Analysis

  • max time kernel
    126s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-03-2024 10:56

General

  • Target

    6ca1274e2b896609e052a17f5de984ec78795a756cd22b3a5dc1a1803b2cb977.exe

  • Size

    1.8MB

  • MD5

    acf7e9b844bd35fbfa3deda44914ec62

  • SHA1

    fe30c1151dfdf70580330f9f9f1bc6021c3de62c

  • SHA256

    6ca1274e2b896609e052a17f5de984ec78795a756cd22b3a5dc1a1803b2cb977

  • SHA512

    a2b1f8453d33978e4c2b1db335972c2332260b0a20d497f2cefbd5cd414213ea5afd07f6121028724f88b3b908899a4adb327d55766ce83cbee66ec7ec0ac0c9

  • SSDEEP

    24576:OhNhj1lHGvmFaURlYVQHD6QMTZxRyc0H4yKNqGhnbg4xI3ViTQIvlNRdeRqdlVGN:Oh1lHQUTOoD2se4Gxxs0vjeRqdG

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 61 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 29 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ca1274e2b896609e052a17f5de984ec78795a756cd22b3a5dc1a1803b2cb977.exe
    "C:\Users\Admin\AppData\Local\Temp\6ca1274e2b896609e052a17f5de984ec78795a756cd22b3a5dc1a1803b2cb977.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Users\Admin\AppData\Local\Temp\1000022001\33ee57d1ef.exe
        "C:\Users\Admin\AppData\Local\Temp\1000022001\33ee57d1ef.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:4944
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:2388
      • C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe
        "C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3516
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3260
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5092
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:1732
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\472529282816_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1916
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:2328
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2832
    • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
      C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe
        "C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:1640
      • C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe
        "C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:3516
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:3316
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 1120
                4⤵
                • Program crash
                PID:3180
          • C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe
            "C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4320
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:4120
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:132
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:240
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 240 -s 1168
                      4⤵
                      • Program crash
                      PID:4872
                • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:4744
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F
                    3⤵
                    • Creates scheduled task(s)
                    PID:2776
                  • C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:4352
                    • C:\Users\Admin\AppData\Local\Temp\u3cw.0.exe
                      "C:\Users\Admin\AppData\Local\Temp\u3cw.0.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Checks processor information in registry
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1436
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FIIIIDGHJE.exe"
                        5⤵
                          PID:2044
                          • C:\Users\Admin\AppData\Local\Temp\FIIIIDGHJE.exe
                            "C:\Users\Admin\AppData\Local\Temp\FIIIIDGHJE.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:2124
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\FIIIIDGHJE.exe
                              7⤵
                                PID:1968
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping 2.2.2.2 -n 1 -w 3000
                                  8⤵
                                  • Runs ping.exe
                                  PID:2540
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 2600
                            5⤵
                            • Program crash
                            PID:2948
                        • C:\Users\Admin\AppData\Local\Temp\u3cw.1.exe
                          "C:\Users\Admin\AppData\Local\Temp\u3cw.1.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:4596
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                            5⤵
                              PID:4844
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 1251
                                6⤵
                                  PID:3712
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                  6⤵
                                  • Creates scheduled task(s)
                                  PID:2776
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 1532
                              4⤵
                              • Program crash
                              PID:1344
                          • C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"
                            3⤵
                            • Executes dropped EXE
                            • Checks SCSI registry key(s)
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            PID:2140
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                          2⤵
                          • Loads dropped DLL
                          PID:2996
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                            3⤵
                            • Blocklisted process makes network request
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1876
                            • C:\Windows\system32\netsh.exe
                              netsh wlan show profiles
                              4⤵
                                PID:864
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\472529282816_Desktop.zip' -CompressionLevel Optimal
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1608
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                            2⤵
                            • Blocklisted process makes network request
                            • Loads dropped DLL
                            PID:1292
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3316 -ip 3316
                          1⤵
                            PID:2540
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 240 -ip 240
                            1⤵
                              PID:1708
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4352 -ip 4352
                              1⤵
                                PID:3528
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1436 -ip 1436
                                1⤵
                                  PID:1072
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BF34.bat" "
                                  1⤵
                                    PID:4048
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
                                      2⤵
                                        PID:2620
                                    • C:\Users\Admin\AppData\Local\Temp\CE97.exe
                                      C:\Users\Admin\AppData\Local\Temp\CE97.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:952
                                      • C:\Users\Admin\AppData\Local\Temp\CE97.exe
                                        C:\Users\Admin\AppData\Local\Temp\CE97.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        PID:1868
                                        • C:\Windows\SysWOW64\icacls.exe
                                          icacls "C:\Users\Admin\AppData\Local\779807a1-1c55-4a95-9d33-7b63f50fa3c5" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                          3⤵
                                          • Modifies file permissions
                                          PID:1920
                                        • C:\Users\Admin\AppData\Local\Temp\CE97.exe
                                          "C:\Users\Admin\AppData\Local\Temp\CE97.exe" --Admin IsNotAutoStart IsNotTask
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:1916
                                          • C:\Users\Admin\AppData\Local\Temp\CE97.exe
                                            "C:\Users\Admin\AppData\Local\Temp\CE97.exe" --Admin IsNotAutoStart IsNotTask
                                            4⤵
                                            • Executes dropped EXE
                                            PID:3516
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 600
                                              5⤵
                                              • Program crash
                                              PID:568
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3516 -ip 3516
                                      1⤵
                                        PID:1160
                                      • C:\Users\Admin\AppData\Local\Temp\1D35.exe
                                        C:\Users\Admin\AppData\Local\Temp\1D35.exe
                                        1⤵
                                        • Executes dropped EXE
                                        PID:3636
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 484
                                          2⤵
                                          • Program crash
                                          PID:2460
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1F78.bat" "
                                        1⤵
                                          PID:4960
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
                                            2⤵
                                              PID:2516
                                          • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                                            C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe
                                            1⤵
                                            • Executes dropped EXE
                                            PID:4808
                                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                            C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:5040
                                          • C:\Users\Admin\AppData\Local\Temp\2E0F.exe
                                            C:\Users\Admin\AppData\Local\Temp\2E0F.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            PID:828
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              2⤵
                                                PID:5000
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1096
                                                  3⤵
                                                  • Program crash
                                                  PID:952
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 460
                                                  3⤵
                                                  • Program crash
                                                  PID:4684
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 460
                                                  3⤵
                                                  • Program crash
                                                  PID:3260
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3636 -ip 3636
                                              1⤵
                                                PID:3560
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5000 -ip 5000
                                                1⤵
                                                  PID:1888
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5000 -ip 5000
                                                  1⤵
                                                    PID:2812
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                    • Modifies Installed Components in the registry
                                                    • Enumerates connected drives
                                                    • Checks SCSI registry key(s)
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4236
                                                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                                    1⤵
                                                    • Enumerates system info in registry
                                                    • Modifies Internet Explorer settings
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3704
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5040
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5000 -ip 5000
                                                    1⤵
                                                      PID:3932
                                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                                      1⤵
                                                      • Enumerates system info in registry
                                                      • Modifies Internet Explorer settings
                                                      • Modifies registry class
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4224
                                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                                      1⤵
                                                        PID:1912
                                                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                                        1⤵
                                                          PID:3756
                                                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                                          1⤵
                                                            PID:3928
                                                          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                                                            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                                                            1⤵
                                                              PID:224

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\ProgramData\Are.docx

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              a33e5b189842c5867f46566bdbf7a095

                                                              SHA1

                                                              e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                              SHA256

                                                              5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                              SHA512

                                                              f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                                            • C:\ProgramData\mozglue.dll

                                                              Filesize

                                                              593KB

                                                              MD5

                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                              SHA1

                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                              SHA256

                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                              SHA512

                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                            • C:\ProgramData\nss3.dll

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              1cc453cdf74f31e4d913ff9c10acdde2

                                                              SHA1

                                                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                              SHA256

                                                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                              SHA512

                                                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                              Filesize

                                                              3KB

                                                              MD5

                                                              a87844d5b61c42fc602f01070f37ec45

                                                              SHA1

                                                              415b87ba63f0d908bb804ba10d91a74e536ad9f3

                                                              SHA256

                                                              6a58c5abebd242398876f15234c7794b10fac5e79ac7ba1074b240a2acc30a81

                                                              SHA512

                                                              63541fd2ed677c03c11af0c2433ada1e97dd1da818a33fe4ed7b9b897679a01acc1c8385f34051cae3516f249cd4c85978d52450280f9a355a61bdcbf33e5eb9

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              e67e79bb968a594003fa55bfd415f46a

                                                              SHA1

                                                              e12a08d5b75a9607bab4987ecb5744501dd9873c

                                                              SHA256

                                                              51483df8016026b0ef5a90facd7fe86d2bfb4a8879d17099eeef2e1d9256b352

                                                              SHA512

                                                              cb4e2683e76bddb2407c3d1dee4cc4031ba5d0ca4bc7675059a1df474e18160ca5b1aaedf92cd6e3fefb63a2df1004bb24b395051591e22fbd8305f138e61469

                                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              acf7e9b844bd35fbfa3deda44914ec62

                                                              SHA1

                                                              fe30c1151dfdf70580330f9f9f1bc6021c3de62c

                                                              SHA256

                                                              6ca1274e2b896609e052a17f5de984ec78795a756cd22b3a5dc1a1803b2cb977

                                                              SHA512

                                                              a2b1f8453d33978e4c2b1db335972c2332260b0a20d497f2cefbd5cd414213ea5afd07f6121028724f88b3b908899a4adb327d55766ce83cbee66ec7ec0ac0c9

                                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                              Filesize

                                                              704KB

                                                              MD5

                                                              a5e1c6289e7a6ebf02c6ed9d61b57485

                                                              SHA1

                                                              bb5135ba575d912dc168408ed4faf74f4623ba72

                                                              SHA256

                                                              d5f35ad782c45807dd025bfd5e9e65fedbf9c535131e9a7e95d81ad0a81f19ff

                                                              SHA512

                                                              455bcc4b989b6d592cf4cc165f9391858ac226daf620a94d4ed3a8015938c93babebf5a74f75af629b17d7477489b61e5d1b4e3e6e65d0f2b1dcab9217ea74ed

                                                            • C:\Users\Admin\AppData\Local\Temp\1000022001\33ee57d1ef.exe

                                                              Filesize

                                                              3.0MB

                                                              MD5

                                                              3dbac54e1748d85e4b7ac7a71b768fe5

                                                              SHA1

                                                              c7f78bb2b5d4633412ed1e76f1736501d1b25cc8

                                                              SHA256

                                                              c8804f8b97b9745078991fcd0441aad4693062255b8f15a73ae43f54b11066d7

                                                              SHA512

                                                              4a15aa50c5254c2499d1cd7ba5e5a9c8f07cc3189ae2f29cdd614c58f13f3877d05967967f2f5b709fe0ad36cd5c627a0d7715e6e9e82ad2dff7b94f7e64e4d2

                                                            • C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe

                                                              Filesize

                                                              413KB

                                                              MD5

                                                              d467222c3bd563cb72fa49302f80b079

                                                              SHA1

                                                              9335e2a36abb8309d8a2075faf78d66b968b2a91

                                                              SHA256

                                                              fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

                                                              SHA512

                                                              484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

                                                            • C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe

                                                              Filesize

                                                              350KB

                                                              MD5

                                                              04df085b57814d1a1accead4e153909e

                                                              SHA1

                                                              6d277da314ef185ba9072a9b677b599b1f46c35b

                                                              SHA256

                                                              91a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd

                                                              SHA512

                                                              f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa

                                                            • C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe

                                                              Filesize

                                                              354KB

                                                              MD5

                                                              f72f6b9036a9273958dc09effeb0a10a

                                                              SHA1

                                                              88c6d3521a345c8fd688a7a35c25299cdf96c5cd

                                                              SHA256

                                                              5846798583be774901279b9bca21a8ef095d0f12e459a7a83535b5b0339046bc

                                                              SHA512

                                                              b5b72ff06efe22888ab2f8715b899477e73335fd04ae42a37a1e6da794a4e0b3d7ac6ad7f24e7dddaca91bc96484776bb1c49d5385096523e2cb380bed83f314

                                                            • C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe

                                                              Filesize

                                                              418KB

                                                              MD5

                                                              0099a99f5ffb3c3ae78af0084136fab3

                                                              SHA1

                                                              0205a065728a9ec1133e8a372b1e3864df776e8c

                                                              SHA256

                                                              919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                              SHA512

                                                              5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                            • C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe

                                                              Filesize

                                                              437KB

                                                              MD5

                                                              b6df7bf133a1b4ed69985d6bb949d225

                                                              SHA1

                                                              7d27d0fc2f21a6a4701159a766096eb51ce0cc98

                                                              SHA256

                                                              222b002bfc2d9b651fbc19909ec186750afb845205b82a193a0bbdc5320766b8

                                                              SHA512

                                                              569857633f60f5eb93309b7d60aa7ebe8e5734f5339b1ed314a0c060626396e9700c1fab05f7ccdb7998c77c90ab1a46de8f2fc5f64c16bec3bc16742ba63b2e

                                                            • C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe

                                                              Filesize

                                                              293KB

                                                              MD5

                                                              5360fe5781d535acfbaeedd08e9c5b04

                                                              SHA1

                                                              1d1aede764c4396086a9847c193b1ee15b528ea2

                                                              SHA256

                                                              b1637a25a2959c9a6da241d94d8ddac92f3e542d86dbebdc47c1a06a4f6190a0

                                                              SHA512

                                                              68a8943c4bffa60864d90c286d0423a06f9ddaaa8f85d4c6d92e091f938c57dd1a92865014dfac6ad3ecc2dc67c9b3e161e479112d2aa77ab8b6a1b422b5f6bf

                                                            • C:\Users\Admin\AppData\Local\Temp\1D35.exe

                                                              Filesize

                                                              6.5MB

                                                              MD5

                                                              9e52aa572f0afc888c098db4c0f687ff

                                                              SHA1

                                                              ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b

                                                              SHA256

                                                              4a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443

                                                              SHA512

                                                              d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62

                                                            • C:\Users\Admin\AppData\Local\Temp\2E0F.exe

                                                              Filesize

                                                              351KB

                                                              MD5

                                                              40408d90b261f8716b703db1715df09f

                                                              SHA1

                                                              ac4ccd5c3d585ff9f8ee24dc79fbaa2b918212ab

                                                              SHA256

                                                              5ef8a6fc75231cb5751d95fd0fd21e6e9486097939c1f5a61930b01d59880c4a

                                                              SHA512

                                                              c5f58b8862888d7019a736ec9652ae958265169d944447f96d96a43677f211d017fb60dbb090f35d98d2444c5cf9017b556737780f4399a0c156fdfb0b53b29d

                                                            • C:\Users\Admin\AppData\Local\Temp\BF34.bat

                                                              Filesize

                                                              77B

                                                              MD5

                                                              55cc761bf3429324e5a0095cab002113

                                                              SHA1

                                                              2cc1ef4542a4e92d4158ab3978425d517fafd16d

                                                              SHA256

                                                              d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                                                              SHA512

                                                              33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                                                            • C:\Users\Admin\AppData\Local\Temp\CE97.exe

                                                              Filesize

                                                              792KB

                                                              MD5

                                                              bfb6814f5a0f83e408910fb6e6f80672

                                                              SHA1

                                                              1ecb6006d83a7570d2b90d25f0b67b91681eadf3

                                                              SHA256

                                                              ad2b04ab01eb9dc003a5f5e0b5920d253b424d4c37e497a61d91f0a21b03f3a7

                                                              SHA512

                                                              95647032d104dc1eaaf3abce85e34cef3248787e5b0f5d580c13efb46afed680eb7beb5328e67373033c3a13b643dfc1c853cd028924fd2c990ac0bbfaddebd7

                                                            • C:\Users\Admin\AppData\Local\Temp\FIIIIDGHJE.exe

                                                              Filesize

                                                              106KB

                                                              MD5

                                                              fe380780b5c35bd6d54541791151c2be

                                                              SHA1

                                                              7fe3a583cf91474c733f85cebf3c857682e269e1

                                                              SHA256

                                                              b64a84d1f88e4e78464a1901c1cb5bbd5f00bb73203d719e64e072157a087b53

                                                              SHA512

                                                              ba05ba8aa13c4bc1cf98fbf6c08b021e8b19354098e0397fc8e1e5d3dcce367c1063203f24e50d0973193f6535681d0a43486e5dade5d112853b7a2fe8739b6c

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_05ymrmju.a2t.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Users\Admin\AppData\Local\Temp\u3cw.0.exe

                                                              Filesize

                                                              293KB

                                                              MD5

                                                              0efb69d32b90cb021bf55a1930478807

                                                              SHA1

                                                              f34a8756c8cf320ffea9c7278710fa45e9ea1517

                                                              SHA256

                                                              fe956573db3426031c409a5d834fdc5f8ea633b0aa2a4c2c71789ee1e6c344c9

                                                              SHA512

                                                              001f232e9c5bc89a3e064d94ed396c9337014685b3db5203ad4244843b1670d66f2153d1287d5df4c636c533e65af07059767e668f4d426784fa9b7095e9c69c

                                                            • C:\Users\Admin\AppData\Local\Temp\u3cw.1.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              eee5ddcffbed16222cac0a1b4e2e466e

                                                              SHA1

                                                              28b40c88b8ea50b0782e2bcbb4cc0f411035f3d5

                                                              SHA256

                                                              2a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54

                                                              SHA512

                                                              8f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc

                                                            • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                              Filesize

                                                              128B

                                                              MD5

                                                              11bb3db51f701d4e42d3287f71a6a43e

                                                              SHA1

                                                              63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                              SHA256

                                                              6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                              SHA512

                                                              907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              726cd06231883a159ec1ce28dd538699

                                                              SHA1

                                                              404897e6a133d255ad5a9c26ac6414d7134285a2

                                                              SHA256

                                                              12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                              SHA512

                                                              9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              15a42d3e4579da615a384c717ab2109b

                                                              SHA1

                                                              22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                              SHA256

                                                              3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                              SHA512

                                                              1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                              Filesize

                                                              704KB

                                                              MD5

                                                              dbd501cdf59c24419e4427666fb84c5e

                                                              SHA1

                                                              bd7fcb9ca66ce1115cd1f297a66b1df4ab952834

                                                              SHA256

                                                              effba0ea3b1125cb7757d72f4e3459491947de1b80e520aebe3e5ca802d69f68

                                                              SHA512

                                                              e2ab5346eba31c8963502528ea8a0478d3aff12a73465a2bd4b543cc62676f0e501c95149988d61bcc267691b25d2db025532bce44cdadf698a7e339ce23cd20

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                              Filesize

                                                              688KB

                                                              MD5

                                                              ca7bee746a541a8ef4659f8789cb611a

                                                              SHA1

                                                              7433debd8e5a6faf354277a117927ab3b3481a25

                                                              SHA256

                                                              bfc706d8b2f0ea818524aa056c8a0a114543392c4188a4c1242062f64958dcb8

                                                              SHA512

                                                              356816a6eecb5b49d38363768192ef968535396114158e422cd97a910105243faa4474d3964018e4e428f72a86ee3926eeb03736e0ea9215deb59d07fdd9c12d

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                              Filesize

                                                              768KB

                                                              MD5

                                                              49e89eb80fbde94494451ee330f4621c

                                                              SHA1

                                                              87abe226d853b34469e2a03264310b155dac3325

                                                              SHA256

                                                              03dab89ab4f4d0a57f77b7deea27f041ca46d313726204469ce26d498b01ed90

                                                              SHA512

                                                              ba2c192e994e42cd1bf8e39615c92b77a08e5f8d89c8d16ce5d7d87f6832ee6b61bdefedce855c7bb42b7053ed4a448bc7414019d80daf79a05ce8e95e3a60f0

                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              154c3f1334dd435f562672f2664fea6b

                                                              SHA1

                                                              51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                              SHA256

                                                              5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                              SHA512

                                                              1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              f35b671fda2603ec30ace10946f11a90

                                                              SHA1

                                                              059ad6b06559d4db581b1879e709f32f80850872

                                                              SHA256

                                                              83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                              SHA512

                                                              b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                              Filesize

                                                              128KB

                                                              MD5

                                                              43df78051fe29a0012b91f345844476a

                                                              SHA1

                                                              bb87e4545d52bd83a0045e1fdec007bb1bdd2692

                                                              SHA256

                                                              690faf64a8be596b378ba2d88abc36d8e7542946321679d130a4de1c5ad6a0c9

                                                              SHA512

                                                              411ab55cfd2942d3e6b987ec59215361aac8a555116551ce0114b9b96ecf916197d18b10ac26612c9f90ebebab99559c5375a0c50c75a6fd14a3ddeefd7073eb

                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                              Filesize

                                                              768KB

                                                              MD5

                                                              3a3a1170465f5a91bd68beae44a819ca

                                                              SHA1

                                                              00ac0922d9ee0e378cdc7204f80dc7b651b84f13

                                                              SHA256

                                                              feba2939429349c65592dc5667aa97231b1495cf0cf24ffcd3ac7f0c826a514f

                                                              SHA512

                                                              ffa32fc695197b56deb35e7da194162f6f0bb336c8a9fa1a4d767ef9ec19fe55a1302c070912f52e54828c6cd727ffc0ec46c198fa8f19b183e5aa4b46a13413

                                                            • memory/240-256-0x0000000000400000-0x000000000044B000-memory.dmp

                                                              Filesize

                                                              300KB

                                                            • memory/240-249-0x0000000000400000-0x000000000044B000-memory.dmp

                                                              Filesize

                                                              300KB

                                                            • memory/240-252-0x0000000000400000-0x000000000044B000-memory.dmp

                                                              Filesize

                                                              300KB

                                                            • memory/568-212-0x0000000000D90000-0x0000000000DEE000-memory.dmp

                                                              Filesize

                                                              376KB

                                                            • memory/568-232-0x0000000072720000-0x0000000072ED1000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/568-221-0x0000000003320000-0x0000000005320000-memory.dmp

                                                              Filesize

                                                              32.0MB

                                                            • memory/568-213-0x0000000072720000-0x0000000072ED1000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/1436-344-0x0000000000400000-0x0000000000AF2000-memory.dmp

                                                              Filesize

                                                              6.9MB

                                                            • memory/1436-341-0x0000000002720000-0x0000000002747000-memory.dmp

                                                              Filesize

                                                              156KB

                                                            • memory/1436-352-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/1436-332-0x0000000000D00000-0x0000000000E00000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/1640-190-0x0000000000B30000-0x0000000000EE2000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/1640-192-0x0000000000B30000-0x0000000000EE2000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/1640-329-0x0000000000B30000-0x0000000000EE2000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/1640-330-0x0000000000B30000-0x0000000000EE2000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/1872-28-0x0000000004B20000-0x0000000004B21000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1872-26-0x0000000004B40000-0x0000000004B41000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1872-29-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1872-31-0x0000000004B90000-0x0000000004B91000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1872-25-0x0000000004B50000-0x0000000004B51000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1872-245-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1872-27-0x0000000004B80000-0x0000000004B81000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1872-30-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1872-118-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1872-156-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1872-152-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1872-24-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1872-140-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1872-23-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/1916-133-0x0000012678D60000-0x0000012678D6A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/1916-131-0x0000012678E00000-0x0000012678E10000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1916-139-0x00007FF940EF0000-0x00007FF9419B2000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/1916-128-0x0000012678CE0000-0x0000012678D02000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/1916-132-0x0000012678D70000-0x0000012678D82000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/1916-129-0x00007FF940EF0000-0x00007FF9419B2000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/1916-130-0x0000012678E00000-0x0000012678E10000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2140-345-0x0000000002700000-0x000000000270B000-memory.dmp

                                                              Filesize

                                                              44KB

                                                            • memory/2388-76-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-79-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-57-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-54-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-114-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-113-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-58-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2388-112-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-116-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-59-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-75-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-111-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-157-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-89-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-117-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-77-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-78-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-115-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-80-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-81-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-82-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-83-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-84-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-110-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-85-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-98-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-97-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-90-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-92-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-86-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-88-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-95-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2388-91-0x0000000000400000-0x0000000000919000-memory.dmp

                                                              Filesize

                                                              5.1MB

                                                            • memory/2832-160-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2832-163-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2832-164-0x00000000056E0000-0x00000000056E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2832-166-0x00000000056D0000-0x00000000056D1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2832-165-0x00000000056F0000-0x00000000056F1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2832-168-0x00000000056B0000-0x00000000056B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2832-169-0x00000000056C0000-0x00000000056C1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2832-191-0x0000000001000000-0x00000000014CA000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/2832-167-0x0000000005720000-0x0000000005721000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2832-170-0x0000000005710000-0x0000000005711000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3316-219-0x0000000000400000-0x000000000044A000-memory.dmp

                                                              Filesize

                                                              296KB

                                                            • memory/3316-231-0x0000000000C20000-0x0000000000C21000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3316-216-0x0000000000400000-0x000000000044A000-memory.dmp

                                                              Filesize

                                                              296KB

                                                            • memory/3316-233-0x0000000000400000-0x000000000044A000-memory.dmp

                                                              Filesize

                                                              296KB

                                                            • memory/4236-9-0x00000000053E0000-0x00000000053E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4236-0-0x0000000000380000-0x000000000084A000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4236-1-0x00000000772D6000-0x00000000772D8000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/4236-10-0x00000000053D0000-0x00000000053D1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4236-22-0x0000000000380000-0x000000000084A000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4236-7-0x0000000005360000-0x0000000005361000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4236-8-0x0000000005390000-0x0000000005391000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4236-6-0x0000000005350000-0x0000000005351000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4236-3-0x0000000005380000-0x0000000005381000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4236-2-0x0000000000380000-0x000000000084A000-memory.dmp

                                                              Filesize

                                                              4.8MB

                                                            • memory/4236-4-0x0000000005370000-0x0000000005371000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4236-5-0x00000000053B0000-0x00000000053B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4320-255-0x0000000002DE0000-0x0000000004DE0000-memory.dmp

                                                              Filesize

                                                              32.0MB

                                                            • memory/4320-254-0x0000000072580000-0x0000000072D31000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/4320-244-0x0000000000970000-0x00000000009CE000-memory.dmp

                                                              Filesize

                                                              376KB

                                                            • memory/4320-247-0x0000000072580000-0x0000000072D31000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/4352-295-0x0000000000400000-0x0000000000B16000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/4352-293-0x0000000000D10000-0x0000000000E10000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/4352-371-0x0000000000400000-0x0000000000B16000-memory.dmp

                                                              Filesize

                                                              7.1MB

                                                            • memory/4352-294-0x0000000002830000-0x000000000289E000-memory.dmp

                                                              Filesize

                                                              440KB

                                                            • memory/4944-159-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-50-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-51-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-119-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-151-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-153-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-154-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-155-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB

                                                            • memory/4944-296-0x0000000000B50000-0x0000000000F02000-memory.dmp

                                                              Filesize

                                                              3.7MB