Malware Analysis Report

2024-09-11 03:50

Sample ID 240608-qkd9zsbh7y
Target Clutt3.5.exe
SHA256 57e542f11f189ba338c74406fb48ca0091279e66d2e0491e9e7c9a6c61d66b6d
Tags
bootkit discovery evasion exploit persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

57e542f11f189ba338c74406fb48ca0091279e66d2e0491e9e7c9a6c61d66b6d

Threat Level: Likely malicious

The file Clutt3.5.exe was found to be: Likely malicious.

Malicious Activity Summary

bootkit discovery evasion exploit persistence

Disables RegEdit via registry modification

Possible privilege escalation attempt

Disables Task Manager via registry modification

Modifies file permissions

Writes to the Master Boot Record (MBR)

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Opens file in notepad (likely ransom note)

Suspicious use of SetWindowsHookEx

Suspicious use of SendNotifyMessage

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious behavior: AddClipboardFormatListener

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-08 13:18

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 13:18

Reported

2024-06-08 13:21

Platform

win7-20240508-en

Max time kernel

149s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe"

Signatures

Disables RegEdit via registry modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A

Disables Task Manager via registry modification

evasion

Possible privilege escalation attempt

exploit
Description Indicator Process Target
N/A N/A C:\Windows\system32\takeown.exe N/A
N/A N/A C:\Windows\system32\icacls.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\icacls.exe N/A
N/A N/A C:\Windows\system32\takeown.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Debug\WIA\wiatrace.log C:\Windows\system32\mspaint.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\play C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\play\command C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\play\command\ = "\"%ProgramFiles(x86)%\\Windows Media Player\\wmplayer.exe\" /Play \"%L\"" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\raw_auto_file\shell\edit C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.raw\ = "raw_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\open C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\raw_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\raw_auto_file\shell\edit\command\ = "\"%systemroot%\\system32\\mspaint.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\open\command\ = "\"%ProgramFiles(x86)%\\Windows Media Player\\wmplayer.exe\" /Open \"%L\"" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.raw C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.vsdx\ = "vsdx_auto_file" C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\raw_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\open\command C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\ = "Play" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\raw_auto_file\shell\edit\command C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\play\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9991" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\raw_auto_file C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.vsdx C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\vsdx_auto_file\shell\play\ = "&Play" C:\Windows\system32\rundll32.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\takeown.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1728 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe C:\Windows\System32\cmd.exe
PID 1728 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe C:\Windows\System32\cmd.exe
PID 1728 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe C:\Windows\System32\cmd.exe
PID 2660 wrote to memory of 2732 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 2660 wrote to memory of 2732 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 2660 wrote to memory of 2732 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\takeown.exe
PID 2660 wrote to memory of 2736 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 2660 wrote to memory of 2736 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 2660 wrote to memory of 2736 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\icacls.exe
PID 2392 wrote to memory of 2172 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\mspaint.exe
PID 2392 wrote to memory of 2172 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\mspaint.exe
PID 2392 wrote to memory of 2172 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\mspaint.exe
PID 2680 wrote to memory of 548 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 2680 wrote to memory of 548 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 2680 wrote to memory of 548 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 2680 wrote to memory of 548 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Windows Media Player\wmplayer.exe
PID 548 wrote to memory of 112 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Program Files (x86)\Windows Media Player\setup_wm.exe
PID 548 wrote to memory of 112 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Program Files (x86)\Windows Media Player\setup_wm.exe
PID 548 wrote to memory of 112 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Program Files (x86)\Windows Media Player\setup_wm.exe
PID 548 wrote to memory of 112 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Program Files (x86)\Windows Media Player\setup_wm.exe
PID 548 wrote to memory of 112 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Program Files (x86)\Windows Media Player\setup_wm.exe
PID 548 wrote to memory of 112 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Program Files (x86)\Windows Media Player\setup_wm.exe
PID 548 wrote to memory of 112 N/A C:\Program Files (x86)\Windows Media Player\wmplayer.exe C:\Program Files (x86)\Windows Media Player\setup_wm.exe
PID 2436 wrote to memory of 1584 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 2436 wrote to memory of 1584 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 2436 wrote to memory of 1584 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 2436 wrote to memory of 1584 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe

"C:\Users\Admin\AppData\Local\Temp\Clutt3.5.exe"

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32\drivers && icacls C:\Windows\System32\drivers /grant "%username%:F" && exit

C:\Windows\system32\takeown.exe

takeown /f C:\Windows\System32\drivers

C:\Windows\system32\icacls.exe

icacls C:\Windows\System32\drivers /grant "Admin:F"

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\CopyUndo.vsdx

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\CopyUndo.vsdx

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\FormatSelect.raw

C:\Windows\system32\wbem\WMIADAP.EXE

wmiadap.exe /F /T

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\PushFormat.ex_

C:\Program Files\VideoLAN\VLC\vlc.exe

"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ExitUnregister.aif"

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\AddDismount.ini

C:\Windows\system32\mspaint.exe

"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\FormatSelect.raw"

C:\Program Files (x86)\Windows Media Player\wmplayer.exe

"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\Desktop\CopyUndo.vsdx"

C:\Program Files (x86)\Windows Media Player\setup_wm.exe

"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\Desktop\CopyUndo.vsdx"

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\CopyUndo.vsdx"

Network

Country Destination Domain Proto
US 8.8.8.8:53 redir.metaservices.microsoft.com udp
US 2.17.251.24:80 redir.metaservices.microsoft.com tcp
US 8.8.8.8:53 onlinestores.metaservices.microsoft.com udp
US 2.17.251.92:80 onlinestores.metaservices.microsoft.com tcp

Files

memory/1728-0-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

memory/1728-1-0x0000000000860000-0x00000000008A6000-memory.dmp

memory/1728-2-0x0000000000140000-0x0000000000186000-memory.dmp

memory/1728-3-0x0000000000200000-0x0000000000206000-memory.dmp

memory/1728-4-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

memory/1728-5-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

memory/1728-6-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

memory/3004-13-0x000007FEF2880000-0x000007FEF28B4000-memory.dmp

memory/3004-12-0x000000013FD80000-0x000000013FE78000-memory.dmp

memory/3004-14-0x000007FEF25C0000-0x000007FEF2876000-memory.dmp

memory/3004-17-0x000007FEF23E0000-0x000007FEF23F1000-memory.dmp

memory/3004-18-0x000007FEF23C0000-0x000007FEF23D7000-memory.dmp

memory/3004-16-0x000007FEF7060000-0x000007FEF7077000-memory.dmp

memory/3004-19-0x000007FEF23A0000-0x000007FEF23B1000-memory.dmp

memory/3004-15-0x000007FEF7B60000-0x000007FEF7B78000-memory.dmp

memory/3004-20-0x000007FEF2380000-0x000007FEF239D000-memory.dmp

memory/3004-21-0x000007FEF2360000-0x000007FEF2371000-memory.dmp

memory/3004-22-0x000007FEF2150000-0x000007FEF235B000-memory.dmp

memory/3004-23-0x000007FEEE060000-0x000007FEEF110000-memory.dmp

memory/3004-27-0x000007FEF1FE0000-0x000007FEF1FF1000-memory.dmp

memory/3004-28-0x000007FEF1FC0000-0x000007FEF1FD1000-memory.dmp

memory/3004-29-0x000007FEF1FA0000-0x000007FEF1FB1000-memory.dmp

memory/3004-26-0x000007FEF20B0000-0x000007FEF20C8000-memory.dmp

memory/3004-30-0x000007FEF2090000-0x000007FEF20AB000-memory.dmp

memory/3004-31-0x000007FEF2070000-0x000007FEF2081000-memory.dmp

memory/3004-32-0x000007FEF2050000-0x000007FEF2068000-memory.dmp

memory/3004-33-0x000007FEF2020000-0x000007FEF2050000-memory.dmp

memory/3004-25-0x000007FEF20D0000-0x000007FEF20F1000-memory.dmp

memory/3004-24-0x000007FEF2100000-0x000007FEF2141000-memory.dmp

memory/3004-34-0x000007FEF1F30000-0x000007FEF1F97000-memory.dmp

memory/3004-35-0x000007FEF1A30000-0x000007FEF1AAC000-memory.dmp

memory/3004-36-0x000007FEF2000000-0x000007FEF2011000-memory.dmp

memory/3004-39-0x000007FEF19A0000-0x000007FEF19C4000-memory.dmp

memory/3004-40-0x000007FEF1980000-0x000007FEF1998000-memory.dmp

memory/3004-38-0x000007FEF1F00000-0x000007FEF1F28000-memory.dmp

memory/3004-37-0x000007FEF19D0000-0x000007FEF1A27000-memory.dmp

memory/3004-41-0x000007FEF0600000-0x000007FEF0623000-memory.dmp

memory/3004-42-0x000007FEF05E0000-0x000007FEF05F1000-memory.dmp

memory/3004-45-0x000007FEEF4E0000-0x000007FEEF4F1000-memory.dmp

memory/3004-44-0x000007FEEF780000-0x000007FEEF791000-memory.dmp

memory/3004-43-0x000007FEF05C0000-0x000007FEF05D2000-memory.dmp

memory/2172-117-0x000007FEEBDF0000-0x000007FEEBE3C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp00206.WMC\allservices.xml

MD5 df03e65b8e082f24dab09c57bc9c6241
SHA1 6b0dacbf38744c9a381830e6a5dc4c71bd7cedbf
SHA256 155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba
SHA512 ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99

C:\Users\Admin\AppData\Local\Temp\tmp01454.WMC\serviceinfo.xml

MD5 d58da90d6dc51f97cb84dfbffe2b2300
SHA1 5f86b06b992a3146cb698a99932ead57a5ec4666
SHA256 93acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad
SHA512 7f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636