310deb1006b2f8bcf129c1b756

                                • C:\Users\Admin\AppData\Local\Temp\svcli.exe
                                  MD5

                                  2757c321b1f2bb338bbafa112123cced

                                  SHA1

                                  f76eefaab781a477419c00fcbfbb81ffc607c54a

                                  SHA256

                                  0d97fe7534555fceb0cbe20ce1d5bac4f2ee375c8c687791a2f2be655f4901ee

                                  SHA512

                                  fc943624596a4f7326fdd4470e551d2ff662648e209cfbe194245eba66d0ccd526310976dd44bf37526f084ffb2cac045ca52e310deb1006b2f8bcf129c1b756

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk
                                  MD5

                                  35539f45a10af237c986e5190eef53c3

                                  SHA1

                                  0abcc76e45f767be3fbd70e66bdd54a70f144ecc

                                  SHA256

                                  b43b19d9861fc1a2f21d144d83fa09a48ef2374d2270e7a88c400e6aa7734613

                                  SHA512

                                  f8d833cc46eb78f65fb9ec1eef0feead2d5191f9c07d951f919fc38e8d06f2dfaaabc29b265885b21b47b007d699c7c225e41ff8306762492997187c76cb146d

                                • C:\Users\Admin\Desktop\Microsoft Edge.lnk
                                  MD5

                                  f3ef8d113acc47855188d5c41d2d8ecc

                                  SHA1

                                  98cb88f3efa9ffd451b3bda95415dcff42d25978

                                  SHA256

                                  b8abb2c597fa49c820f0e0c44b3bf0f0785b8e8c7887c2e30ab7a40f9ffc5be9

                                  SHA512

                                  ffc44fe5282a2e1a74951daf44b975e4cabf9c31f8b7c4291df17b91911db17c7c9d7dc31a1318ae616712f2aa5260715f8051c192a41db09f9e824f038af118

                                • C:\Users\Admin\Pictures\Adobe Films\Aaaqc0ni0gGTSXCoNAuV03Py.exe
                                  MD5

                                  8b725a3c67dbf1f354026fec40d0fbde

                                  SHA1

                                  e20d579532c00bdcba15bd22eb97a2111dcb96a7

                                  SHA256

                                  ec2076005a0fe5c9b2c3032cc3d8cdff11cb19e6eb50558db9b0d16397c78cac

                                  SHA512

                                  425807767c101b0905580bb97103db0a884b6fefafb7a2230ca6d2b8566bdd6ea5c2e5d5b0ff9ac5159e4d3c6ae6f00ade689b2c6d8b52f2f12f3d3e3628c26b

                                • C:\Users\Admin\Pictures\Adobe Films\Aaaqc0ni0gGTSXCoNAuV03Py.exe
                                  MD5

                                  8b725a3c67dbf1f354026fec40d0fbde

                                  SHA1

                                  e20d579532c00bdcba15bd22eb97a2111dcb96a7

                                  SHA256

                                  ec2076005a0fe5c9b2c3032cc3d8cdff11cb19e6eb50558db9b0d16397c78cac

                                  SHA512

                                  425807767c101b0905580bb97103db0a884b6fefafb7a2230ca6d2b8566bdd6ea5c2e5d5b0ff9ac5159e4d3c6ae6f00ade689b2c6d8b52f2f12f3d3e3628c26b

                                • C:\Users\Admin\Pictures\Adobe Films\EXNBcuiLvy_JCRs_X1pzHIWQ.exe
                                  MD5

                                  652ce60f8d1ea7ac21dac40073af2321

                                  SHA1

                                  2c602e0d76c208df0f9a305e3d6502bccb8ff073

                                  SHA256

                                  bda915d15e254f51eea3f691857db7e6e35443f4f29c5ee258e4d03127f180be

                                  SHA512

                                  dced8f2cfa741840edb018b36a638cd229588a9af985dbf7bac38b8f7f8682ae721db0639fac163594ccfcfc7da37de4ff79d25b6d100b1f01d7e39f4e2b1cc2

                                • C:\Users\Admin\Pictures\Adobe Films\EXNBcuiLvy_JCRs_X1pzHIWQ.exe
                                  MD5

                                  652ce60f8d1ea7ac21dac40073af2321

                                  SHA1

                                  2c602e0d76c208df0f9a305e3d6502bccb8ff073

                                  SHA256

                                  bda915d15e254f51eea3f691857db7e6e35443f4f29c5ee258e4d03127f180be

                                  SHA512

                                  dced8f2cfa741840edb018b36a638cd229588a9af985dbf7bac38b8f7f8682ae721db0639fac163594ccfcfc7da37de4ff79d25b6d100b1f01d7e39f4e2b1cc2

                                • C:\Users\Admin\Pictures\Adobe Films\MPe_y0rzNhCheY4NN3KQoUh7.exe
                                  MD5

                                  c3e8d8e92d0e1405551ca61da666c341

                                  SHA1

                                  2b85c3110218eacbe2e0e4e2df97fce9b889d60d

                                  SHA256

                                  3135af1074f5ba1a982cd6679e5af8bb6bf9303441bd0947cb0fd6bf2a287fad

                                  SHA512

                                  3b1b08764e8eb3bdc5962d3df7b22098aa22abc2018b5c7b151f3134395d50af44ad5fb2698d13900bdeff3b6cae41d41e376f611514019e9279c09c3819b529

                                • C:\Users\Admin\Pictures\Adobe Films\MPe_y0rzNhCheY4NN3KQoUh7.exe
                                  MD5

                                  c3e8d8e92d0e1405551ca61da666c341

                                  SHA1

                                  2b85c3110218eacbe2e0e4e2df97fce9b889d60d

                                  SHA256

                                  3135af1074f5ba1a982cd6679e5af8bb6bf9303441bd0947cb0fd6bf2a287fad

                                  SHA512

                                  3b1b08764e8eb3bdc5962d3df7b22098aa22abc2018b5c7b151f3134395d50af44ad5fb2698d13900bdeff3b6cae41d41e376f611514019e9279c09c3819b529

                                • C:\Users\Admin\Pictures\Adobe Films\US164A3myC8WPIfGGxXtFHWe.exe
                                  MD5

                                  41d29411405f85824e659b853a31d760

                                  SHA1

                                  646f75ef91d12dba7b2124ab471124bd2a2b416c

                                  SHA256

                                  8ac81ab27f6af4701c622eb74942ab971b92f12722d639e77281b676467a15ff

                                  SHA512

                                  5e883744635e254005cf37d235b8ed0f23d2a474f322d101dddef0fd81a35406e38463b47eb914bd36874d50ba3baa053ee4a5d3e3426ae9596d96d7e6caaa71

                                • C:\Users\Admin\Pictures\Adobe Films\US164A3myC8WPIfGGxXtFHWe.exe
                                  MD5

                                  41d29411405f85824e659b853a31d760

                                  SHA1

                                  646f75ef91d12dba7b2124ab471124bd2a2b416c

                                  SHA256

                                  8ac81ab27f6af4701c622eb74942ab971b92f12722d639e77281b676467a15ff

                                  SHA512

                                  5e883744635e254005cf37d235b8ed0f23d2a474f322d101dddef0fd81a35406e38463b47eb914bd36874d50ba3baa053ee4a5d3e3426ae9596d96d7e6caaa71

                                • C:\Users\Admin\Pictures\Adobe Films\UutwfczMHDgpbGQxEisZgY85.exe
                                  MD5

                                  3f22bd82ee1b38f439e6354c60126d6d

                                  SHA1

                                  63b57d818f86ea64ebc8566faeb0c977839defde

                                  SHA256

                                  265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a

                                  SHA512

                                  b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f

                                • C:\Users\Admin\Pictures\Adobe Films\UutwfczMHDgpbGQxEisZgY85.exe
                                  MD5

                                  3f22bd82ee1b38f439e6354c60126d6d

                                  SHA1

                                  63b57d818f86ea64ebc8566faeb0c977839defde

                                  SHA256

                                  265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a

                                  SHA512

                                  b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f

                                • C:\Users\Admin\Pictures\Adobe Films\cmkaxKnjs2gDkWIYgfdtVZvg.exe
                                  MD5

                                  3d48ff69e6aaae722d3e480327233957

                                  SHA1

                                  934f8719e8792c42f60f5f29b601e04d24726c46

                                  SHA256

                                  de9af5205213fffb0393ecad448aaac2208b3eb073fc44cdf3a3b39c7d0ba02d

                                  SHA512

                                  93ad5db3189f8a978e2448fa97d07ef4c27818e05b7d5848ae5f9e4138459df7c90ce309cccf26322e42ca7e9b6e5ffba9da3af07ac7e6db874dfe2a25591c7f

                                • C:\Users\Admin\Pictures\Adobe Films\cmkaxKnjs2gDkWIYgfdtVZvg.exe
                                  MD5

                                  3d48ff69e6aaae722d3e480327233957

                                  SHA1

                                  934f8719e8792c42f60f5f29b601e04d24726c46

                                  SHA256

                                  de9af5205213fffb0393ecad448aaac2208b3eb073fc44cdf3a3b39c7d0ba02d

                                  SHA512

                                  93ad5db3189f8a978e2448fa97d07ef4c27818e05b7d5848ae5f9e4138459df7c90ce309cccf26322e42ca7e9b6e5ffba9da3af07ac7e6db874dfe2a25591c7f

                                • C:\Users\Admin\Pictures\Adobe Films\gl2lG_VTtD5rBdKPjAUTSCz6.exe
                                  MD5

                                  8baaac1b6264da2c92c918d743b43dc4

                                  SHA1

                                  a080c1877cb5721e69d3a82b7a28e7239a7e5b76

                                  SHA256

                                  0803f8027ddc1e02304d70688b3aeea1468ea41b2f9f694ded681a3d7ad2ddfe

                                  SHA512

                                  fe210fd341143ca14e674b61a5eb814aaf70ff2b15b2199510fac4420b0f478ccda6cdd74e7b556e111bfa651fedb4b2219a7298a9c97c53ee53b44d1ae11ca7

                                • C:\Users\Admin\Pictures\Adobe Films\gl2lG_VTtD5rBdKPjAUTSCz6.exe
                                  MD5

                                  8baaac1b6264da2c92c918d743b43dc4

                                  SHA1

                                  a080c1877cb5721e69d3a82b7a28e7239a7e5b76

                                  SHA256

                                  0803f8027ddc1e02304d70688b3aeea1468ea41b2f9f694ded681a3d7ad2ddfe

                                  SHA512

                                  fe210fd341143ca14e674b61a5eb814aaf70ff2b15b2199510fac4420b0f478ccda6cdd74e7b556e111bfa651fedb4b2219a7298a9c97c53ee53b44d1ae11ca7

                                • C:\Users\Admin\Pictures\Adobe Films\hqfpP7ITbWduR0kCPoWGgFiF.exe
                                  MD5

                                  72d98b05026a027034dc35e903e74dde

                                  SHA1

                                  c296fd68b24cf895d17842229708e0427db191cb

                                  SHA256

                                  885fd328a133970b118faee66daa76e7fa41eda30a8f0ce1f58182a2b07c5317

                                  SHA512

                                  d5b96520285339ffa970a9ba6e75e457155544dcfdbd4a06d4bf5b6bca8e483ca2575de782a46da5f99b147be66bb350afb3af16f87c12b257a9df0d8dc0f11e

                                • C:\Users\Admin\Pictures\Adobe Films\hqfpP7ITbWduR0kCPoWGgFiF.exe
                                  MD5

                                  72d98b05026a027034dc35e903e74dde

                                  SHA1

                                  c296fd68b24cf895d17842229708e0427db191cb

                                  SHA256

                                  885fd328a133970b118faee66daa76e7fa41eda30a8f0ce1f58182a2b07c5317

                                  SHA512

                                  d5b96520285339ffa970a9ba6e75e457155544dcfdbd4a06d4bf5b6bca8e483ca2575de782a46da5f99b147be66bb350afb3af16f87c12b257a9df0d8dc0f11e

                                • C:\Users\Admin\Pictures\Adobe Films\htnGJ_FVPOsj7P1fTWa9NlaH.exe
                                  MD5

                                  93a208a5cb686fae36a6335d11661537

                                  SHA1

                                  c927a4f02e43ebff754e79444663d3100811bece

                                  SHA256

                                  4ec68abe1a6f60d468bbfda435a0c582c9895c324a12a56ed34514a208d8a882

                                  SHA512

                                  5f20e496a760905f9768b3ee3218eebacfdec9aa44e7bb94d1b9f82e1fd3e7184e1afcc0d6117d25e277e5cf7e664eff2b005455fc0af530ead1fdafbcd82858

                                • C:\Users\Admin\Pictures\Adobe Films\htnGJ_FVPOsj7P1fTWa9NlaH.exe
                                  MD5

                                  93a208a5cb686fae36a6335d11661537

                                  SHA1

                                  c927a4f02e43ebff754e79444663d3100811bece

                                  SHA256

                                  4ec68abe1a6f60d468bbfda435a0c582c9895c324a12a56ed34514a208d8a882

                                  SHA512

                                  5f20e496a760905f9768b3ee3218eebacfdec9aa44e7bb94d1b9f82e1fd3e7184e1afcc0d6117d25e277e5cf7e664eff2b005455fc0af530ead1fdafbcd82858

                                • C:\Users\Admin\Pictures\Adobe Films\lia4XUPpIYjObfwMd5z95N_J.exe
                                  MD5

                                  6eeaf421aa9d4768a768ecc8627d661f

                                  SHA1

                                  be3a225c182cec3015dccc96c6017a97c4e82cee

                                  SHA256

                                  dce92404d16bb8d9450234dd20ac8c3a7b8a4d3eff019144efbaee25cd2bd202

                                  SHA512

                                  797868baf5cbad03ded67c8ca1d7abebf54700feb8bd2b4a6775b27f0fd0316789254eabcd9204bb375d570b990e887cf8192f49455a6c7f9f90343483b11d44

                                • C:\Users\Admin\Pictures\Adobe Films\lia4XUPpIYjObfwMd5z95N_J.exe
                                  MD5

                                  6eeaf421aa9d4768a768ecc8627d661f

                                  SHA1

                                  be3a225c182cec3015dccc96c6017a97c4e82cee

                                  SHA256

                                  dce92404d16bb8d9450234dd20ac8c3a7b8a4d3eff019144efbaee25cd2bd202

                                  SHA512

                                  797868baf5cbad03ded67c8ca1d7abebf54700feb8bd2b4a6775b27f0fd0316789254eabcd9204bb375d570b990e887cf8192f49455a6c7f9f90343483b11d44

                                • C:\Users\Admin\Pictures\Adobe Films\oiY4fhwAHdS9UYmdAXebByCe.exe
                                  MD5

                                  9b52b4a1f08c019354cc3b192430be21

                                  SHA1

                                  c6955505b389a1fadcf60776ea9f1c62b84d5dce

                                  SHA256

                                  b5b2af53c52363e1dc041225a5432fb665f94ba674b1199b739d82890618d510

                                  SHA512

                                  a8f9d8de9819d163e16a887d8e2d9b7adf0dacd2a2e7f1ad1e0bf111a6005ba15f241dff422839e79d2d82316e4159d2de34ff49c8ef65da82f22b6fe3ba3eda

                                • C:\Users\Admin\Pictures\Adobe Films\oiY4fhwAHdS9UYmdAXebByCe.exe
                                  MD5

                                  9b52b4a1f08c019354cc3b192430be21

                                  SHA1

                                  c6955505b389a1fadcf60776ea9f1c62b84d5dce

                                  SHA256

                                  b5b2af53c52363e1dc041225a5432fb665f94ba674b1199b739d82890618d510

                                  SHA512

                                  a8f9d8de9819d163e16a887d8e2d9b7adf0dacd2a2e7f1ad1e0bf111a6005ba15f241dff422839e79d2d82316e4159d2de34ff49c8ef65da82f22b6fe3ba3eda

                                • C:\Users\Admin\Pictures\Adobe Films\oiY4fhwAHdS9UYmdAXebByCe.exe
                                  MD5

                                  9b52b4a1f08c019354cc3b192430be21

                                  SHA1

                                  c6955505b389a1fadcf60776ea9f1c62b84d5dce

                                  SHA256

                                  b5b2af53c52363e1dc041225a5432fb665f94ba674b1199b739d82890618d510

                                  SHA512

                                  a8f9d8de9819d163e16a887d8e2d9b7adf0dacd2a2e7f1ad1e0bf111a6005ba15f241dff422839e79d2d82316e4159d2de34ff49c8ef65da82f22b6fe3ba3eda

                                • C:\Users\Admin\Pictures\Adobe Films\yNVbB1if52dc3M04MimzUBst.exe
                                  MD5

                                  2e1ed9a6411f5457e15eb9962d9badc3

                                  SHA1

                                  bf803cfd24fe8e890e2bf420a9e27567b878f000

                                  SHA256

                                  97ead2057976cc989c024fa9ad761549fa57e53b16ca38aeecf3aa70da77c0ea

                                  SHA512

                                  b9d3be71b33b9eea68dd7274e7cb587fa5d59c073f134db147a7d74c357d8f5037a75cfa086c838129ec88a3961061f1e8d95ba00d63ceca5db79674df8cf917

                                • C:\Users\Admin\Pictures\Adobe Films\yNVbB1if52dc3M04MimzUBst.exe
                                  MD5

                                  2e1ed9a6411f5457e15eb9962d9badc3

                                  SHA1

                                  bf803cfd24fe8e890e2bf420a9e27567b878f000

                                  SHA256

                                  97ead2057976cc989c024fa9ad761549fa57e53b16ca38aeecf3aa70da77c0ea

                                  SHA512

                                  b9d3be71b33b9eea68dd7274e7cb587fa5d59c073f134db147a7d74c357d8f5037a75cfa086c838129ec88a3961061f1e8d95ba00d63ceca5db79674df8cf917

                                • C:\Users\Admin\Pictures\Adobe Films\yNVbB1if52dc3M04MimzUBst.exe
                                  MD5

                                  2e1ed9a6411f5457e15eb9962d9badc3

                                  SHA1

                                  bf803cfd24fe8e890e2bf420a9e27567b878f000

                                  SHA256

                                  97ead2057976cc989c024fa9ad761549fa57e53b16ca38aeecf3aa70da77c0ea

                                  SHA512

                                  b9d3be71b33b9eea68dd7274e7cb587fa5d59c073f134db147a7d74c357d8f5037a75cfa086c838129ec88a3961061f1e8d95ba00d63ceca5db79674df8cf917

                                • \??\pipe\LOCAL\crashpad_3384_DVRKVVTYEXUDIFRW
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/448-130-0x0000000003D20000-0x0000000003ED7000-memory.dmp
                                  Filesize

                                  1.7MB

                                • memory/840-986-0x00007FFF5F800000-0x00007FFF5F801000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/1840-163-0x00000000024F0000-0x0000000002550000-memory.dmp
                                  Filesize

                                  384KB

                                • memory/2116-203-0x0000000004C02000-0x0000000004C03000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2116-227-0x0000000000600000-0x0000000000639000-memory.dmp
                                  Filesize

                                  228KB

                                • memory/2116-230-0x0000000000400000-0x000000000046D000-memory.dmp
                                  Filesize

                                  436KB

                                • memory/2116-201-0x0000000004C00000-0x0000000004C01000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2116-221-0x0000000004C03000-0x0000000004C04000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2116-213-0x0000000004A10000-0x0000000004C06000-memory.dmp
                                  Filesize

                                  2.0MB

                                • memory/2116-197-0x00000000004F0000-0x000000000051B000-memory.dmp
                                  Filesize

                                  172KB

                                • memory/2120-646-0x0000000005B60000-0x0000000005BF2000-memory.dmp
                                  Filesize

                                  584KB

                                • memory/2120-224-0x0000000000400000-0x000000000046F000-memory.dmp
                                  Filesize

                                  444KB

                                • memory/2120-219-0x0000000000660000-0x0000000000699000-memory.dmp
                                  Filesize

                                  228KB

                                • memory/2120-217-0x00000000001C0000-0x00000000001EB000-memory.dmp
                                  Filesize

                                  172KB

                                • memory/2176-189-0x0000000004B10000-0x0000000004B22000-memory.dmp
                                  Filesize

                                  72KB

                                • memory/2176-719-0x00000000069F0000-0x0000000006F1C000-memory.dmp
                                  Filesize

                                  5.2MB

                                • memory/2176-160-0x0000000000400000-0x000000000046D000-memory.dmp
                                  Filesize

                                  436KB

                                • memory/2176-718-0x0000000006820000-0x00000000069E2000-memory.dmp
                                  Filesize

                                  1.8MB

                                • memory/2176-171-0x0000000004B90000-0x0000000004B91000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2176-611-0x0000000005B60000-0x0000000005BD6000-memory.dmp
                                  Filesize

                                  472KB

                                • memory/2176-173-0x0000000004B92000-0x0000000004B93000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2176-180-0x0000000000590000-0x00000000005BB000-memory.dmp
                                  Filesize

                                  172KB

                                • memory/2176-183-0x0000000000610000-0x0000000000649000-memory.dmp
                                  Filesize

                                  228KB

                                • memory/2176-199-0x0000000004AC0000-0x0000000004B96000-memory.dmp
                                  Filesize

                                  856KB

                                • memory/2176-176-0x0000000004B93000-0x0000000004B94000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2176-177-0x0000000004BA0000-0x0000000005144000-memory.dmp
                                  Filesize

                                  5.6MB

                                • memory/2420-225-0x0000000000D10000-0x0000000000D26000-memory.dmp
                                  Filesize

                                  88KB

                                • memory/2668-751-0x00000000057A0000-0x00000000057AA000-memory.dmp
                                  Filesize

                                  40KB

                                • memory/2668-752-0x0000000005310000-0x0000000005311000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/2668-743-0x0000000000990000-0x000000000099A000-memory.dmp
                                  Filesize

                                  40KB

                                • memory/2872-194-0x0000000000400000-0x0000000000409000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/2872-156-0x0000000000400000-0x0000000000409000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/3012-164-0x0000000000260000-0x00000000002E0000-memory.dmp
                                  Filesize

                                  512KB

                                • memory/3012-161-0x0000000000260000-0x00000000002E0000-memory.dmp
                                  Filesize

                                  512KB

                                • memory/3012-184-0x0000000072A70000-0x0000000072AF9000-memory.dmp
                                  Filesize

                                  548KB

                                • memory/3012-188-0x0000000005710000-0x0000000005D28000-memory.dmp
                                  Filesize

                                  6.1MB

                                • memory/3012-191-0x00000000051E0000-0x000000000521C000-memory.dmp
                                  Filesize

                                  240KB

                                • memory/3012-207-0x0000000002DF0000-0x0000000002E20000-memory.dmp
                                  Filesize

                                  192KB

                                • memory/3012-206-0x000000006EA70000-0x000000006EABC000-memory.dmp
                                  Filesize

                                  304KB

                                • memory/3012-610-0x0000000005520000-0x0000000005586000-memory.dmp
                                  Filesize

                                  408KB

                                • memory/3012-169-0x0000000075980000-0x0000000075B95000-memory.dmp
                                  Filesize

                                  2.1MB

                                • memory/3012-178-0x0000000000260000-0x00000000002E0000-memory.dmp
                                  Filesize

                                  512KB

                                • memory/3012-192-0x0000000075DD0000-0x0000000076383000-memory.dmp
                                  Filesize

                                  5.7MB

                                • memory/3012-166-0x00000000007B0000-0x00000000007F1000-memory.dmp
                                  Filesize

                                  260KB

                                • memory/3012-174-0x0000000000260000-0x00000000002E0000-memory.dmp
                                  Filesize

                                  512KB

                                • memory/3012-168-0x0000000000B00000-0x0000000000B45000-memory.dmp
                                  Filesize

                                  276KB

                                • memory/3184-159-0x00000000008A0000-0x00000000008A9000-memory.dmp
                                  Filesize

                                  36KB

                                • memory/3184-157-0x0000000000890000-0x0000000000898000-memory.dmp
                                  Filesize

                                  32KB

                                • memory/3364-215-0x0000000000400000-0x00000000005D5000-memory.dmp
                                  Filesize

                                  1.8MB

                                • memory/3364-211-0x0000000000860000-0x0000000000936000-memory.dmp
                                  Filesize

                                  856KB

                                • memory/3364-185-0x00000000006B0000-0x0000000000740000-memory.dmp
                                  Filesize

                                  576KB

                                • memory/3600-770-0x0000000000890000-0x0000000000898000-memory.dmp
                                  Filesize

                                  32KB

                                • memory/3600-789-0x0000000005290000-0x0000000005291000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/3944-175-0x0000000000730000-0x0000000000851000-memory.dmp
                                  Filesize

                                  1.1MB

                                • memory/3944-193-0x0000000075DD0000-0x0000000076383000-memory.dmp
                                  Filesize

                                  5.7MB

                                • memory/3944-190-0x0000000005530000-0x000000000563A000-memory.dmp
                                  Filesize

                                  1.0MB

                                • memory/3944-162-0x0000000000730000-0x0000000000851000-memory.dmp
                                  Filesize

                                  1.1MB

                                • memory/3944-205-0x000000006EA70000-0x000000006EABC000-memory.dmp
                                  Filesize

                                  304KB

                                • memory/3944-165-0x0000000002980000-0x00000000029C5000-memory.dmp
                                  Filesize

                                  276KB

                                • memory/3944-711-0x0000000006E50000-0x0000000006EA0000-memory.dmp
                                  Filesize

                                  320KB

                                • memory/3944-652-0x00000000059D0000-0x00000000059EE000-memory.dmp
                                  Filesize

                                  120KB

                                • memory/3944-167-0x0000000002850000-0x0000000002851000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/3944-209-0x0000000005410000-0x0000000005411000-memory.dmp
                                  Filesize

                                  4KB

                                • memory/3944-170-0x0000000075980000-0x0000000075B95000-memory.dmp
                                  Filesize

                                  2.1MB

                                • memory/3944-179-0x0000000072A70000-0x0000000072AF9000-memory.dmp
                                  Filesize

                                  548KB

                                • memory/3944-172-0x0000000000730000-0x0000000000851000-memory.dmp
                                  Filesize

                                  1.1MB