Resubmissions

23-11-2024 15:06

241123-sgspbatkbr 10

Analysis

  • max time kernel
    299s
  • max time network
    279s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 15:06

General

  • Target

    ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe

  • Size

    783KB

  • MD5

    e33af9e602cbb7ac3634c2608150dd18

  • SHA1

    8f6ec9bc137822bc1ddf439c35fedc3b847ce3fe

  • SHA256

    8c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75

  • SHA512

    2ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418

  • SSDEEP

    12288:0E9uQlDTt8c/wtocu3HhGSrIilDhlPnRq/iI7UOvqF8dtbcZl36VBqWPH:FuqD2cYWzBGZohlE/zUD8/bgl2qW/

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
    "C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\28463\DPBJ.exe
      "C:\Windows\system32\28463\DPBJ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3708
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb905d46f8,0x7ffb905d4708,0x7ffb905d4718
      2⤵
        PID:4472
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
        2⤵
          PID:3424
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3592
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
          2⤵
            PID:4332
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
            2⤵
              PID:5000
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
              2⤵
                PID:3572
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                2⤵
                  PID:4800
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:1
                  2⤵
                    PID:2972
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:8
                    2⤵
                      PID:4344
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:552
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                      2⤵
                        PID:344
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                        2⤵
                          PID:664
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                          2⤵
                            PID:2264
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5608 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2400
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:1
                            2⤵
                              PID:1444
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:1
                              2⤵
                                PID:5020
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9389287851928785943,7024352793626848904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                                2⤵
                                  PID:3076
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3460
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3348

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    7de1bbdc1f9cf1a58ae1de4951ce8cb9

                                    SHA1

                                    010da169e15457c25bd80ef02d76a940c1210301

                                    SHA256

                                    6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                                    SHA512

                                    e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4aa4447c-edc8-428e-8369-6c8a9f56fabb.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    72864b60f15833aeb911fb013429418f

                                    SHA1

                                    a418bb19d80eeffc7bea749879925fc4eec7140d

                                    SHA256

                                    3501c0b26c95d8f58b7c873afb3fb68cf884a103fed593bbf4e9bb0d9ed7b90d

                                    SHA512

                                    605f0614e4162d6bf465b9bebb2cee1b9a1338d42a7826549dbb640ab1cfd344dc87465f88bd48a3bae3465fa1dec18d804a82b8268a03bdb3202882dec345c2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    180B

                                    MD5

                                    00a455d9d155394bfb4b52258c97c5e5

                                    SHA1

                                    2761d0c955353e1982a588a3df78f2744cfaa9df

                                    SHA256

                                    45a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed

                                    SHA512

                                    9553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    129724bc64f47d26bcd586e0fae9cc05

                                    SHA1

                                    be037b28c532d6643e5da2134f068a116b935621

                                    SHA256

                                    832b37fed6a2980c58060d5f3eb9dd867f4d9435613273264cae7cdd6007b9fd

                                    SHA512

                                    e8594a44fa9e9fa3a32e41d6143351e08151a49753bf48ada0cb54d6519ec07f15d5debf41af370992a9353437e2ac80092e42588c3340ec54da4bf1aacb500b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    bf36dbabcd9fd98c199a3c6f70169063

                                    SHA1

                                    f618f6bef8d643991ed08efe87f6db49c54dbc33

                                    SHA256

                                    6822890c0f2d7390ba0d7861673aa3d4b36dae5e1f717e68fb3ba32ec596ae03

                                    SHA512

                                    13df00d365bf8bdb2698fe004321ceb9de23a07b946dd626b5645cb7f925579072d78b12a009457eebe306b840c49cfea34874a1c4e9b06e62c08f34a68248e5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    6926a087117fdec58f9cf0b66897e9b5

                                    SHA1

                                    8fa2c76e21bf3815e4c3d0d786c32f671dc9352a

                                    SHA256

                                    3ec28c94ad134237b924109c410169f904e5a6f3e11a72bb02f6198f27612e07

                                    SHA512

                                    41d3b7a9ad2549b9481421c5f014e9d5b27bf3cf366b3205c970b0b3ef42ffc12195e1c5c8fe18e2486a8f33728e1462c3b4ea0a77fcb2959d0fa74497924c65

                                  • C:\Users\Admin\AppData\Local\Temp\@65CE.tmp

                                    Filesize

                                    4KB

                                    MD5

                                    d73d89b1ea433724795b3d2b524f596c

                                    SHA1

                                    213514f48ece9f074266b122ee2d06e842871c8c

                                    SHA256

                                    8aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6

                                    SHA512

                                    8b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41

                                  • C:\Windows\SysWOW64\28463\AKV.exe

                                    Filesize

                                    457KB

                                    MD5

                                    97eee85d1aebf93d5d9400cb4e9c771b

                                    SHA1

                                    26fa2bf5fce2d86b891ac0741a6999bff31397de

                                    SHA256

                                    30df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24

                                    SHA512

                                    8cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6

                                  • C:\Windows\SysWOW64\28463\DPBJ.001

                                    Filesize

                                    492B

                                    MD5

                                    7a0f1fa20fd40c047b07379da5290f2b

                                    SHA1

                                    e0fb8305de6b661a747d849edb77d95959186fca

                                    SHA256

                                    b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6

                                    SHA512

                                    bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346

                                  • C:\Windows\SysWOW64\28463\DPBJ.006

                                    Filesize

                                    8KB

                                    MD5

                                    35b24c473bdcdb4411e326c6c437e8ed

                                    SHA1

                                    ec1055365bc2a66e52de2d66d24d742863c1ce3d

                                    SHA256

                                    4530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617

                                    SHA512

                                    32722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de

                                  • C:\Windows\SysWOW64\28463\DPBJ.007

                                    Filesize

                                    5KB

                                    MD5

                                    a8e19de6669e831956049685225058a8

                                    SHA1

                                    6d2546d49d92b18591ad4fedbc92626686e7e979

                                    SHA256

                                    34856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564

                                    SHA512

                                    5c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8

                                  • C:\Windows\SysWOW64\28463\DPBJ.009

                                    Filesize

                                    1.6MB

                                    MD5

                                    6ac950da34ec0c0c451f0dbb083b3e96

                                    SHA1

                                    6c66786307e506b4b20267532a2868e8f13a463a

                                    SHA256

                                    d2523b967f71c87150c815c3d325f39d9e3ea465ea6e60640e3a791aa2f62c85

                                    SHA512

                                    a6d2e1ae407f5461506880bbf57a7d4c2cbe085bb750914f6cfa51733a8d21d70fdc749e91984ddf42b29e8ebb732bbe3498721d2b9864d941fec536cd340e43

                                  • C:\Windows\SysWOW64\28463\DPBJ.exe

                                    Filesize

                                    646KB

                                    MD5

                                    b863a9ac3bcdcde2fd7408944d5bf976

                                    SHA1

                                    4bd106cd9aefdf2b51f91079760855e04f73f3b0

                                    SHA256

                                    0fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0

                                    SHA512

                                    4b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a

                                  • C:\Windows\SysWOW64\28463\Nov_23_2024__15_08_24.jpg

                                    Filesize

                                    117KB

                                    MD5

                                    aacb984180db9772bb0fce84bcf26b79

                                    SHA1

                                    4f149847c58c3d642a1755ab9991663eaa3af9c1

                                    SHA256

                                    1725e510b568d6afba085c8de14b4bd6f1de41f89d2db86da05dbf50e12e44b0

                                    SHA512

                                    2809b394cda0e9e823952da237c0f2883d0e0ac1c59484939a0634b8b0ab4103dc71431877e7298ff4bd58d33963caadc377e6bfeb69675da6be35aa837a27eb

                                  • C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_01.jpg

                                    Filesize

                                    36KB

                                    MD5

                                    e31de56674f89ebb45c39318136bb538

                                    SHA1

                                    b706e44cdd35a29394785af137e4c5584547ccd0

                                    SHA256

                                    9e8441137afa7d2e000232ea0f390018bce59519f785bb15e3e185d461913e79

                                    SHA512

                                    4b64ecf1539b3ac3004af72760f56f528d4fc82eb70384f5384b57535b2915b373644005c2946750ed125babb625c95c5521ffb91406805671773bb5439d1b15

                                  • C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_02.jpg

                                    Filesize

                                    36KB

                                    MD5

                                    e9a1caf3be50ec2a0ab393fe7a565baa

                                    SHA1

                                    7215ffbf0f3c1ae08385c1ec0fc236e79c3c2fb8

                                    SHA256

                                    881708b9eaacec24911b298b03d635bf1def910a6f6b28de90167f75966a73f4

                                    SHA512

                                    83b33c4c79d1fc18f38a043f07e3f04889b9e8f19d98a540ec92a06fe43bdf08e7b4773aef3d08f9920b5f129abe04f0e0da1ab5fdd0703ce152c5c4a7443faa

                                  • C:\Windows\SysWOW64\28463\Nov_23_2024__15_10_07.jpg

                                    Filesize

                                    142KB

                                    MD5

                                    bc05abc1c4861610327677e86dd7ddc4

                                    SHA1

                                    46ca3800d7f24f4c7fbb71e0bba976234a3905fd

                                    SHA256

                                    3808af06251a0c3bfebec6b47b1e99661d9954939141fb9efdffadac8330215c

                                    SHA512

                                    04240ce94f89c498dd2cea141896be16546929ae69b2cb1d0dea48b73183c0c6f4947e9d167f9f10894c67152ed0947199063d0e5fe0a6e125c27d46637cfb47

                                  • C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_15.jpg

                                    Filesize

                                    145KB

                                    MD5

                                    2c71a6b7e0628992ae4b1a4fcabda519

                                    SHA1

                                    ca8d590c2045a95ea0a656512d487575e8c93d73

                                    SHA256

                                    ceb5d9fdea84d3f50b96a8e7cc327ed11b03321065e7b5f365c1b5f40351bf93

                                    SHA512

                                    4a881bf721f78f90f60e246a07331a8d1f19fb435bca5a5398e7cf45123d313d7e5f329c1a252bb98fa795619cb267759dd2ba74362bfe4ea3b285f14a40af66

                                  • C:\Windows\SysWOW64\28463\Nov_23_2024__15_12_28.jpg

                                    Filesize

                                    142KB

                                    MD5

                                    58deff3f8e82aa11123031c06d062b09

                                    SHA1

                                    d5089454179a2baaa2f0cec088caf592da096482

                                    SHA256

                                    cb22656c9abc225cb7bc141e0b57a9fd09eff25519cb3993572c9043bd77619d

                                    SHA512

                                    e7079fef0de6fd8918f03cd049fa3d06ac357b1a3a295a31aeba2a2ed18d1b34a4df4ad45f9fd7af89e51c2d80e3d47d082967d14d9beac11f87309ac9d6ec3a

                                  • C:\Windows\SysWOW64\28463\key.bin

                                    Filesize

                                    106B

                                    MD5

                                    639d75ab6799987dff4f0cf79fa70c76

                                    SHA1

                                    be2678476d07f78bb81e8813c9ee2bfff7cc7efb

                                    SHA256

                                    fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98

                                    SHA512

                                    4b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2

                                  • memory/3708-49-0x00000000022E0000-0x000000000233A000-memory.dmp

                                    Filesize

                                    360KB

                                  • memory/3708-851-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-33-0x00000000006B0000-0x00000000006B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-51-0x00000000033A0000-0x00000000033A1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-34-0x0000000003370000-0x0000000003371000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-144-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-379-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-32-0x0000000000690000-0x0000000000691000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-35-0x00000000033B0000-0x00000000033B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-23-0x00000000024F0000-0x00000000024F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-24-0x0000000002550000-0x0000000002551000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-25-0x0000000002540000-0x0000000002541000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-26-0x0000000002560000-0x0000000002561000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-27-0x0000000002520000-0x0000000002521000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-716-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-47-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-1061-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-28-0x00000000024D0000-0x00000000024D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-29-0x0000000003360000-0x0000000003361000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-1286-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-1470-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-1724-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-1948-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-1971-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-30-0x0000000003350000-0x0000000003353000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/3708-31-0x00000000033A0000-0x00000000033A1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3708-21-0x00000000022E0000-0x000000000233A000-memory.dmp

                                    Filesize

                                    360KB

                                  • memory/3708-20-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3708-2449-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB