Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2022 19:56
Static task
static1
Behavioral task
behavioral1
Sample
2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe
Resource
win10-20220812-en
General
-
Target
2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe
-
Size
175KB
-
MD5
f0fc06ff15183775f7cca320c8eb7a2c
-
SHA1
529d1fbe6e83bde126446fb33e192adde928151d
-
SHA256
2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5
-
SHA512
c24c501972358d311e090d88d94c44cabe16233768439887e8e52dab88222c31e836a92ab1e0324b6f73a61c963404891469001808681ee592bde9e63d97517a
-
SSDEEP
3072:7MV1U6vNBzz5OYIO86cfCzLsbfa3spaLIBHj6h9N5x:iQd6cfCzYbdpuO8
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @mr_golds)
77.73.134.27:7161
-
auth_value
4b2de03af6b6ac513ac597c2e6c1ad51
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/100552-176-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/100552-181-0x000000000042217E-mapping.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
setup1.exesetup1.exesetup1.exesetup1.exesetup1.exeMoUSO.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MoUSO.exe -
Downloads MZ/PE file
-
Executes dropped EXE 18 IoCs
Processes:
FADF.exe725.exeAEF.exe2780.exe2F42.exesetup.exesetup.exesetup1.exesetup.exesetup1.exesetup.exesetup1.exesetup.exesetup1.exesetup.exesetup1.exesetup.exeMoUSO.exepid process 5016 FADF.exe 100588 725.exe 100692 AEF.exe 101184 2780.exe 101212 2F42.exe 6808 setup.exe 1632 setup.exe 7304 setup1.exe 7780 setup.exe 8036 setup1.exe 8640 setup.exe 8756 setup1.exe 9336 setup.exe 9452 setup1.exe 10036 setup.exe 10184 setup1.exe 10776 setup.exe 10896 MoUSO.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\2780.exe upx C:\Users\Admin\AppData\Local\Temp\2780.exe upx behavioral1/memory/101184-303-0x0000000000D40000-0x0000000001FE8000-memory.dmp upx behavioral1/memory/101184-805-0x0000000000D40000-0x0000000001FE8000-memory.dmp upx behavioral1/memory/101184-1175-0x0000000000D40000-0x0000000001FE8000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup1.exesetup1.exesetup1.exesetup1.exeMoUSO.exesetup1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MoUSO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MoUSO.exe -
Deletes itself 1 IoCs
Processes:
pid process 2328 -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
setup1.exesetup1.exeMoUSO.exesetup1.exesetup1.exesetup1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Wine setup1.exe Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Wine setup1.exe Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Wine MoUSO.exe Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Wine setup1.exe Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Wine setup1.exe Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Wine setup1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
setup1.exesetup1.exesetup1.exesetup1.exesetup1.exeMoUSO.exepid process 7304 setup1.exe 8036 setup1.exe 8756 setup1.exe 9452 setup1.exe 10184 setup1.exe 10896 MoUSO.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
FADF.exesetup.exesetup.exesetup.exesetup.exesetup.exesetup.exesetup.exedescription pid process target process PID 5016 set thread context of 100552 5016 FADF.exe AppLaunch.exe PID 6808 set thread context of 7040 6808 setup.exe RegSvcs.exe PID 1632 set thread context of 7220 1632 setup.exe RegSvcs.exe PID 7780 set thread context of 7832 7780 setup.exe RegSvcs.exe PID 8640 set thread context of 8692 8640 setup.exe RegSvcs.exe PID 9336 set thread context of 9388 9336 setup.exe RegSvcs.exe PID 10036 set thread context of 10088 10036 setup.exe RegSvcs.exe PID 10776 set thread context of 10828 10776 setup.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 7880 schtasks.exe 8512 schtasks.exe 9212 schtasks.exe 9908 schtasks.exe 10648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exepid process 2704 2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe 2704 2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2328 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exepid process 2704 2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 2328 -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
2F42.exeAppLaunch.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeDebugPrivilege 101212 2F42.exe Token: SeDebugPrivilege 100552 AppLaunch.exe Token: SeDebugPrivilege 6736 powershell.exe Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 Token: SeShutdownPrivilege 2328 Token: SeCreatePagefilePrivilege 2328 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
FADF.exe2780.exeAppLaunch.exesetup.exedescription pid process target process PID 2328 wrote to memory of 5016 2328 FADF.exe PID 2328 wrote to memory of 5016 2328 FADF.exe PID 2328 wrote to memory of 5016 2328 FADF.exe PID 5016 wrote to memory of 100552 5016 FADF.exe AppLaunch.exe PID 5016 wrote to memory of 100552 5016 FADF.exe AppLaunch.exe PID 5016 wrote to memory of 100552 5016 FADF.exe AppLaunch.exe PID 5016 wrote to memory of 100552 5016 FADF.exe AppLaunch.exe PID 5016 wrote to memory of 100552 5016 FADF.exe AppLaunch.exe PID 2328 wrote to memory of 100588 2328 725.exe PID 2328 wrote to memory of 100588 2328 725.exe PID 2328 wrote to memory of 100588 2328 725.exe PID 2328 wrote to memory of 100692 2328 AEF.exe PID 2328 wrote to memory of 100692 2328 AEF.exe PID 2328 wrote to memory of 100692 2328 AEF.exe PID 2328 wrote to memory of 101184 2328 2780.exe PID 2328 wrote to memory of 101184 2328 2780.exe PID 2328 wrote to memory of 101212 2328 2F42.exe PID 2328 wrote to memory of 101212 2328 2F42.exe PID 2328 wrote to memory of 101212 2328 2F42.exe PID 2328 wrote to memory of 1300 2328 explorer.exe PID 2328 wrote to memory of 1300 2328 explorer.exe PID 2328 wrote to memory of 1300 2328 explorer.exe PID 2328 wrote to memory of 1300 2328 explorer.exe PID 2328 wrote to memory of 3352 2328 explorer.exe PID 2328 wrote to memory of 3352 2328 explorer.exe PID 2328 wrote to memory of 3352 2328 explorer.exe PID 2328 wrote to memory of 2856 2328 explorer.exe PID 2328 wrote to memory of 2856 2328 explorer.exe PID 2328 wrote to memory of 2856 2328 explorer.exe PID 2328 wrote to memory of 2856 2328 explorer.exe PID 2328 wrote to memory of 4916 2328 explorer.exe PID 2328 wrote to memory of 4916 2328 explorer.exe PID 2328 wrote to memory of 4916 2328 explorer.exe PID 2328 wrote to memory of 1264 2328 explorer.exe PID 2328 wrote to memory of 1264 2328 explorer.exe PID 2328 wrote to memory of 1264 2328 explorer.exe PID 2328 wrote to memory of 1264 2328 explorer.exe PID 2328 wrote to memory of 2192 2328 explorer.exe PID 2328 wrote to memory of 2192 2328 explorer.exe PID 2328 wrote to memory of 2192 2328 explorer.exe PID 2328 wrote to memory of 2192 2328 explorer.exe PID 2328 wrote to memory of 2592 2328 explorer.exe PID 2328 wrote to memory of 2592 2328 explorer.exe PID 2328 wrote to memory of 2592 2328 explorer.exe PID 2328 wrote to memory of 2592 2328 explorer.exe PID 2328 wrote to memory of 2704 2328 explorer.exe PID 2328 wrote to memory of 2704 2328 explorer.exe PID 2328 wrote to memory of 2704 2328 explorer.exe PID 2328 wrote to memory of 5244 2328 explorer.exe PID 2328 wrote to memory of 5244 2328 explorer.exe PID 2328 wrote to memory of 5244 2328 explorer.exe PID 2328 wrote to memory of 5244 2328 explorer.exe PID 101184 wrote to memory of 6736 101184 2780.exe powershell.exe PID 101184 wrote to memory of 6736 101184 2780.exe powershell.exe PID 100552 wrote to memory of 6808 100552 AppLaunch.exe setup.exe PID 100552 wrote to memory of 6808 100552 AppLaunch.exe setup.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe PID 6808 wrote to memory of 7040 6808 setup.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe"C:\Users\Admin\AppData\Local\Temp\2799f011a46101e166a985dc8e134d658149e2ced40a1e53f276b82d1a72f9a5.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\FADF.exeC:\Users\Admin\AppData\Local\Temp\FADF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe6⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe8⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe10⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe12⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe14⤵
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe16⤵
-
C:\Users\Admin\AppData\Local\Temp\setup1.exe"C:\Users\Admin\AppData\Local\Temp\setup1.exe"13⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"14⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\setup1.exe"C:\Users\Admin\AppData\Local\Temp\setup1.exe"11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"12⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\setup1.exe"C:\Users\Admin\AppData\Local\Temp\setup1.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"10⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\setup1.exe"C:\Users\Admin\AppData\Local\Temp\setup1.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"8⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\setup1.exe"C:\Users\Admin\AppData\Local\Temp\setup1.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\725.exeC:\Users\Admin\AppData\Local\Temp\725.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\AEF.exeC:\Users\Admin\AppData\Local\Temp\AEF.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2780.exeC:\Users\Admin\AppData\Local\Temp\2780.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\2F42.exeC:\Users\Admin\AppData\Local\Temp\2F42.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2BC2D09D2C3B9097A22A2E8DDF9B7F10Filesize
503B
MD574a55f87dbdf64ee25df9759b010c372
SHA1263ae5ef20bbc3812ba5051c1f5c9972363655d7
SHA256f92f87cbe32070212650ef4505aceecb1eafbe735fd819bdbee73f99a40a1971
SHA512ca33f2d799e09d53992929e93399c2ca191452346489d57f24d1ab54d004bf840504a94f2e6bf4b7cde4e5f9cefe64e1a1fb50ae5d46231135bf54b911ea49f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
1KB
MD5a0a7011c3b2a4ef793e6bfc0dc5630e7
SHA1f79074dbfa29a927dd73f97e0079b30561bf8c13
SHA256c0f826225be1c05145fcf5092cfccd993ee41d5e259909bb844bac52c2fbb7dd
SHA5124abc165ab0229632b83472c7088ddea38a376c0710fa54b32aed9b033d629a787e1ab7c0ce9016507698c147b954cbad2858130eec7eef28e763ce641ba98ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_B0B75E4FA8953592512F0FA436A73A4EFilesize
279B
MD5ae7fcf0b7eba80a97b18f2e3d85dc542
SHA16fb9536be9bd67bd1f9e708ce3fc027d031aca40
SHA256cd2541e642abe192c65de4caf81d2e782300341c55528decd2ba1fa2d9a369db
SHA512cc7bb0a1570e387f44687ed53f65a7bee00b920c3d9a632961ae6781bea6da97fbc3002723c5df3f0315c2f3be56e0e83811ff4166df1cb793c01d9720f54f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD57fabbba1f6153f4c620a690b8a79174f
SHA11458f7f98a07ae589dce01100c1d17ac25b43500
SHA256ab8d3ca3eb8b1c85054e641390b619314aa280d4108a0f0bc18f7fd7d8c3a653
SHA51265e9b41b3971e027715b8bce68ce88074d423f66fd248c09edb1fefd7e2c486aff5d9302cb3f638bb7e0cd4b0ed3311e9d29aae0918823261bd143ab62dad01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2BC2D09D2C3B9097A22A2E8DDF9B7F10Filesize
548B
MD5e531f18d95b50754b899180ed0df90f7
SHA17e9fbcfa8bcfefcf4705f1bf5dec5f113f5044a9
SHA256adbd5ef465cc84df354710d5bad6263be84e8e196b4d32ea4989bccbddf9d3b8
SHA51265dfbcb6a068f5bdb5480d2d32109e23d1ebd668b6f3727237996484807122fd34382d5dad5c55e6af75d5549d13960df79187fe594974261808f85048cf277a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
408B
MD5324e4976af3d3de21407f7d9bce0241e
SHA18c74ba6c15be117fc1de643abfaebc91ba4046f2
SHA256d4df911f31ee2f7ac7a6746124cc03c2caf12be2b31cc44c2bbb48545c934888
SHA512e088b0b8b71a76a37c7c9217d70ce8f23fb3cc07ec03540e2e1aa70a5b9319657eae45e26503e4632c525959e6212a0e6f675a809feb23ef033de7051511f461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_B0B75E4FA8953592512F0FA436A73A4EFilesize
396B
MD5d361511697f398ad72f8fc895099d19a
SHA191e05b171914e9bd12f90de0e9414336ef2a6716
SHA2563925fd6abca8cc1edf50c5e3e6f1588959f0cbae1d8702d69ee1e13a81763ec2
SHA5127b046321df35ba254aa2dab6b1a05e2d670d1871ae7a514016461da0f3f6421d5802de98462728047f84eb39c131017ed290caaab12aa549dd14c2f3ba947b12
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1GC1WEZG\configure[1].phpFilesize
1B
MD526b17225b626fb9238849fd60eabdf60
SHA1a979ef10cc6f6a36df6b8a323307ee3bb2e2db9c
SHA256a318c24216defe206feeb73ef5be00033fa9c4a74d0b967f6532a26ca5906d3b
SHA512603e4eaa411769b6d83a13bf2fde63289322343f8c683ff61d832201e1cf4d3e432a1d9819e327fe14da61ab65ee70dee39d4a3f88a71530bde2cae73d36710b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1GC1WEZG\configure[1].phpFilesize
5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1GC1WEZG\configure[1].phpFilesize
1B
MD526b17225b626fb9238849fd60eabdf60
SHA1a979ef10cc6f6a36df6b8a323307ee3bb2e2db9c
SHA256a318c24216defe206feeb73ef5be00033fa9c4a74d0b967f6532a26ca5906d3b
SHA512603e4eaa411769b6d83a13bf2fde63289322343f8c683ff61d832201e1cf4d3e432a1d9819e327fe14da61ab65ee70dee39d4a3f88a71530bde2cae73d36710b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5KFN9HPU\configure[1].phpFilesize
5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5KFN9HPU\configure[1].phpFilesize
1B
MD526b17225b626fb9238849fd60eabdf60
SHA1a979ef10cc6f6a36df6b8a323307ee3bb2e2db9c
SHA256a318c24216defe206feeb73ef5be00033fa9c4a74d0b967f6532a26ca5906d3b
SHA512603e4eaa411769b6d83a13bf2fde63289322343f8c683ff61d832201e1cf4d3e432a1d9819e327fe14da61ab65ee70dee39d4a3f88a71530bde2cae73d36710b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5KFN9HPU\configure[1].phpFilesize
5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YWVOBXSF\configure[1].phpFilesize
5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YWVOBXSF\configure[1].phpFilesize
1B
MD526b17225b626fb9238849fd60eabdf60
SHA1a979ef10cc6f6a36df6b8a323307ee3bb2e2db9c
SHA256a318c24216defe206feeb73ef5be00033fa9c4a74d0b967f6532a26ca5906d3b
SHA512603e4eaa411769b6d83a13bf2fde63289322343f8c683ff61d832201e1cf4d3e432a1d9819e327fe14da61ab65ee70dee39d4a3f88a71530bde2cae73d36710b
-
C:\Users\Admin\AppData\Local\Temp\2780.exeFilesize
5.1MB
MD545d640b4d71a4417dc0e1281a1e4b3ba
SHA11f83180cd8f86acf65689d554c0f03c171834a67
SHA25678caaf3d7860d0fb05f04100968deea28e0ede31aa48456987f657bb20af908b
SHA5123b31796ff8a6a444657fa19e965cbc455cd707f7ebded1dea1ecab51a1b24472c263da832d8de40904729572e4d18cb7abe5355eb43c4d5115a6c73473e617c5
-
C:\Users\Admin\AppData\Local\Temp\2780.exeFilesize
5.1MB
MD545d640b4d71a4417dc0e1281a1e4b3ba
SHA11f83180cd8f86acf65689d554c0f03c171834a67
SHA25678caaf3d7860d0fb05f04100968deea28e0ede31aa48456987f657bb20af908b
SHA5123b31796ff8a6a444657fa19e965cbc455cd707f7ebded1dea1ecab51a1b24472c263da832d8de40904729572e4d18cb7abe5355eb43c4d5115a6c73473e617c5
-
C:\Users\Admin\AppData\Local\Temp\2F42.exeFilesize
495KB
MD5af8881c2d64c8388e2f11c301bbe7f95
SHA1605163d12672e385ed797d2fced6291bff93198a
SHA256b8779766207a8d95a61e66235379705446b34f7c66eab6a4d763321f4597eece
SHA512901e863732287cfbeb2625d6a5733deb70d78cbf92104fb453a3a24c5e3ee37aeb99d2154eac52b2f35680d69782056057054c4cbdbaae945fd2c2677b92b835
-
C:\Users\Admin\AppData\Local\Temp\2F42.exeFilesize
495KB
MD5af8881c2d64c8388e2f11c301bbe7f95
SHA1605163d12672e385ed797d2fced6291bff93198a
SHA256b8779766207a8d95a61e66235379705446b34f7c66eab6a4d763321f4597eece
SHA512901e863732287cfbeb2625d6a5733deb70d78cbf92104fb453a3a24c5e3ee37aeb99d2154eac52b2f35680d69782056057054c4cbdbaae945fd2c2677b92b835
-
C:\Users\Admin\AppData\Local\Temp\725.exeFilesize
317KB
MD549095a94bbd575988d6878d8bc31a409
SHA1f84457a55a5d67073b827da08a9b868021e17ff6
SHA25607c7e4b67df083d4e0c655fa6641ac382de3ef6cc6eca02a16de60130ec262a1
SHA5127830cf1c34659e699a0508669f712214fa07df7808b6e30d0cf2cc766fc85764907b44c10903d6ef07d1625ce67e55fde4889141b466840fcd110ef34e292f29
-
C:\Users\Admin\AppData\Local\Temp\725.exeFilesize
317KB
MD549095a94bbd575988d6878d8bc31a409
SHA1f84457a55a5d67073b827da08a9b868021e17ff6
SHA25607c7e4b67df083d4e0c655fa6641ac382de3ef6cc6eca02a16de60130ec262a1
SHA5127830cf1c34659e699a0508669f712214fa07df7808b6e30d0cf2cc766fc85764907b44c10903d6ef07d1625ce67e55fde4889141b466840fcd110ef34e292f29
-
C:\Users\Admin\AppData\Local\Temp\AEF.exeFilesize
364KB
MD544c7a01a752ae8d0c1f7380c3f6d8f5a
SHA13782472ec862735fb79e4fdc809142e22e905d36
SHA256fd3338be6aa05e44e93bb1ed931afb6721df35377d94a56c137d3e7d25cf6e5e
SHA5126cb3ac6303251f5e145678d9f1b176ebc5f3aa877fda4004166500f3ac8b1093c3d584f04d134b5bb02f507631038cb8395726f804da7747ebb9af30c4553b4d
-
C:\Users\Admin\AppData\Local\Temp\AEF.exeFilesize
364KB
MD544c7a01a752ae8d0c1f7380c3f6d8f5a
SHA13782472ec862735fb79e4fdc809142e22e905d36
SHA256fd3338be6aa05e44e93bb1ed931afb6721df35377d94a56c137d3e7d25cf6e5e
SHA5126cb3ac6303251f5e145678d9f1b176ebc5f3aa877fda4004166500f3ac8b1093c3d584f04d134b5bb02f507631038cb8395726f804da7747ebb9af30c4553b4d
-
C:\Users\Admin\AppData\Local\Temp\FADF.exeFilesize
2.6MB
MD5818c085c2526f08bc2b3a7959744428e
SHA17ff5628e30f7dfe3918470634b5d94f0d93a4aff
SHA256a9f77c59dc2078baccd91603caf2a0330324dbb6f005102d1d0616dd236fe872
SHA512ef768ba8f9df82c5a41b432963f9f0a93ff588179c10eb34baf03c3fb9c0ab4e073570beb334fd03781f073f45c6f33d3c0859e4ec8e4d21f096f86154ec5f1c
-
C:\Users\Admin\AppData\Local\Temp\FADF.exeFilesize
2.6MB
MD5818c085c2526f08bc2b3a7959744428e
SHA17ff5628e30f7dfe3918470634b5d94f0d93a4aff
SHA256a9f77c59dc2078baccd91603caf2a0330324dbb6f005102d1d0616dd236fe872
SHA512ef768ba8f9df82c5a41b432963f9f0a93ff588179c10eb34baf03c3fb9c0ab4e073570beb334fd03781f073f45c6f33d3c0859e4ec8e4d21f096f86154ec5f1c
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
345KB
MD558d95faa5d76221e6d241dbcc5a50db9
SHA1d268271eb2f16cc4ada2948b6952ccde926fa94a
SHA2561ed19ad26e2f46770568a3fa1e08eba161c7e9b50900179271c2962aa67aa0c4
SHA5121b07c493dc7a6e8bbbf76fb3cac10f5100518799d86ff66063a88e210c69f0f23422274d6c5516eb4ca8028ca159870d41801e3c5b3b70950e752d5e3d1d3903
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
C:\Users\Admin\AppData\Local\Temp\setup1.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeFilesize
1.3MB
MD53afac3d5b79c3dd40e77cc6c244129e0
SHA160ca75e5db4275e4a0b9a0d4fc4a9191d1cf55e2
SHA256035a478e8b2e17832fe01a3442629cb0402dc18242123eabce48f17ef2700bca
SHA512e6e4b00719eae37c6fece904e692daa35780ae7291ed3f7d4b1c9a307e5d9a8daee7749128f1f584f498b4ecfc79fd19c4b7b36d3ca808f88f0c4f18bfbe534f
-
memory/1264-1177-0x0000000002F80000-0x0000000002FA2000-memory.dmpFilesize
136KB
-
memory/1264-745-0x0000000002F50000-0x0000000002F77000-memory.dmpFilesize
156KB
-
memory/1264-743-0x0000000002F80000-0x0000000002FA2000-memory.dmpFilesize
136KB
-
memory/1264-564-0x0000000000000000-mapping.dmp
-
memory/1300-1143-0x0000000000590000-0x0000000000597000-memory.dmpFilesize
28KB
-
memory/1300-576-0x0000000000580000-0x000000000058B000-memory.dmpFilesize
44KB
-
memory/1300-572-0x0000000000590000-0x0000000000597000-memory.dmpFilesize
28KB
-
memory/1300-363-0x0000000000000000-mapping.dmp
-
memory/1632-1181-0x0000000000000000-mapping.dmp
-
memory/2192-620-0x0000000000000000-mapping.dmp
-
memory/2192-754-0x0000000003290000-0x0000000003295000-memory.dmpFilesize
20KB
-
memory/2192-807-0x0000000003280000-0x0000000003289000-memory.dmpFilesize
36KB
-
memory/2192-1176-0x0000000003290000-0x0000000003295000-memory.dmpFilesize
20KB
-
memory/2592-671-0x0000000000000000-mapping.dmp
-
memory/2592-810-0x0000000002F70000-0x0000000002F76000-memory.dmpFilesize
24KB
-
memory/2592-812-0x0000000002F60000-0x0000000002F6B000-memory.dmpFilesize
44KB
-
memory/2592-1179-0x0000000002F70000-0x0000000002F76000-memory.dmpFilesize
24KB
-
memory/2704-146-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-141-0x0000000000680000-0x00000000007CA000-memory.dmpFilesize
1.3MB
-
memory/2704-154-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-153-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-152-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-124-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-123-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-122-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-151-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-121-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-150-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-125-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-149-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-148-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-147-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-126-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-1178-0x0000000000800000-0x0000000000807000-memory.dmpFilesize
28KB
-
memory/2704-133-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-127-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-135-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-145-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-120-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-132-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-143-0x0000000000400000-0x0000000000586000-memory.dmpFilesize
1.5MB
-
memory/2704-138-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-131-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-144-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-128-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-142-0x0000000000680000-0x00000000007CA000-memory.dmpFilesize
1.3MB
-
memory/2704-129-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-130-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-156-0x0000000000400000-0x0000000000586000-memory.dmpFilesize
1.5MB
-
memory/2704-751-0x00000000005F0000-0x00000000005FD000-memory.dmpFilesize
52KB
-
memory/2704-137-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-748-0x0000000000800000-0x0000000000807000-memory.dmpFilesize
28KB
-
memory/2704-140-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-139-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-155-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-725-0x0000000000000000-mapping.dmp
-
memory/2704-119-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2704-136-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/2856-445-0x0000000000000000-mapping.dmp
-
memory/2856-638-0x0000000002F50000-0x0000000002F59000-memory.dmpFilesize
36KB
-
memory/2856-635-0x0000000002F60000-0x0000000002F65000-memory.dmpFilesize
20KB
-
memory/2856-1173-0x0000000002F60000-0x0000000002F65000-memory.dmpFilesize
20KB
-
memory/3352-441-0x00000000007F0000-0x00000000007F9000-memory.dmpFilesize
36KB
-
memory/3352-443-0x00000000007E0000-0x00000000007EF000-memory.dmpFilesize
60KB
-
memory/3352-401-0x0000000000000000-mapping.dmp
-
memory/3352-1106-0x00000000007F0000-0x00000000007F9000-memory.dmpFilesize
36KB
-
memory/4916-566-0x0000000000E30000-0x0000000000E36000-memory.dmpFilesize
24KB
-
memory/4916-568-0x0000000000E20000-0x0000000000E2C000-memory.dmpFilesize
48KB
-
memory/4916-507-0x0000000000000000-mapping.dmp
-
memory/4916-1142-0x0000000000E30000-0x0000000000E36000-memory.dmpFilesize
24KB
-
memory/5016-162-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-168-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-161-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-173-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-163-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-164-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-174-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-165-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-167-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-157-0x0000000000000000-mapping.dmp
-
memory/5016-169-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-160-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-175-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-170-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-171-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-159-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5016-172-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/5244-849-0x0000000002F00000-0x0000000002F08000-memory.dmpFilesize
32KB
-
memory/5244-1180-0x0000000002F00000-0x0000000002F08000-memory.dmpFilesize
32KB
-
memory/5244-850-0x0000000002EF0000-0x0000000002EFB000-memory.dmpFilesize
44KB
-
memory/5244-778-0x0000000000000000-mapping.dmp
-
memory/6736-1137-0x0000000000000000-mapping.dmp
-
memory/6736-1153-0x00000159FDFE0000-0x00000159FE002000-memory.dmpFilesize
136KB
-
memory/6736-1156-0x00000159FEB60000-0x00000159FEBD6000-memory.dmpFilesize
472KB
-
memory/6808-1147-0x0000000000000000-mapping.dmp
-
memory/7040-1195-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/7040-1174-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/7040-1169-0x0000000140003FEC-mapping.dmp
-
memory/7220-1301-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/7220-1184-0x0000000140003FEC-mapping.dmp
-
memory/7220-1187-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/7304-1259-0x0000000000880000-0x0000000000BF2000-memory.dmpFilesize
3.4MB
-
memory/7304-1221-0x0000000000880000-0x0000000000BF2000-memory.dmpFilesize
3.4MB
-
memory/7304-1192-0x0000000000000000-mapping.dmp
-
memory/7304-1280-0x0000000000880000-0x0000000000BF2000-memory.dmpFilesize
3.4MB
-
memory/7780-1268-0x0000000000000000-mapping.dmp
-
memory/7832-1272-0x0000000140003FEC-mapping.dmp
-
memory/7832-1286-0x0000000140000000-0x0000000140023000-memory.dmpFilesize
140KB
-
memory/7880-1277-0x0000000000000000-mapping.dmp
-
memory/8036-1298-0x0000000000000000-mapping.dmp
-
memory/8036-1324-0x0000000000880000-0x0000000000BF2000-memory.dmpFilesize
3.4MB
-
memory/8036-1368-0x0000000000880000-0x0000000000BF2000-memory.dmpFilesize
3.4MB
-
memory/8512-1377-0x0000000000000000-mapping.dmp
-
memory/8640-1397-0x0000000000000000-mapping.dmp
-
memory/8692-1400-0x0000000140003FEC-mapping.dmp
-
memory/8756-1404-0x0000000000000000-mapping.dmp
-
memory/9212-1478-0x0000000000000000-mapping.dmp
-
memory/9336-1498-0x0000000000000000-mapping.dmp
-
memory/9388-1501-0x0000000140003FEC-mapping.dmp
-
memory/9452-1505-0x0000000000000000-mapping.dmp
-
memory/9908-1579-0x0000000000000000-mapping.dmp
-
memory/10036-1599-0x0000000000000000-mapping.dmp
-
memory/10088-1602-0x0000000140003FEC-mapping.dmp
-
memory/10184-1606-0x0000000000000000-mapping.dmp
-
memory/10648-1679-0x0000000000000000-mapping.dmp
-
memory/10776-1699-0x0000000000000000-mapping.dmp
-
memory/10828-1702-0x0000000140003FEC-mapping.dmp
-
memory/100552-184-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100552-372-0x000000000AD40000-0x000000000B26C000-memory.dmpFilesize
5.2MB
-
memory/100552-181-0x000000000042217E-mapping.dmp
-
memory/100552-852-0x000000000AA10000-0x000000000AA60000-memory.dmpFilesize
320KB
-
memory/100552-288-0x0000000008F20000-0x0000000008F32000-memory.dmpFilesize
72KB
-
memory/100552-313-0x0000000009F70000-0x000000000A46E000-memory.dmpFilesize
5.0MB
-
memory/100552-286-0x0000000008FD0000-0x00000000090DA000-memory.dmpFilesize
1.0MB
-
memory/100552-292-0x00000000090E0000-0x000000000912B000-memory.dmpFilesize
300KB
-
memory/100552-285-0x0000000009460000-0x0000000009A66000-memory.dmpFilesize
6.0MB
-
memory/100552-182-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100552-851-0x000000000A990000-0x000000000AA06000-memory.dmpFilesize
472KB
-
memory/100552-307-0x00000000092B0000-0x0000000009342000-memory.dmpFilesize
584KB
-
memory/100552-368-0x000000000A640000-0x000000000A802000-memory.dmpFilesize
1.8MB
-
memory/100552-176-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/100552-194-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100552-290-0x0000000008F80000-0x0000000008FBE000-memory.dmpFilesize
248KB
-
memory/100552-190-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100552-188-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100552-321-0x00000000093C0000-0x0000000009426000-memory.dmpFilesize
408KB
-
memory/100552-191-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100588-189-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100588-186-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100588-187-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100588-183-0x0000000000000000-mapping.dmp
-
memory/100588-192-0x0000000077840000-0x00000000779CE000-memory.dmpFilesize
1.6MB
-
memory/100692-200-0x0000000000000000-mapping.dmp
-
memory/101184-1175-0x0000000000D40000-0x0000000001FE8000-memory.dmpFilesize
18.7MB
-
memory/101184-303-0x0000000000D40000-0x0000000001FE8000-memory.dmpFilesize
18.7MB
-
memory/101184-300-0x0000000000000000-mapping.dmp
-
memory/101184-805-0x0000000000D40000-0x0000000001FE8000-memory.dmpFilesize
18.7MB
-
memory/101212-369-0x0000000005050000-0x00000000050FE000-memory.dmpFilesize
696KB
-
memory/101212-775-0x0000000005AC0000-0x0000000005B14000-memory.dmpFilesize
336KB
-
memory/101212-304-0x0000000000000000-mapping.dmp
-
memory/101212-379-0x0000000005100000-0x0000000005156000-memory.dmpFilesize
344KB
-
memory/101212-354-0x0000000000860000-0x00000000008E2000-memory.dmpFilesize
520KB
-
memory/101212-414-0x00000000051F0000-0x0000000005244000-memory.dmpFilesize
336KB
-
memory/101212-421-0x0000000005240000-0x000000000528C000-memory.dmpFilesize
304KB