Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 19:10

General

  • Target

    3f254afebac05901cbf13abf469b87a7dad28873c7f4ed65921d153fade92892.exe

  • Size

    597KB

  • MD5

    b7cd1c29f4a7f8bbc1b146fee208219f

  • SHA1

    4416ab99b383fbf28516c0476285391f033c305b

  • SHA256

    3f254afebac05901cbf13abf469b87a7dad28873c7f4ed65921d153fade92892

  • SHA512

    02800f466f4a4baaecbac85a7e3a154cd102ee3b872b3f511a703a9c41f83cc1ddac90764a15053e90c29c25663758158fd64cebe9e8c1bb462331f041a65014

  • SSDEEP

    12288:Jat0EAH49n8Bu0s4q8xGc55FnU1zRu14+2J1WJeJ+zHn1cS5eS7lU2HzFqz7UEh:4t24r4qU5M1zx/WJSOn1c3OXzFqkEh

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Detected potential entity reuse from brand microsoft.
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f254afebac05901cbf13abf469b87a7dad28873c7f4ed65921d153fade92892.exe
    "C:\Users\Admin\AppData\Local\Temp\3f254afebac05901cbf13abf469b87a7dad28873c7f4ed65921d153fade92892.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4332
    • C:\Users\Admin\rAx89Jl\jordan.exe
      "C:\Users\Admin\rAx89Jl\jordan.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Users\Admin\rAx89Jl\jordan.exe
        "C:\Users\Admin\rAx89Jl\jordan.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4316
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=jordan.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0xe0,0xd4,0xd8,0x104,0x7ffa03a146f8,0x7ffa03a14708,0x7ffa03a14718
            5⤵
              PID:620
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6395002810356575437,3698525619668735684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
              5⤵
                PID:2164
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6395002810356575437,3698525619668735684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4712
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=jordan.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
              4⤵
              • Adds Run key to start application
              • Enumerates system info in registry
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:3036
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa03a146f8,0x7ffa03a14708,0x7ffa03a14718
                5⤵
                  PID:4016
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                  5⤵
                    PID:3644
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4296
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:8
                    5⤵
                      PID:4740
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:1
                      5⤵
                        PID:1696
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:1
                        5⤵
                          PID:1896
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:1
                          5⤵
                            PID:1836
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5224 /prefetch:8
                            5⤵
                              PID:4976
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5784 /prefetch:8
                              5⤵
                                PID:4220
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:1
                                5⤵
                                  PID:2424
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                                  5⤵
                                    PID:1272
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:1
                                    5⤵
                                      PID:2712
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:1
                                      5⤵
                                        PID:5084
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3860 /prefetch:8
                                        5⤵
                                          PID:2812
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                          5⤵
                                          • Drops file in Program Files directory
                                          PID:3708
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7fe125460,0x7ff7fe125470,0x7ff7fe125480
                                            6⤵
                                              PID:3904
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,494680809411945791,10409998992828742623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3860 /prefetch:8
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4932
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4192

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
                                      Filesize

                                      471B

                                      MD5

                                      8212d70c86ce431d59072c64f70a8279

                                      SHA1

                                      b221f0de1fb741bff50d0536566f1a9602757ee1

                                      SHA256

                                      b43ab742a745a5293b46de337819f22995835f52e29656ff8fb2eb5a1f569229

                                      SHA512

                                      08925c1502691ca0eebc03dcf82ba0efba59a3c480edbe7ace5632fcd2cb4d03895bb3babd41effa627b162bd3d88d51b8daeeadd657e49d39b4ebb202281d0e

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
                                      Filesize

                                      442B

                                      MD5

                                      a59370a85326a1152a18ecae77c10821

                                      SHA1

                                      97a959430def119152e442bd773cd7285ebed65d

                                      SHA256

                                      2588634e41296560eaaee3d84990ba6201e28f41bfe65b032b348d7d9bdb9fd4

                                      SHA512

                                      525ba5236f5a343a541d1dd53bd6b0c3488e59299aea604b538eacf36f914a3040d8fa0d80dae6ddf1f54bd863c8cc6af4dd1a441c4e3e2142d91db558bf8fe2

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                      Filesize

                                      152B

                                      MD5

                                      af05481b81fdeb6c34b41fa28542b8e1

                                      SHA1

                                      30982103d4ad165cda1b492f96da553b0d5a8663

                                      SHA256

                                      61fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2

                                      SHA512

                                      6671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                      Filesize

                                      152B

                                      MD5

                                      af05481b81fdeb6c34b41fa28542b8e1

                                      SHA1

                                      30982103d4ad165cda1b492f96da553b0d5a8663

                                      SHA256

                                      61fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2

                                      SHA512

                                      6671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                      Filesize

                                      152B

                                      MD5

                                      af05481b81fdeb6c34b41fa28542b8e1

                                      SHA1

                                      30982103d4ad165cda1b492f96da553b0d5a8663

                                      SHA256

                                      61fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2

                                      SHA512

                                      6671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                      Filesize

                                      152B

                                      MD5

                                      71b657795f1d63721f304fcf46915016

                                      SHA1

                                      d2cabf753a2b8888642a3a26878e7f47784153b2

                                      SHA256

                                      f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28

                                      SHA512

                                      dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                      Filesize

                                      152B

                                      MD5

                                      71b657795f1d63721f304fcf46915016

                                      SHA1

                                      d2cabf753a2b8888642a3a26878e7f47784153b2

                                      SHA256

                                      f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28

                                      SHA512

                                      dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                      Filesize

                                      152B

                                      MD5

                                      71b657795f1d63721f304fcf46915016

                                      SHA1

                                      d2cabf753a2b8888642a3a26878e7f47784153b2

                                      SHA256

                                      f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28

                                      SHA512

                                      dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                      Filesize

                                      2KB

                                      MD5

                                      b1b7990421a53c33989257f39d7ebd2e

                                      SHA1

                                      be827a1f00c04757d5c62bcd7692403aa7f13020

                                      SHA256

                                      b0c0b286e6ec61a1f71d7dc178ea86c847966963cea1bc5c4804a8e0cfd6cd51

                                      SHA512

                                      1cc007d612443479e060497fba3d20c2dce25ff0522d3c375831c8a55e8d3841668d6bacef462618ad4e40583ef4a458cb4dd194d7af4ce9f866613fc72c4154

                                    • C:\Users\Admin\rAx89Jl\jordan.exe
                                      Filesize

                                      828KB

                                      MD5

                                      afa681ce030fef9af07285c9f651d899

                                      SHA1

                                      3a1e638ff0afb1ff1d0a6a0a0c687489f022f178

                                      SHA256

                                      5f2e75ddc668a9eaba07b623af266df193bcb9e21fb511a3f54c017b2eb67504

                                      SHA512

                                      6653f011dafe602994d246556d9f0bf2f60919ae0c7072b9513ce8499ca0cb93e3874104f546716dce5213645db0f474deb158a237aeab3d6df78908f54a8406

                                    • C:\Users\Admin\rAx89Jl\jordan.exe
                                      Filesize

                                      828KB

                                      MD5

                                      afa681ce030fef9af07285c9f651d899

                                      SHA1

                                      3a1e638ff0afb1ff1d0a6a0a0c687489f022f178

                                      SHA256

                                      5f2e75ddc668a9eaba07b623af266df193bcb9e21fb511a3f54c017b2eb67504

                                      SHA512

                                      6653f011dafe602994d246556d9f0bf2f60919ae0c7072b9513ce8499ca0cb93e3874104f546716dce5213645db0f474deb158a237aeab3d6df78908f54a8406

                                    • C:\Users\Admin\rAx89Jl\jordan.exe
                                      Filesize

                                      828KB

                                      MD5

                                      afa681ce030fef9af07285c9f651d899

                                      SHA1

                                      3a1e638ff0afb1ff1d0a6a0a0c687489f022f178

                                      SHA256

                                      5f2e75ddc668a9eaba07b623af266df193bcb9e21fb511a3f54c017b2eb67504

                                      SHA512

                                      6653f011dafe602994d246556d9f0bf2f60919ae0c7072b9513ce8499ca0cb93e3874104f546716dce5213645db0f474deb158a237aeab3d6df78908f54a8406

                                    • \??\pipe\LOCAL\crashpad_3036_YDHAGKDJEWNZTENP
                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • \??\pipe\LOCAL\crashpad_4348_GLZTKNBBOWHUFZOF
                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • memory/620-139-0x0000000000000000-mapping.dmp
                                    • memory/1212-132-0x0000000000000000-mapping.dmp
                                    • memory/1272-174-0x0000000000000000-mapping.dmp
                                    • memory/1696-159-0x0000000000000000-mapping.dmp
                                    • memory/1836-165-0x0000000000000000-mapping.dmp
                                    • memory/1896-161-0x0000000000000000-mapping.dmp
                                    • memory/2164-149-0x0000000000000000-mapping.dmp
                                    • memory/2424-172-0x0000000000000000-mapping.dmp
                                    • memory/2712-176-0x0000000000000000-mapping.dmp
                                    • memory/3036-140-0x0000000000000000-mapping.dmp
                                    • memory/3644-151-0x0000000000000000-mapping.dmp
                                    • memory/3708-179-0x0000000000000000-mapping.dmp
                                    • memory/3904-180-0x0000000000000000-mapping.dmp
                                    • memory/4016-141-0x0000000000000000-mapping.dmp
                                    • memory/4220-170-0x0000000000000000-mapping.dmp
                                    • memory/4296-153-0x0000000000000000-mapping.dmp
                                    • memory/4316-136-0x0000000000400000-0x0000000000412000-memory.dmp
                                      Filesize

                                      72KB

                                    • memory/4316-135-0x0000000000000000-mapping.dmp
                                    • memory/4348-138-0x0000000000000000-mapping.dmp
                                    • memory/4712-152-0x0000000000000000-mapping.dmp
                                    • memory/4740-157-0x0000000000000000-mapping.dmp
                                    • memory/4932-181-0x0000000000000000-mapping.dmp
                                    • memory/4976-168-0x0000000000000000-mapping.dmp
                                    • memory/5084-178-0x0000000000000000-mapping.dmp