Resubmissions
09-06-2024 00:45
240609-a33gjabf67 1027-05-2024 17:20
240527-vwjfasbd51 1026-05-2024 15:54
240526-tcc9hacf37 1027-07-2023 00:48
230727-a53v3shd3w 725-07-2023 02:01
230725-cfzhgahh76 324-07-2023 21:47
230724-1nb9xahb36 10Analysis
-
max time kernel
25s -
max time network
29s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-05-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
nitro generator.exe
Resource
win11-20240426-en
General
-
Target
nitro generator.exe
-
Size
2.7MB
-
MD5
3373253f2f609bd2c3fb917e7d5f753a
-
SHA1
00571dc9f73635d355d3123a42ad860eee21de07
-
SHA256
751736b637f142637a3efa5a4c8ba281c949e5054656554931514e6f03642bfa
-
SHA512
39024cb5fac8ba4524571f4e193409726fc0779ba1c2c67e9fa33b19bf5fa54297ee2470d0f9ad4a0cfe87f7a466a54b212e34c5c34e195f80a91dd4e788c341
-
SSDEEP
24576:W5FcdZnozS74/KabrCEmxE3pD1IQybpgwmFpo28x8aonpoNSHL9TIP6vV5tygavO:cFcjH7Qp5nVbpjR3iGnh2lRcKJq7Pw+
Malware Config
Signatures
-
Detect Cinoshi payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2540-0-0x0000000000400000-0x00000000006B5000-memory.dmp family_cinoshi C:\Users\Admin\AppData\Local\Temp\faintxakers-420787300007.exe family_cinoshi behavioral1/memory/2148-157-0x00000000003E0000-0x000000000044C000-memory.dmp family_cinoshi -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
block.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-150-0x0000000000780000-0x00000000007A8000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
Processes:
@flamelos_easy.exefaintxakers-420787300007.exeblock.exepid process 2360 @flamelos_easy.exe 2148 faintxakers-420787300007.exe 4028 block.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 48 IoCs
Processes:
block.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32Helper = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32Helper* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVidiaUpdate = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVidiaUpdate* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\root = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\root- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\root* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Java- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\GoogleChrome- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_8991928E = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_8991928E- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MicrosoftEdgeAutoLaunch_8991928E = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MicrosoftEdgeAutoLaunch_8991928E- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\NVidiaUpdate = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\devenv = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\NVidiaUpdate- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVidiaUpdate- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\root* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleChrome* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\MicrosoftEdgeAutoLaunch_8991928E* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\root = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\devenv- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleChrome- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_8991928E* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\devenv = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleChrome = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\root- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\GoogleChrome = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Win32Helper* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\GoogleChrome* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\devenv* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Win32Helper = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Win32Helper- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Java = "\"explorer.exe\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Java* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32Helper- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\NVidiaUpdate* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\devenv- = "\"cmd.exe\" /c \"@Start /HIGH \"\" \"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\"" block.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\devenv* = "\"mshta.exe\" vbscript:Close(ExecuteGlobal(\"Call CreateObject(\"\"WScript.Shell\"\").Run(\"\"C:\\Users\\Admin\\AppData\\Local\\Temp\\block.exe\"\")\"))" block.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3616 2148 WerFault.exe faintxakers-420787300007.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
faintxakers-420787300007.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 faintxakers-420787300007.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier faintxakers-420787300007.exe -
Modifies registry class 1 IoCs
Processes:
nitro generator.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nitro generator.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
faintxakers-420787300007.exepid process 2148 faintxakers-420787300007.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
faintxakers-420787300007.exeblock.exedescription pid process Token: SeDebugPrivilege 2148 faintxakers-420787300007.exe Token: SeDebugPrivilege 4028 block.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
nitro generator.exedescription pid process target process PID 2540 wrote to memory of 2360 2540 nitro generator.exe @flamelos_easy.exe PID 2540 wrote to memory of 2360 2540 nitro generator.exe @flamelos_easy.exe PID 2540 wrote to memory of 2360 2540 nitro generator.exe @flamelos_easy.exe PID 2540 wrote to memory of 2148 2540 nitro generator.exe faintxakers-420787300007.exe PID 2540 wrote to memory of 2148 2540 nitro generator.exe faintxakers-420787300007.exe PID 2540 wrote to memory of 2148 2540 nitro generator.exe faintxakers-420787300007.exe PID 2540 wrote to memory of 4028 2540 nitro generator.exe block.exe PID 2540 wrote to memory of 4028 2540 nitro generator.exe block.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\nitro generator.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\@flamelos_easy.exe"C:\Users\Admin\AppData\Local\Temp\@flamelos_easy.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\faintxakers-420787300007.exe"C:\Users\Admin\AppData\Local\Temp\faintxakers-420787300007.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 21523⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\block.exe"C:\Users\Admin\AppData\Local\Temp\block.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2148 -ip 21481⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\@flamelos_easy.exeFilesize
1.1MB
MD5f1f8fa9c28485654576df9f2fb41f312
SHA100c247511a5f4d59882eb7916345cac114f6d5fc
SHA25625ee9ca48979044e60eeeafd466f106ab5ca4fa953a5df612a2f12700dce63d3
SHA512adb2e1fe68586a4415f2596fd11d37a118c67ea2b77f28fde9f930dd98baca1d6bc87cee4b4a69bba481b20ad27da7eee529896199beb5507b9ff24c5ff156bb
-
C:\Users\Admin\AppData\Local\Temp\block.exeFilesize
327KB
MD5c7223b193f5c3acfc1e6e7e901bd6578
SHA1bf8a646bd4cb0ad03280a774f7ea71b7d2e07a88
SHA256485717dfa45e3a548e7d8f7e4b9f38b4f8e8eba7b2c7f625134fe98e08e1c642
SHA5129926a01b82a9f0a255f3a48241f73703731308b7b07a96c608cb2338dd391c89b4bc99b871d0869c8ca90f6f765ae8e7e6c14a407168d9c82c233dda092351aa
-
C:\Users\Admin\AppData\Local\Temp\faintxakers-420787300007.exeFilesize
410KB
MD597b36605db9e163c3963526f1711db41
SHA17b30f351e3bbbb651b37c6c78e4efce7e8f51604
SHA256df6d3552b1c7b74794ca0a5606f0a3654048fbe6218c8cf45fa9d290a3650f88
SHA512209022d75ca4c1af81df6425338edabb0daae35b200432f284901fd6f5295c3a47c7329d455c8a26354eaf9cb9716d02c4aa809c30c77cc260fe464cfbfd013d
-
memory/2148-168-0x0000000006290000-0x0000000006322000-memory.dmpFilesize
584KB
-
memory/2148-173-0x0000000006A10000-0x0000000006A76000-memory.dmpFilesize
408KB
-
memory/2148-149-0x000000007280E000-0x000000007280F000-memory.dmpFilesize
4KB
-
memory/2148-171-0x0000000006990000-0x0000000006A06000-memory.dmpFilesize
472KB
-
memory/2148-157-0x00000000003E0000-0x000000000044C000-memory.dmpFilesize
432KB
-
memory/2148-159-0x00000000026E0000-0x00000000026FA000-memory.dmpFilesize
104KB
-
memory/2148-170-0x0000000006600000-0x00000000067C2000-memory.dmpFilesize
1.8MB
-
memory/2148-169-0x0000000006210000-0x0000000006222000-memory.dmpFilesize
72KB
-
memory/2148-162-0x0000000005340000-0x00000000058E6000-memory.dmpFilesize
5.6MB
-
memory/2360-161-0x0000000072800000-0x0000000072FB1000-memory.dmpFilesize
7.7MB
-
memory/2360-164-0x0000000007680000-0x0000000007692000-memory.dmpFilesize
72KB
-
memory/2360-165-0x00000000076A0000-0x00000000077AA000-memory.dmpFilesize
1.0MB
-
memory/2360-166-0x00000000077B0000-0x00000000077EC000-memory.dmpFilesize
240KB
-
memory/2360-167-0x0000000007830000-0x000000000787C000-memory.dmpFilesize
304KB
-
memory/2360-163-0x0000000007020000-0x0000000007638000-memory.dmpFilesize
6.1MB
-
memory/2360-150-0x0000000000780000-0x00000000007A8000-memory.dmpFilesize
160KB
-
memory/2360-141-0x0000000000401000-0x00000000004F3000-memory.dmpFilesize
968KB
-
memory/2540-0-0x0000000000400000-0x00000000006B5000-memory.dmpFilesize
2.7MB
-
memory/4028-160-0x0000029F06130000-0x0000029F06188000-memory.dmpFilesize
352KB
-
memory/4028-172-0x0000029F23D40000-0x0000029F23D4A000-memory.dmpFilesize
40KB