Analysis

  • max time kernel
    108s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2023, 06:03

General

  • Target

    c550884ae3d619a88bcbb3e649178c9781cbd9eeae7fc90f0cf8beecd1e9f585.exe

  • Size

    1.0MB

  • MD5

    053cf3a8a8779c697737367ca91c2c82

  • SHA1

    44c396d7155720510261a5b7cd85f3c06df5437b

  • SHA256

    c550884ae3d619a88bcbb3e649178c9781cbd9eeae7fc90f0cf8beecd1e9f585

  • SHA512

    e7dfd4b35d5b38d160ab134fc880ce66f8dd2235b1be935312f2cb1b6be06fe825277e89506e012b57e22cd6432de37f75c96b275a52fc8368855380afb964c2

  • SSDEEP

    12288:rMrry90iuEw+BgfpgpKI2sNysH1Z6+y931uhkBLonbrTOHwWWsv1vTwEm1RIQXES:cy3uE5B2KKzzhuLTOHwNswR1RkbdZ9k

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nado

C2

176.113.115.145:4125

Attributes
  • auth_value

    a648e365d8e0df895a84152ad68ffc56

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c550884ae3d619a88bcbb3e649178c9781cbd9eeae7fc90f0cf8beecd1e9f585.exe
    "C:\Users\Admin\AppData\Local\Temp\c550884ae3d619a88bcbb3e649178c9781cbd9eeae7fc90f0cf8beecd1e9f585.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5719.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5719.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7861.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7861.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6183.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6183.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0818.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0818.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3592
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5597tv.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5597tv.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4844
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1100
              6⤵
              • Program crash
              PID:1320
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03GL03.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03GL03.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4940
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 1344
            5⤵
            • Program crash
            PID:4628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYYQu37.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYYQu37.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y22Cw19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y22Cw19.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4368
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1612
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4980
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3652
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:4316
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:3404
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4376
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4468
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:2488
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2876
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4844 -ip 4844
                1⤵
                  PID:2144
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4940 -ip 4940
                  1⤵
                    PID:4992
                  • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                    C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4424

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y22Cw19.exe

                          Filesize

                          235KB

                          MD5

                          0d3699671b441b6c3deb80a1a9d06e78

                          SHA1

                          13426f50bab191580e3bf62fea1aa0596ea7158b

                          SHA256

                          d7ad9c76ba777ce078eb46e8de929588846cec978f433bea049c0119483b95bc

                          SHA512

                          44594e92cec27a51bd597255fbd94d45f40c1cb948798b8fd2435c567fb18bf4f4f70d01e83e520dd9a607144d8e3b811389cf59e8cc2f1abab0723f901d40c4

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y22Cw19.exe

                          Filesize

                          235KB

                          MD5

                          0d3699671b441b6c3deb80a1a9d06e78

                          SHA1

                          13426f50bab191580e3bf62fea1aa0596ea7158b

                          SHA256

                          d7ad9c76ba777ce078eb46e8de929588846cec978f433bea049c0119483b95bc

                          SHA512

                          44594e92cec27a51bd597255fbd94d45f40c1cb948798b8fd2435c567fb18bf4f4f70d01e83e520dd9a607144d8e3b811389cf59e8cc2f1abab0723f901d40c4

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5719.exe

                          Filesize

                          840KB

                          MD5

                          ed1c6d2ecfaee6c6e1b809ab0ae961d9

                          SHA1

                          883a5a11fd09aa13b7f444edb1458ff8de653620

                          SHA256

                          8e4cb495d74680d66252339c5c4018ccdd3d2fc9a3d797d062622e635b35abfd

                          SHA512

                          eedb4bd42b7763f1ebc415a733c2ac707fe1b1f6241d38e278ee90a062ceb7c5caee50769ac91a88687d16b12c4827e91f00cdaabccde07a6e9047eef27a1828

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5719.exe

                          Filesize

                          840KB

                          MD5

                          ed1c6d2ecfaee6c6e1b809ab0ae961d9

                          SHA1

                          883a5a11fd09aa13b7f444edb1458ff8de653620

                          SHA256

                          8e4cb495d74680d66252339c5c4018ccdd3d2fc9a3d797d062622e635b35abfd

                          SHA512

                          eedb4bd42b7763f1ebc415a733c2ac707fe1b1f6241d38e278ee90a062ceb7c5caee50769ac91a88687d16b12c4827e91f00cdaabccde07a6e9047eef27a1828

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYYQu37.exe

                          Filesize

                          175KB

                          MD5

                          55cff0c8ec4b9284afd2296e31e92b21

                          SHA1

                          62186a43c39582effd23e14b6ba78fa77ac95d34

                          SHA256

                          0a8902d0073f506735d5874cd1033dc47b59f5395059faa7aea56d6ffdad2e61

                          SHA512

                          37bb6cdce5aac179d36841907a11499120be31ebc185968487d2c43326e0ede9a5c921ec7cfe71ae0cf221b4f255a4badbb03accd5a937f280cfaf4754017b8a

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYYQu37.exe

                          Filesize

                          175KB

                          MD5

                          55cff0c8ec4b9284afd2296e31e92b21

                          SHA1

                          62186a43c39582effd23e14b6ba78fa77ac95d34

                          SHA256

                          0a8902d0073f506735d5874cd1033dc47b59f5395059faa7aea56d6ffdad2e61

                          SHA512

                          37bb6cdce5aac179d36841907a11499120be31ebc185968487d2c43326e0ede9a5c921ec7cfe71ae0cf221b4f255a4badbb03accd5a937f280cfaf4754017b8a

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7861.exe

                          Filesize

                          698KB

                          MD5

                          3ec06bf06d562ba721fe610034823729

                          SHA1

                          90c0ae494ac2663c6e545a7b6cddc0871c125e59

                          SHA256

                          a9b29c057dd3988906cc2b86a95f4cf22d773ea5056886cc59cd43a5098c8229

                          SHA512

                          ee8f96d53e9fcad509a2a188dd4d4cbb53cc1bdd19fcd4d586837e43a3de33eca45fc3b289e629d8e8abcf4b4c7b20a1e469d9ec23c0e54f499acd3ef20e9181

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7861.exe

                          Filesize

                          698KB

                          MD5

                          3ec06bf06d562ba721fe610034823729

                          SHA1

                          90c0ae494ac2663c6e545a7b6cddc0871c125e59

                          SHA256

                          a9b29c057dd3988906cc2b86a95f4cf22d773ea5056886cc59cd43a5098c8229

                          SHA512

                          ee8f96d53e9fcad509a2a188dd4d4cbb53cc1bdd19fcd4d586837e43a3de33eca45fc3b289e629d8e8abcf4b4c7b20a1e469d9ec23c0e54f499acd3ef20e9181

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03GL03.exe

                          Filesize

                          345KB

                          MD5

                          8cb4f8717c7abe449ea6be92623e234b

                          SHA1

                          49f168333b56a02d772f3596feaa370602efbcc0

                          SHA256

                          5d1e5db7357985c0ac4b750b7f456274309cbb3a7cc32479a58837d0c41ec24b

                          SHA512

                          b3b65e54bfee72e32dd1769368141c14f5f0795a6035f6229b63a4402d999032f22b3e1d8b8fa8c43a28612aa475f743aa3df3ed85864bb7dbf87adce02736bc

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03GL03.exe

                          Filesize

                          345KB

                          MD5

                          8cb4f8717c7abe449ea6be92623e234b

                          SHA1

                          49f168333b56a02d772f3596feaa370602efbcc0

                          SHA256

                          5d1e5db7357985c0ac4b750b7f456274309cbb3a7cc32479a58837d0c41ec24b

                          SHA512

                          b3b65e54bfee72e32dd1769368141c14f5f0795a6035f6229b63a4402d999032f22b3e1d8b8fa8c43a28612aa475f743aa3df3ed85864bb7dbf87adce02736bc

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6183.exe

                          Filesize

                          346KB

                          MD5

                          71675aa6a40b0efc3fadf0502f0b4719

                          SHA1

                          683d44d42606206053bc3b9cc5ab094d08f82882

                          SHA256

                          976cc757ea5edef7beabb8b960c671be77e4ecd9bf3bf181b476b8316cd4e776

                          SHA512

                          4c71b2f48fb7fb3b35786b50d321c2d8932f2d188e2ecb5fa171f96411e61cf1722e74312ec81ec6cb5883d456a5d3bdeb537f97bedd99ca71aeded7b5bbad60

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6183.exe

                          Filesize

                          346KB

                          MD5

                          71675aa6a40b0efc3fadf0502f0b4719

                          SHA1

                          683d44d42606206053bc3b9cc5ab094d08f82882

                          SHA256

                          976cc757ea5edef7beabb8b960c671be77e4ecd9bf3bf181b476b8316cd4e776

                          SHA512

                          4c71b2f48fb7fb3b35786b50d321c2d8932f2d188e2ecb5fa171f96411e61cf1722e74312ec81ec6cb5883d456a5d3bdeb537f97bedd99ca71aeded7b5bbad60

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0818.exe

                          Filesize

                          12KB

                          MD5

                          e46956917fa5188df75cd3e9bedff6b1

                          SHA1

                          a040776129eb8154e9ab83c0d5ef3e9bdaa22efd

                          SHA256

                          1b9d5688a407319aab0243fa30d18a2b0581ee826d6b99cc3767cc592d75976f

                          SHA512

                          24623da7720f02160cca01b8c39584ecd0806aa801a27a49804c04592925547f83f172298cc3ac993e7d65a5df6898956d2469e85f8b15baca0daff7d3396109

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0818.exe

                          Filesize

                          12KB

                          MD5

                          e46956917fa5188df75cd3e9bedff6b1

                          SHA1

                          a040776129eb8154e9ab83c0d5ef3e9bdaa22efd

                          SHA256

                          1b9d5688a407319aab0243fa30d18a2b0581ee826d6b99cc3767cc592d75976f

                          SHA512

                          24623da7720f02160cca01b8c39584ecd0806aa801a27a49804c04592925547f83f172298cc3ac993e7d65a5df6898956d2469e85f8b15baca0daff7d3396109

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5597tv.exe

                          Filesize

                          288KB

                          MD5

                          f1cca9652a8b0b17f279a94b3f007d2c

                          SHA1

                          031828ac5127f438f3c3dc8806c6aabf5fd4b4bc

                          SHA256

                          dd995b8ef8fd3ba8acd394625ca8dc39ea0d453c9f060b6227f755c74c902bd9

                          SHA512

                          02204b268100ca5a4fca0f2aaad351894f18722e2dfa7262adf9dd6394fb7f85a21e4fdeadf147b7cd09fb697c85e2f0e73b4ce429a02ec92aac6ee7041013a8

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5597tv.exe

                          Filesize

                          288KB

                          MD5

                          f1cca9652a8b0b17f279a94b3f007d2c

                          SHA1

                          031828ac5127f438f3c3dc8806c6aabf5fd4b4bc

                          SHA256

                          dd995b8ef8fd3ba8acd394625ca8dc39ea0d453c9f060b6227f755c74c902bd9

                          SHA512

                          02204b268100ca5a4fca0f2aaad351894f18722e2dfa7262adf9dd6394fb7f85a21e4fdeadf147b7cd09fb697c85e2f0e73b4ce429a02ec92aac6ee7041013a8

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          0d3699671b441b6c3deb80a1a9d06e78

                          SHA1

                          13426f50bab191580e3bf62fea1aa0596ea7158b

                          SHA256

                          d7ad9c76ba777ce078eb46e8de929588846cec978f433bea049c0119483b95bc

                          SHA512

                          44594e92cec27a51bd597255fbd94d45f40c1cb948798b8fd2435c567fb18bf4f4f70d01e83e520dd9a607144d8e3b811389cf59e8cc2f1abab0723f901d40c4

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          0d3699671b441b6c3deb80a1a9d06e78

                          SHA1

                          13426f50bab191580e3bf62fea1aa0596ea7158b

                          SHA256

                          d7ad9c76ba777ce078eb46e8de929588846cec978f433bea049c0119483b95bc

                          SHA512

                          44594e92cec27a51bd597255fbd94d45f40c1cb948798b8fd2435c567fb18bf4f4f70d01e83e520dd9a607144d8e3b811389cf59e8cc2f1abab0723f901d40c4

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          0d3699671b441b6c3deb80a1a9d06e78

                          SHA1

                          13426f50bab191580e3bf62fea1aa0596ea7158b

                          SHA256

                          d7ad9c76ba777ce078eb46e8de929588846cec978f433bea049c0119483b95bc

                          SHA512

                          44594e92cec27a51bd597255fbd94d45f40c1cb948798b8fd2435c567fb18bf4f4f70d01e83e520dd9a607144d8e3b811389cf59e8cc2f1abab0723f901d40c4

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          0d3699671b441b6c3deb80a1a9d06e78

                          SHA1

                          13426f50bab191580e3bf62fea1aa0596ea7158b

                          SHA256

                          d7ad9c76ba777ce078eb46e8de929588846cec978f433bea049c0119483b95bc

                          SHA512

                          44594e92cec27a51bd597255fbd94d45f40c1cb948798b8fd2435c567fb18bf4f4f70d01e83e520dd9a607144d8e3b811389cf59e8cc2f1abab0723f901d40c4

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          16cf28ebb6d37dbaba93f18320c6086e

                          SHA1

                          eae7d4b7a9636329065877aabe8d4f721a26ab25

                          SHA256

                          c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                          SHA512

                          f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          16cf28ebb6d37dbaba93f18320c6086e

                          SHA1

                          eae7d4b7a9636329065877aabe8d4f721a26ab25

                          SHA256

                          c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                          SHA512

                          f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          16cf28ebb6d37dbaba93f18320c6086e

                          SHA1

                          eae7d4b7a9636329065877aabe8d4f721a26ab25

                          SHA256

                          c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                          SHA512

                          f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                          Filesize

                          223B

                          MD5

                          94cbeec5d4343918fd0e48760e40539c

                          SHA1

                          a049266c5c1131f692f306c8710d7e72586ae79d

                          SHA256

                          48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                          SHA512

                          4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

                        • memory/3592-161-0x0000000000940000-0x000000000094A000-memory.dmp

                          Filesize

                          40KB

                        • memory/4032-1140-0x0000000000B80000-0x0000000000BB2000-memory.dmp

                          Filesize

                          200KB

                        • memory/4032-1141-0x0000000005790000-0x00000000057A0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4032-1142-0x0000000005790000-0x00000000057A0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4844-202-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4844-188-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-192-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-194-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-196-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-198-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-199-0x0000000000400000-0x00000000004B7000-memory.dmp

                          Filesize

                          732KB

                        • memory/4844-200-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4844-201-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4844-178-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-204-0x0000000000400000-0x00000000004B7000-memory.dmp

                          Filesize

                          732KB

                        • memory/4844-190-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-176-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-172-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-186-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-174-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-171-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-170-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4844-169-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4844-168-0x00000000006C0000-0x00000000006ED000-memory.dmp

                          Filesize

                          180KB

                        • memory/4844-167-0x0000000004AC0000-0x0000000005064000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/4844-184-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-182-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4844-180-0x0000000004A20000-0x0000000004A32000-memory.dmp

                          Filesize

                          72KB

                        • memory/4940-218-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-236-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-238-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-239-0x00000000005D0000-0x000000000061B000-memory.dmp

                          Filesize

                          300KB

                        • memory/4940-240-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-242-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-244-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-243-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-246-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-1119-0x00000000052B0000-0x00000000058C8000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/4940-1120-0x00000000058D0000-0x00000000059DA000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4940-1121-0x00000000059F0000-0x0000000005A02000-memory.dmp

                          Filesize

                          72KB

                        • memory/4940-1122-0x0000000005A10000-0x0000000005A4C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4940-1123-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-1124-0x0000000005D00000-0x0000000005D92000-memory.dmp

                          Filesize

                          584KB

                        • memory/4940-1125-0x0000000005DA0000-0x0000000005E06000-memory.dmp

                          Filesize

                          408KB

                        • memory/4940-1127-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-1128-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-1129-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-1130-0x0000000007870000-0x0000000007A32000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4940-1131-0x0000000007A40000-0x0000000007F6C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/4940-1132-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                          Filesize

                          64KB

                        • memory/4940-234-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-232-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-230-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-228-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-226-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-224-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-222-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-220-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-216-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-214-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-212-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-210-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-209-0x0000000002500000-0x000000000253F000-memory.dmp

                          Filesize

                          252KB

                        • memory/4940-1133-0x0000000008020000-0x0000000008096000-memory.dmp

                          Filesize

                          472KB

                        • memory/4940-1134-0x00000000080A0000-0x00000000080F0000-memory.dmp

                          Filesize

                          320KB