Analysis

  • max time kernel
    143s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2023 03:45

General

  • Target

    4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136.exe

  • Size

    273KB

  • MD5

    766683884bbe6a2c0e0ea7d76b6b13ea

  • SHA1

    793d7b457f36a560d7094e4d0fee7270cc0e6842

  • SHA256

    4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136

  • SHA512

    52bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a

  • SSDEEP

    6144:vlr2XLlX3MjWzpuXgs8edJwibHbCJfAg:vlr8RX3S+AXew7bHeY

Malware Config

Extracted

Family

amadey

Version

3.66

C2

193.233.20.2/Bn89hku/index.php

Extracted

Family

redline

Botnet

france

C2

193.233.20.5:4136

Attributes
  • auth_value

    827023aa27bcc1cc2382e4d111feec6f

Extracted

Family

redline

Botnet

new1

C2

176.113.115.16:4122

Attributes
  • auth_value

    ac44cbde6633acc9d67419c7278d5c70

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect rhadamanthys stealer shellcode 5 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 16 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 53 IoCs
  • Checks SCSI registry key(s) 3 TTPs 10 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136.exe
    "C:\Users\Admin\AppData\Local\Temp\4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 888
      2⤵
      • Program crash
      PID:4376
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 964
      2⤵
      • Program crash
      PID:5032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 1068
      2⤵
      • Program crash
      PID:948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 960
      2⤵
      • Program crash
      PID:1360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 900
      2⤵
      • Program crash
      PID:1548
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 976
      2⤵
      • Program crash
      PID:4620
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 964
      2⤵
      • Program crash
      PID:1732
    • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
      "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 520
        3⤵
        • Program crash
        PID:2860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 708
        3⤵
        • Program crash
        PID:3632
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 784
        3⤵
        • Program crash
        PID:240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 816
        3⤵
        • Program crash
        PID:564
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 952
        3⤵
        • Program crash
        PID:4756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 964
        3⤵
        • Program crash
        PID:4192
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 964
        3⤵
        • Program crash
        PID:1428
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 988
        3⤵
        • Program crash
        PID:4224
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:1112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 936
        3⤵
        • Program crash
        PID:1896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 600
        3⤵
        • Program crash
        PID:4036
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Windows\SysWOW64\cacls.exe
          CACLS "mnolyk.exe" /P "Admin:N"
          4⤵
            PID:1184
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            4⤵
              PID:3900
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "mnolyk.exe" /P "Admin:R" /E
              4⤵
                PID:2752
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:3516
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\4b9a106e76" /P "Admin:N"
                  4⤵
                    PID:4708
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\4b9a106e76" /P "Admin:R" /E
                    4⤵
                      PID:2324
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1160
                    3⤵
                    • Program crash
                    PID:4140
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 664
                    3⤵
                    • Program crash
                    PID:3092
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 644
                    3⤵
                    • Program crash
                    PID:4024
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1220
                    3⤵
                    • Program crash
                    PID:524
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1328
                    3⤵
                    • Program crash
                    PID:3228
                  • C:\Users\Admin\AppData\Local\Temp\1000001001\nika.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000001001\nika.exe"
                    3⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Executes dropped EXE
                    • Windows security modification
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2568
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1588
                    3⤵
                    • Program crash
                    PID:828
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1584
                    3⤵
                    • Program crash
                    PID:1624
                  • C:\Users\Admin\AppData\Local\Temp\1000002001\lava.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000002001\lava.exe"
                    3⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Executes dropped EXE
                    • Windows security modification
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3968
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1612
                    3⤵
                    • Program crash
                    PID:2524
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1636
                    3⤵
                    • Program crash
                    PID:2928
                  • C:\Users\Admin\AppData\Local\Temp\1000003051\franc.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000003051\franc.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2108
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1648
                    3⤵
                    • Program crash
                    PID:4940
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1608
                    3⤵
                    • Program crash
                    PID:2084
                  • C:\Users\Admin\AppData\Local\Temp\1000004051\nita1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000004051\nita1.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3704
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 1236
                      4⤵
                      • Program crash
                      PID:3896
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1660
                    3⤵
                    • Program crash
                    PID:2176
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1648
                    3⤵
                    • Program crash
                    PID:4816
                  • C:\Users\Admin\AppData\Local\Temp\1000005001\mixo.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000005001\mixo.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1496
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1660
                    3⤵
                    • Program crash
                    PID:448
                  • C:\Users\Admin\AppData\Local\Temp\1000006001\nika1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000006001\nika1.exe"
                    3⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Executes dropped EXE
                    • Windows security modification
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3260
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1628
                    3⤵
                    • Program crash
                    PID:1840
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1652
                    3⤵
                    • Program crash
                    PID:1048
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1464
                    3⤵
                    • Program crash
                    PID:5028
                  • C:\Users\Admin\AppData\Local\Temp\1000008051\nita.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000008051\nita.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:668
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 1232
                      4⤵
                      • Program crash
                      PID:2092
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1628
                    3⤵
                    • Program crash
                    PID:3632
                  • C:\Users\Admin\AppData\Local\Temp\1000008051\nita.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000008051\nita.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:224
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 1184
                      4⤵
                      • Program crash
                      PID:1412
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1736
                    3⤵
                    • Program crash
                    PID:724
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1652
                    3⤵
                    • Program crash
                    PID:1040
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1696
                    3⤵
                    • Program crash
                    PID:4868
                  • C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Checks SCSI registry key(s)
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1140
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1736
                    3⤵
                    • Program crash
                    PID:3172
                  • C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:3168
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1640
                    3⤵
                    • Program crash
                    PID:4900
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1612
                    3⤵
                    • Program crash
                    PID:1944
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1668
                    3⤵
                    • Program crash
                    PID:1864
                  • C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Checks SCSI registry key(s)
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3176
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1740
                    3⤵
                    • Program crash
                    PID:4628
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1696
                    3⤵
                    • Program crash
                    PID:3084
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 952
                    3⤵
                    • Program crash
                    PID:1340
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1720
                    3⤵
                    • Program crash
                    PID:3656
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 1416
                    3⤵
                    • Program crash
                    PID:2812
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 1256
                  2⤵
                  • Program crash
                  PID:4936
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2220 -ip 2220
                1⤵
                  PID:4264
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 2220 -ip 2220
                  1⤵
                    PID:5012
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2220 -ip 2220
                    1⤵
                      PID:4296
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2220 -ip 2220
                      1⤵
                        PID:5112
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2220 -ip 2220
                        1⤵
                          PID:4816
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2220 -ip 2220
                          1⤵
                            PID:4276
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2220 -ip 2220
                            1⤵
                              PID:2768
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2220 -ip 2220
                              1⤵
                                PID:4812
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3944 -ip 3944
                                1⤵
                                  PID:2876
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3944 -ip 3944
                                  1⤵
                                    PID:4092
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3944 -ip 3944
                                    1⤵
                                      PID:4928
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3944 -ip 3944
                                      1⤵
                                        PID:224
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3944 -ip 3944
                                        1⤵
                                          PID:4420
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3944 -ip 3944
                                          1⤵
                                            PID:964
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3944 -ip 3944
                                            1⤵
                                              PID:2132
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 3944 -ip 3944
                                              1⤵
                                                PID:4844
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3944 -ip 3944
                                                1⤵
                                                  PID:3868
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3944 -ip 3944
                                                  1⤵
                                                    PID:1224
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 3944 -ip 3944
                                                    1⤵
                                                      PID:2428
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 3944 -ip 3944
                                                      1⤵
                                                        PID:1356
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3944 -ip 3944
                                                        1⤵
                                                          PID:1440
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 3944 -ip 3944
                                                          1⤵
                                                            PID:1080
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 3944 -ip 3944
                                                            1⤵
                                                              PID:3940
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 3944 -ip 3944
                                                              1⤵
                                                                PID:4988
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 836 -p 3944 -ip 3944
                                                                1⤵
                                                                  PID:4392
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 844 -p 3944 -ip 3944
                                                                  1⤵
                                                                    PID:3524
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 852 -p 3944 -ip 3944
                                                                    1⤵
                                                                      PID:512
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 3944 -ip 3944
                                                                      1⤵
                                                                        PID:5024
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 872 -p 3944 -ip 3944
                                                                        1⤵
                                                                          PID:3568
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 3944 -ip 3944
                                                                          1⤵
                                                                            PID:1876
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 3944 -ip 3944
                                                                            1⤵
                                                                              PID:5104
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 3944 -ip 3944
                                                                              1⤵
                                                                                PID:2660
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 852 -p 3944 -ip 3944
                                                                                1⤵
                                                                                  PID:1656
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 872 -p 3944 -ip 3944
                                                                                  1⤵
                                                                                    PID:1236
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 3944 -ip 3944
                                                                                    1⤵
                                                                                      PID:4724
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 864 -p 3944 -ip 3944
                                                                                      1⤵
                                                                                        PID:3404
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 856 -p 3944 -ip 3944
                                                                                        1⤵
                                                                                          PID:320
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 3944 -ip 3944
                                                                                          1⤵
                                                                                            PID:964
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 3944 -ip 3944
                                                                                            1⤵
                                                                                              PID:5092
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 3944 -ip 3944
                                                                                              1⤵
                                                                                                PID:3548
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 872 -p 3944 -ip 3944
                                                                                                1⤵
                                                                                                  PID:4036
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 856 -p 3944 -ip 3944
                                                                                                  1⤵
                                                                                                    PID:3516
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 820 -p 3944 -ip 3944
                                                                                                    1⤵
                                                                                                      PID:4596
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 880 -p 3944 -ip 3944
                                                                                                      1⤵
                                                                                                        PID:2580
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 852 -p 3704 -ip 3704
                                                                                                        1⤵
                                                                                                          PID:2172
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 848 -p 668 -ip 668
                                                                                                          1⤵
                                                                                                            PID:4372
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 224 -ip 224
                                                                                                            1⤵
                                                                                                              PID:4996
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:948
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 316
                                                                                                                2⤵
                                                                                                                • Program crash
                                                                                                                PID:944
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 948 -ip 948
                                                                                                              1⤵
                                                                                                                PID:2032
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 828 -p 3944 -ip 3944
                                                                                                                1⤵
                                                                                                                  PID:2828
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 828 -p 3944 -ip 3944
                                                                                                                  1⤵
                                                                                                                    PID:1548
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                                    1⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:3672
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 312
                                                                                                                      2⤵
                                                                                                                      • Program crash
                                                                                                                      PID:1564
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 896 -p 3672 -ip 3672
                                                                                                                    1⤵
                                                                                                                      PID:2376
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 820 -p 3944 -ip 3944
                                                                                                                      1⤵
                                                                                                                        PID:1124
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 920 -p 3944 -ip 3944
                                                                                                                        1⤵
                                                                                                                          PID:4316

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Matrix ATT&CK v6

                                                                                                                        Execution

                                                                                                                        Scheduled Task

                                                                                                                        1
                                                                                                                        T1053

                                                                                                                        Persistence

                                                                                                                        Modify Existing Service

                                                                                                                        1
                                                                                                                        T1031

                                                                                                                        Registry Run Keys / Startup Folder

                                                                                                                        1
                                                                                                                        T1060

                                                                                                                        Scheduled Task

                                                                                                                        1
                                                                                                                        T1053

                                                                                                                        Privilege Escalation

                                                                                                                        Scheduled Task

                                                                                                                        1
                                                                                                                        T1053

                                                                                                                        Defense Evasion

                                                                                                                        Modify Registry

                                                                                                                        3
                                                                                                                        T1112

                                                                                                                        Disabling Security Tools

                                                                                                                        2
                                                                                                                        T1089

                                                                                                                        Credential Access

                                                                                                                        Credentials in Files

                                                                                                                        2
                                                                                                                        T1081

                                                                                                                        Discovery

                                                                                                                        Query Registry

                                                                                                                        3
                                                                                                                        T1012

                                                                                                                        System Information Discovery

                                                                                                                        3
                                                                                                                        T1082

                                                                                                                        Peripheral Device Discovery

                                                                                                                        1
                                                                                                                        T1120

                                                                                                                        Collection

                                                                                                                        Data from Local System

                                                                                                                        2
                                                                                                                        T1005

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nita.exe.log
                                                                                                                          Filesize

                                                                                                                          2KB

                                                                                                                          MD5

                                                                                                                          454585c01f02a638f91f17093d80f595

                                                                                                                          SHA1

                                                                                                                          222ae17940da3f48360ca391e2d0d23e762d207d

                                                                                                                          SHA256

                                                                                                                          cb76f24c65f25d5dda9b4c000a4f4223205b32a5ea0571aab5233192d7e4a47c

                                                                                                                          SHA512

                                                                                                                          f4cc62375b04dfc6abc6265a2cc7dc88883b57a508f882b46080fcae7b1a4339be145d7983dd297b4ef6d77065ec6ede86c9b64a7f39254c562cb204151cf4b2

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000001001\nika.exe
                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          7e93bacbbc33e6652e147e7fe07572a0

                                                                                                                          SHA1

                                                                                                                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                                                                                          SHA256

                                                                                                                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                                                                                          SHA512

                                                                                                                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000001001\nika.exe
                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          7e93bacbbc33e6652e147e7fe07572a0

                                                                                                                          SHA1

                                                                                                                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                                                                                          SHA256

                                                                                                                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                                                                                          SHA512

                                                                                                                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000002001\lava.exe
                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          7e93bacbbc33e6652e147e7fe07572a0

                                                                                                                          SHA1

                                                                                                                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                                                                                          SHA256

                                                                                                                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                                                                                          SHA512

                                                                                                                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000002001\lava.exe
                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          7e93bacbbc33e6652e147e7fe07572a0

                                                                                                                          SHA1

                                                                                                                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                                                                                          SHA256

                                                                                                                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                                                                                          SHA512

                                                                                                                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000003051\franc.exe
                                                                                                                          Filesize

                                                                                                                          175KB

                                                                                                                          MD5

                                                                                                                          6991818e08082c4c140db502d2aff79f

                                                                                                                          SHA1

                                                                                                                          020ee1da61473dcd090805343601c1ae3d265032

                                                                                                                          SHA256

                                                                                                                          aa0a99779ffa4aa30aa23c9dc9db17b250457c5902e7d06aa785be97d764c3d0

                                                                                                                          SHA512

                                                                                                                          3f02448363aabe7515f1225a3291fb1fa0185ca78a302d70dd611b7f73b1b317a486eef61c2a7489a0d4e43301fa20c5fa48cb62d26f3e20d87aaeceb8a82d3e

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000003051\franc.exe
                                                                                                                          Filesize

                                                                                                                          175KB

                                                                                                                          MD5

                                                                                                                          6991818e08082c4c140db502d2aff79f

                                                                                                                          SHA1

                                                                                                                          020ee1da61473dcd090805343601c1ae3d265032

                                                                                                                          SHA256

                                                                                                                          aa0a99779ffa4aa30aa23c9dc9db17b250457c5902e7d06aa785be97d764c3d0

                                                                                                                          SHA512

                                                                                                                          3f02448363aabe7515f1225a3291fb1fa0185ca78a302d70dd611b7f73b1b317a486eef61c2a7489a0d4e43301fa20c5fa48cb62d26f3e20d87aaeceb8a82d3e

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000004051\nita1.exe
                                                                                                                          Filesize

                                                                                                                          336KB

                                                                                                                          MD5

                                                                                                                          c4f045d7baafb0380485a1e028f1ec48

                                                                                                                          SHA1

                                                                                                                          a07fdb9c8462369f2f721f526e4e18f700029371

                                                                                                                          SHA256

                                                                                                                          7ef99cf6b2378214934b430a7b9513dfb3fc188fdf212477bf1dc906207663f5

                                                                                                                          SHA512

                                                                                                                          2fa9467726c8c11ed218c8d6d644f6377b0d9558e883c30c34dcf83081f532ee02aa720d695947add97499c1395f600e885150ce2d5f23821e2a09eb1b9fd8be

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000004051\nita1.exe
                                                                                                                          Filesize

                                                                                                                          336KB

                                                                                                                          MD5

                                                                                                                          c4f045d7baafb0380485a1e028f1ec48

                                                                                                                          SHA1

                                                                                                                          a07fdb9c8462369f2f721f526e4e18f700029371

                                                                                                                          SHA256

                                                                                                                          7ef99cf6b2378214934b430a7b9513dfb3fc188fdf212477bf1dc906207663f5

                                                                                                                          SHA512

                                                                                                                          2fa9467726c8c11ed218c8d6d644f6377b0d9558e883c30c34dcf83081f532ee02aa720d695947add97499c1395f600e885150ce2d5f23821e2a09eb1b9fd8be

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000005001\mixo.exe
                                                                                                                          Filesize

                                                                                                                          175KB

                                                                                                                          MD5

                                                                                                                          1f2c3b82599a2c08b71927d14161a891

                                                                                                                          SHA1

                                                                                                                          bb2cd9f22ff5f4125602eae38fe738df4efdfd08

                                                                                                                          SHA256

                                                                                                                          898f61de806302b411cb94d53aa9493a599038a8e1dd8ccc03801835e018cca1

                                                                                                                          SHA512

                                                                                                                          68a8b8e7b64babe0f73e92ca2ab3c933c23d1ac77c7b4de835ca42c24205b3202a4211c979bbba0a5e045f51a175307dd1caa7256cf02b47a5f0ea3456ee2106

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000005001\mixo.exe
                                                                                                                          Filesize

                                                                                                                          175KB

                                                                                                                          MD5

                                                                                                                          1f2c3b82599a2c08b71927d14161a891

                                                                                                                          SHA1

                                                                                                                          bb2cd9f22ff5f4125602eae38fe738df4efdfd08

                                                                                                                          SHA256

                                                                                                                          898f61de806302b411cb94d53aa9493a599038a8e1dd8ccc03801835e018cca1

                                                                                                                          SHA512

                                                                                                                          68a8b8e7b64babe0f73e92ca2ab3c933c23d1ac77c7b4de835ca42c24205b3202a4211c979bbba0a5e045f51a175307dd1caa7256cf02b47a5f0ea3456ee2106

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000006001\nika1.exe
                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          7e93bacbbc33e6652e147e7fe07572a0

                                                                                                                          SHA1

                                                                                                                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                                                                                          SHA256

                                                                                                                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                                                                                          SHA512

                                                                                                                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000006001\nika1.exe
                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          7e93bacbbc33e6652e147e7fe07572a0

                                                                                                                          SHA1

                                                                                                                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                                                                                          SHA256

                                                                                                                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                                                                                          SHA512

                                                                                                                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000008051\nita.exe
                                                                                                                          Filesize

                                                                                                                          336KB

                                                                                                                          MD5

                                                                                                                          c4f045d7baafb0380485a1e028f1ec48

                                                                                                                          SHA1

                                                                                                                          a07fdb9c8462369f2f721f526e4e18f700029371

                                                                                                                          SHA256

                                                                                                                          7ef99cf6b2378214934b430a7b9513dfb3fc188fdf212477bf1dc906207663f5

                                                                                                                          SHA512

                                                                                                                          2fa9467726c8c11ed218c8d6d644f6377b0d9558e883c30c34dcf83081f532ee02aa720d695947add97499c1395f600e885150ce2d5f23821e2a09eb1b9fd8be

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000008051\nita.exe
                                                                                                                          Filesize

                                                                                                                          336KB

                                                                                                                          MD5

                                                                                                                          c4f045d7baafb0380485a1e028f1ec48

                                                                                                                          SHA1

                                                                                                                          a07fdb9c8462369f2f721f526e4e18f700029371

                                                                                                                          SHA256

                                                                                                                          7ef99cf6b2378214934b430a7b9513dfb3fc188fdf212477bf1dc906207663f5

                                                                                                                          SHA512

                                                                                                                          2fa9467726c8c11ed218c8d6d644f6377b0d9558e883c30c34dcf83081f532ee02aa720d695947add97499c1395f600e885150ce2d5f23821e2a09eb1b9fd8be

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000008051\nita.exe
                                                                                                                          Filesize

                                                                                                                          336KB

                                                                                                                          MD5

                                                                                                                          c4f045d7baafb0380485a1e028f1ec48

                                                                                                                          SHA1

                                                                                                                          a07fdb9c8462369f2f721f526e4e18f700029371

                                                                                                                          SHA256

                                                                                                                          7ef99cf6b2378214934b430a7b9513dfb3fc188fdf212477bf1dc906207663f5

                                                                                                                          SHA512

                                                                                                                          2fa9467726c8c11ed218c8d6d644f6377b0d9558e883c30c34dcf83081f532ee02aa720d695947add97499c1395f600e885150ce2d5f23821e2a09eb1b9fd8be

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe
                                                                                                                          Filesize

                                                                                                                          220KB

                                                                                                                          MD5

                                                                                                                          4b304313bfc0ce7e21da7ae0d3c82c39

                                                                                                                          SHA1

                                                                                                                          60745879faa3544b3a884843e368e668acbb6fa9

                                                                                                                          SHA256

                                                                                                                          623839847e3aa9ceda27ced8b2b29b2d4545384bc3a322eaeedd04d5d04b65bd

                                                                                                                          SHA512

                                                                                                                          2da2ec584ccde77ec35cab398272e60ec69eda24491030119110f0e389067d322cd08a04a3bdbbbeff85f43c0d739ae10a6a549e2d7a14854d1109db8d313001

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe
                                                                                                                          Filesize

                                                                                                                          220KB

                                                                                                                          MD5

                                                                                                                          4b304313bfc0ce7e21da7ae0d3c82c39

                                                                                                                          SHA1

                                                                                                                          60745879faa3544b3a884843e368e668acbb6fa9

                                                                                                                          SHA256

                                                                                                                          623839847e3aa9ceda27ced8b2b29b2d4545384bc3a322eaeedd04d5d04b65bd

                                                                                                                          SHA512

                                                                                                                          2da2ec584ccde77ec35cab398272e60ec69eda24491030119110f0e389067d322cd08a04a3bdbbbeff85f43c0d739ae10a6a549e2d7a14854d1109db8d313001

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe
                                                                                                                          Filesize

                                                                                                                          220KB

                                                                                                                          MD5

                                                                                                                          4b304313bfc0ce7e21da7ae0d3c82c39

                                                                                                                          SHA1

                                                                                                                          60745879faa3544b3a884843e368e668acbb6fa9

                                                                                                                          SHA256

                                                                                                                          623839847e3aa9ceda27ced8b2b29b2d4545384bc3a322eaeedd04d5d04b65bd

                                                                                                                          SHA512

                                                                                                                          2da2ec584ccde77ec35cab398272e60ec69eda24491030119110f0e389067d322cd08a04a3bdbbbeff85f43c0d739ae10a6a549e2d7a14854d1109db8d313001

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000011001\trebo1.exe
                                                                                                                          Filesize

                                                                                                                          220KB

                                                                                                                          MD5

                                                                                                                          4b304313bfc0ce7e21da7ae0d3c82c39

                                                                                                                          SHA1

                                                                                                                          60745879faa3544b3a884843e368e668acbb6fa9

                                                                                                                          SHA256

                                                                                                                          623839847e3aa9ceda27ced8b2b29b2d4545384bc3a322eaeedd04d5d04b65bd

                                                                                                                          SHA512

                                                                                                                          2da2ec584ccde77ec35cab398272e60ec69eda24491030119110f0e389067d322cd08a04a3bdbbbeff85f43c0d739ae10a6a549e2d7a14854d1109db8d313001

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                                          Filesize

                                                                                                                          273KB

                                                                                                                          MD5

                                                                                                                          766683884bbe6a2c0e0ea7d76b6b13ea

                                                                                                                          SHA1

                                                                                                                          793d7b457f36a560d7094e4d0fee7270cc0e6842

                                                                                                                          SHA256

                                                                                                                          4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136

                                                                                                                          SHA512

                                                                                                                          52bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                                          Filesize

                                                                                                                          273KB

                                                                                                                          MD5

                                                                                                                          766683884bbe6a2c0e0ea7d76b6b13ea

                                                                                                                          SHA1

                                                                                                                          793d7b457f36a560d7094e4d0fee7270cc0e6842

                                                                                                                          SHA256

                                                                                                                          4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136

                                                                                                                          SHA512

                                                                                                                          52bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                                          Filesize

                                                                                                                          273KB

                                                                                                                          MD5

                                                                                                                          766683884bbe6a2c0e0ea7d76b6b13ea

                                                                                                                          SHA1

                                                                                                                          793d7b457f36a560d7094e4d0fee7270cc0e6842

                                                                                                                          SHA256

                                                                                                                          4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136

                                                                                                                          SHA512

                                                                                                                          52bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe
                                                                                                                          Filesize

                                                                                                                          273KB

                                                                                                                          MD5

                                                                                                                          766683884bbe6a2c0e0ea7d76b6b13ea

                                                                                                                          SHA1

                                                                                                                          793d7b457f36a560d7094e4d0fee7270cc0e6842

                                                                                                                          SHA256

                                                                                                                          4ed06a694ba1832bb5526f2a5d52f6455f7ed317191f910d2e01d35bd8fba136

                                                                                                                          SHA512

                                                                                                                          52bc438968e68e967c1513e9bb1376cf55987a3f1976cd4eb0c463bfc30eb34220c3cfb38713c24d0d6513df3823d1b18aa24857eb8010537cf986ffde6bb12a

                                                                                                                        • memory/224-200-0x0000000000400000-0x0000000002BBD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/224-199-0x0000000002C8C000-0x0000000002CBA000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          184KB

                                                                                                                        • memory/224-222-0x0000000000400000-0x0000000002BBD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/224-188-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/668-221-0x0000000000400000-0x0000000002BBD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/668-195-0x0000000000400000-0x0000000002BBD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/668-194-0x0000000002C30000-0x0000000002D30000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          1024KB

                                                                                                                        • memory/668-181-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/948-226-0x0000000000400000-0x0000000002BAD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/948-225-0x0000000002DBC000-0x0000000002DDA000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          120KB

                                                                                                                        • memory/1112-142-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/1140-217-0x0000000001F30000-0x0000000001F4D000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                        • memory/1140-196-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/1140-212-0x0000000002310000-0x0000000003310000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          16.0MB

                                                                                                                        • memory/1140-209-0x0000000000571000-0x0000000000573000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          8KB

                                                                                                                        • memory/1140-210-0x0000000001F30000-0x0000000001F4D000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                        • memory/1184-145-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/1496-172-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/1496-175-0x0000000000300000-0x0000000000332000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          200KB

                                                                                                                        • memory/1496-206-0x0000000006BB0000-0x00000000070DC000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          5.2MB

                                                                                                                        • memory/1576-143-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/2108-204-0x0000000006DE0000-0x0000000006E30000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          320KB

                                                                                                                        • memory/2108-166-0x00000000056E0000-0x00000000057EA000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          1.0MB

                                                                                                                        • memory/2108-205-0x0000000007000000-0x00000000071C2000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          1.8MB

                                                                                                                        • memory/2108-203-0x0000000006D60000-0x0000000006DD6000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          472KB

                                                                                                                        • memory/2108-159-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/2108-168-0x0000000005670000-0x00000000056AC000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          240KB

                                                                                                                        • memory/2108-167-0x0000000005610000-0x0000000005622000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          72KB

                                                                                                                        • memory/2108-163-0x0000000000D90000-0x0000000000DC2000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          200KB

                                                                                                                        • memory/2108-189-0x0000000006180000-0x0000000006212000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          584KB

                                                                                                                        • memory/2108-165-0x0000000005B60000-0x0000000006178000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          6.1MB

                                                                                                                        • memory/2108-191-0x0000000005AC0000-0x0000000005B26000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          408KB

                                                                                                                        • memory/2220-132-0x0000000002DE9000-0x0000000002E08000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          124KB

                                                                                                                        • memory/2220-139-0x0000000000400000-0x0000000002BAD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/2220-133-0x0000000002D50000-0x0000000002D8C000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          240KB

                                                                                                                        • memory/2220-134-0x0000000000400000-0x0000000002BAD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/2220-138-0x0000000002DE9000-0x0000000002E08000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          124KB

                                                                                                                        • memory/2324-149-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/2568-154-0x00007FFE4E460000-0x00007FFE4EF21000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/2568-153-0x0000000000630000-0x000000000063A000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          40KB

                                                                                                                        • memory/2568-190-0x00007FFE4E460000-0x00007FFE4EF21000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/2568-150-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/2752-146-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3168-211-0x0000000001F50000-0x0000000001F6D000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                        • memory/3168-201-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3168-208-0x00000000005C4000-0x00000000005C7000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/3176-219-0x0000000002310000-0x0000000003310000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          16.0MB

                                                                                                                        • memory/3176-213-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3176-216-0x00000000004C5000-0x00000000004C8000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          12KB

                                                                                                                        • memory/3176-224-0x0000000000480000-0x000000000049D000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                        • memory/3176-218-0x0000000000480000-0x000000000049D000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          116KB

                                                                                                                        • memory/3260-176-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3260-179-0x00007FFE4E460000-0x00007FFE4EF21000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/3260-207-0x00007FFE4E460000-0x00007FFE4EF21000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/3516-147-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3672-229-0x0000000000400000-0x0000000002BAD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/3672-228-0x0000000002D9C000-0x0000000002DBA000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          120KB

                                                                                                                        • memory/3704-169-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3704-215-0x0000000000400000-0x0000000002BBD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/3704-180-0x00000000072D0000-0x0000000007874000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          5.6MB

                                                                                                                        • memory/3704-185-0x0000000002D10000-0x0000000002D5B000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          300KB

                                                                                                                        • memory/3704-184-0x0000000002DC8000-0x0000000002DF6000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          184KB

                                                                                                                        • memory/3704-186-0x0000000000400000-0x0000000002BBD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/3900-144-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3944-161-0x0000000002F38000-0x0000000002F57000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          124KB

                                                                                                                        • memory/3944-141-0x0000000000400000-0x0000000002BAD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/3944-140-0x0000000002F38000-0x0000000002F57000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          124KB

                                                                                                                        • memory/3944-164-0x0000000000400000-0x0000000002BAD000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          39.7MB

                                                                                                                        • memory/3944-135-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/3968-158-0x00007FFE4E460000-0x00007FFE4EF21000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/3968-193-0x00007FFE4E460000-0x00007FFE4EF21000-memory.dmp
                                                                                                                          Filesize

                                                                                                                          10.8MB

                                                                                                                        • memory/3968-155-0x0000000000000000-mapping.dmp
                                                                                                                        • memory/4708-148-0x0000000000000000-mapping.dmp