Analysis

  • max time kernel
    43s
  • max time network
    62s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 10:35

Errors

Reason
Machine shutdown

General

  • Target

    a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe

  • Size

    2.9MB

  • MD5

    c9624e4e0c6bbc83b57f844d1dc44102

  • SHA1

    b0f8c247986305f8f1f83ea55bb04f6c748557ce

  • SHA256

    a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb

  • SHA512

    0417b2186a7f284a79016bd2cc473768293f2c262400439dac659b0a46cff82f72018f6fbbb3ba41b6d76eeff1f96110f8cd5c4739989dafb17942dd0e9a0d23

  • SSDEEP

    49152:jyKdaGFwF6TL+v1ndNBCT8HlTxD/S8jeHAleOOOOOOOOOOOOOOOOOOOOOOOOOOOU:XdzFwFYLGbNBCT6lV0ll

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

C2

xclient.fahrerscheinonlineholen.de:2489

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • telegram

    https://api.telegram.org/bot8174428401:AAHxlGtOg4tsy0J0kYm7h8822BuHfnk8vKQ/sendMessage?chat_id=1434988227

Extracted

Family

lumma

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

hgzuiajogwnqs

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/dDuwSpUA

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 3 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 1 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe
    "C:\Users\Admin\AppData\Local\Temp\a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe
        "C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4016
      • C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe
        "C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1924
      • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe
        "C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll, Main
            5⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2124
      • C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe
        "C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4004
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'vQeyqr1.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2028
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4972
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3936
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1384
      • C:\Users\Admin\AppData\Local\Temp\1019290001\e3de37265a.exe
        "C:\Users\Admin\AppData\Local\Temp\1019290001\e3de37265a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2488
      • C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe
        "C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1048
        • C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe
          "C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1340
      • C:\Users\Admin\AppData\Local\Temp\1019292001\16ef068384.exe
        "C:\Users\Admin\AppData\Local\Temp\1019292001\16ef068384.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\1019294001\5fa038eeb8.exe
        "C:\Users\Admin\AppData\Local\Temp\1019294001\5fa038eeb8.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4316
      • C:\Users\Admin\AppData\Local\Temp\1019295001\9e8e68cf3b.exe
        "C:\Users\Admin\AppData\Local\Temp\1019295001\9e8e68cf3b.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath "C:\obhgqahax"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1244
  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    6d42b6da621e8df5674e26b799c8e2aa

    SHA1

    ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

    SHA256

    5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

    SHA512

    53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    ef647504cf229a16d02de14a16241b90

    SHA1

    81480caca469857eb93c75d494828b81e124fda0

    SHA256

    47002672443e80410e55a0b6d683573ac27d70d803b57ee3c2818d1008669710

    SHA512

    a6d8c08c708eee6f7e700880ce79d2ba7cd0acbe8529d96e18f3e90ea1f3cf33fd801dd6eba6017cdd02769e968c48278c090c1deeac710124f79423cd862ee1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    aeceee3981c528bdc5e1c635b65d223d

    SHA1

    de9939ed37edca6772f5cdd29f6a973b36b7d31b

    SHA256

    b99f3c778a047e0348c92c16e0419fa29418d10d0fec61ad8283e92a094a2b32

    SHA512

    df48285f38e9284efdbd9f8d99e2e94a46fb5465953421ab88497b73ae06895b98ea5c98796560810a6f342c31a9112ea87e03cd3e267fd8518d7585f492a8fb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    8f780dca0550631f78b5b0ca243c93c1

    SHA1

    b8f314ee71465fac9eba4a9578e65a1fa0589514

    SHA256

    d000d5e4ea02edb0cc57c613887a5365a10567cceba59ee11c8ebf3c19dc21c2

    SHA512

    69ca4029da3b85410d3292d21960c097acb63367ed77f984cf768921c841dbade0d9a761f087da2c2e1bb56702094cafca43bbb72aba608fc7237452bf6d1e50

  • C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe

    Filesize

    2.5MB

    MD5

    87330f1877c33a5a6203c49075223b16

    SHA1

    55b64ee8b2d1302581ab1978e9588191e4e62f81

    SHA256

    98f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0

    SHA512

    7c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f

  • C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe

    Filesize

    1.2MB

    MD5

    545b933cac5def6ec43ca2cb6eac9d8e

    SHA1

    f2740a1062032cc280d54c4cfe6a1ff3c6ce1c76

    SHA256

    efce8cc629bb9f443613c7ec97b65020b514b9ee497d472ef24fed21bceb86c4

    SHA512

    f4853f10933edbf7df0ca6138bb423e5dfb18cf6431068a776a0c53ea226f176d263b9514066b88861360b161ba922b618f306f1936a95e1071fc70926418caa

  • C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe

    Filesize

    429KB

    MD5

    51ff79b406cb223dd49dd4c947ec97b0

    SHA1

    b9b0253480a1b6cbdd673383320fecae5efb3dce

    SHA256

    2e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e

    SHA512

    c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c

  • C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe

    Filesize

    88KB

    MD5

    07e410214a2aeb8f577e407154252f3c

    SHA1

    697fac558b66c0476c3f04d80764fa75eb6de77d

    SHA256

    12e340e551abbf8a61a6dd73d45c94e88aa217ceae070ba0748360d24c706114

    SHA512

    470b208122d6177e4635038418e4966a63725c7f9b21b4d41f3c89b953bae9a23e141424b358110de3a8d1624c125224a7471bb44ef7039c313d03e844a20ecc

  • C:\Users\Admin\AppData\Local\Temp\1019290001\e3de37265a.exe

    Filesize

    1.8MB

    MD5

    27c1f96d7e1b72b6817b6efeff037f90

    SHA1

    2972cc112fc7e20cbf5952abe07407b8c1fbb2a2

    SHA256

    aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d

    SHA512

    9a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32

  • C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe

    Filesize

    758KB

    MD5

    afd936e441bf5cbdb858e96833cc6ed3

    SHA1

    3491edd8c7caf9ae169e21fb58bccd29d95aefef

    SHA256

    c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

    SHA512

    928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

  • C:\Users\Admin\AppData\Local\Temp\1019292001\16ef068384.exe

    Filesize

    4.2MB

    MD5

    de977c9c79ceebdf86d4cb38408d7ce4

    SHA1

    2ffb19e7bc8109bb8033c1d6e25f4ae2fe49b3c6

    SHA256

    ad3fb64aaa0680e21de914b77e3502a6c82860f333fa3d2415cb9a7a93b9b893

    SHA512

    19067b298995a405ac3768b6586cd456598af7a9703551eccb1caf8c30c1e126abf9d4f80001f1fcd1c201dd0cf30f99cdd77ef5b5e2feffbcdd7887e29932b0

  • C:\Users\Admin\AppData\Local\Temp\1019294001\5fa038eeb8.exe

    Filesize

    1.3MB

    MD5

    669ed3665495a4a52029ff680ec8eba9

    SHA1

    7785e285365a141e307931ca4c4ef00b7ecc8986

    SHA256

    2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

    SHA512

    bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

  • C:\Users\Admin\AppData\Local\Temp\1019295001\9e8e68cf3b.exe

    Filesize

    21KB

    MD5

    04f57c6fb2b2cd8dcc4b38e4a93d4366

    SHA1

    61770495aa18d480f70b654d1f57998e5bd8c885

    SHA256

    51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

    SHA512

    53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rqrjihxf.yjd.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

    Filesize

    2.9MB

    MD5

    c9624e4e0c6bbc83b57f844d1dc44102

    SHA1

    b0f8c247986305f8f1f83ea55bb04f6c748557ce

    SHA256

    a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb

    SHA512

    0417b2186a7f284a79016bd2cc473768293f2c262400439dac659b0a46cff82f72018f6fbbb3ba41b6d76eeff1f96110f8cd5c4739989dafb17942dd0e9a0d23

  • C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll

    Filesize

    124KB

    MD5

    7fe5b933ed9391ea24647479c80e904e

    SHA1

    963721e46b8056e2e883c598e95d7daa7bdf8d9b

    SHA256

    2e12355cb9b11c923dc06f195399d678bc46680e982856d9405f64e7563fe8b3

    SHA512

    82d92d0c5155fff5ce97099cb9e78422ff328e0c516fbab7634e624215366c2191ec6ff6fe8d939268275c6770accb208af7ac69c3cc13c9188a49ef41339bb0

  • memory/436-534-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB

  • memory/436-1265-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB

  • memory/1244-1462-0x0000000005DB0000-0x0000000005DFC000-memory.dmp

    Filesize

    304KB

  • memory/1244-1487-0x00000000070B0000-0x00000000070CA000-memory.dmp

    Filesize

    104KB

  • memory/1244-1459-0x00000000058A0000-0x0000000005BF4000-memory.dmp

    Filesize

    3.3MB

  • memory/1244-1448-0x0000000005640000-0x00000000056A6000-memory.dmp

    Filesize

    408KB

  • memory/1244-1449-0x0000000005730000-0x0000000005796000-memory.dmp

    Filesize

    408KB

  • memory/1244-1447-0x0000000004DC0000-0x0000000004DE2000-memory.dmp

    Filesize

    136KB

  • memory/1244-1446-0x0000000004F20000-0x0000000005548000-memory.dmp

    Filesize

    6.2MB

  • memory/1244-1445-0x00000000047B0000-0x00000000047E6000-memory.dmp

    Filesize

    216KB

  • memory/1244-1484-0x0000000006F50000-0x0000000006F6E000-memory.dmp

    Filesize

    120KB

  • memory/1244-1461-0x0000000005D80000-0x0000000005D9E000-memory.dmp

    Filesize

    120KB

  • memory/1244-1474-0x000000006FED0000-0x000000006FF1C000-memory.dmp

    Filesize

    304KB

  • memory/1244-1486-0x00000000076F0000-0x0000000007D6A000-memory.dmp

    Filesize

    6.5MB

  • memory/1244-1488-0x0000000007120000-0x000000000712A000-memory.dmp

    Filesize

    40KB

  • memory/1244-1490-0x0000000007330000-0x00000000073C6000-memory.dmp

    Filesize

    600KB

  • memory/1244-1473-0x0000000006350000-0x0000000006382000-memory.dmp

    Filesize

    200KB

  • memory/1244-1491-0x00000000072B0000-0x00000000072C1000-memory.dmp

    Filesize

    68KB

  • memory/1244-1492-0x00000000072E0000-0x00000000072EE000-memory.dmp

    Filesize

    56KB

  • memory/1244-1485-0x0000000006F70000-0x0000000007013000-memory.dmp

    Filesize

    652KB

  • memory/1244-1493-0x00000000072F0000-0x0000000007304000-memory.dmp

    Filesize

    80KB

  • memory/1244-1494-0x00000000073F0000-0x000000000740A000-memory.dmp

    Filesize

    104KB

  • memory/1920-1294-0x0000000000FD0000-0x0000000000FEC000-memory.dmp

    Filesize

    112KB

  • memory/1920-1471-0x000000001E6F0000-0x000000001E708000-memory.dmp

    Filesize

    96KB

  • memory/1920-1468-0x000000001CE90000-0x000000001CEAC000-memory.dmp

    Filesize

    112KB

  • memory/1924-125-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-114-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-78-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-74-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-116-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-72-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-70-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-68-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-98-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-67-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-76-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-82-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-86-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-88-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-1263-0x0000000005930000-0x000000000597C000-memory.dmp

    Filesize

    304KB

  • memory/1924-1262-0x0000000005990000-0x0000000005A1A000-memory.dmp

    Filesize

    552KB

  • memory/1924-92-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-94-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-96-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-63-0x0000000000CE0000-0x0000000000E14000-memory.dmp

    Filesize

    1.2MB

  • memory/1924-64-0x00000000056C0000-0x00000000057D8000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-100-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-102-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-104-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-106-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-108-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-110-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-65-0x0000000005D90000-0x0000000006334000-memory.dmp

    Filesize

    5.6MB

  • memory/1924-112-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-66-0x0000000005890000-0x0000000005922000-memory.dmp

    Filesize

    584KB

  • memory/1924-80-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-84-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-120-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-90-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-123-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-118-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-127-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/1924-129-0x00000000056C0000-0x00000000057D3000-memory.dmp

    Filesize

    1.1MB

  • memory/2488-1374-0x0000000000ED0000-0x000000000136A000-memory.dmp

    Filesize

    4.6MB

  • memory/2488-1310-0x0000000000ED0000-0x000000000136A000-memory.dmp

    Filesize

    4.6MB

  • memory/2560-1444-0x0000000000010000-0x000000000001C000-memory.dmp

    Filesize

    48KB

  • memory/2972-2-0x0000000000DD1000-0x0000000000DFF000-memory.dmp

    Filesize

    184KB

  • memory/2972-1-0x00000000774D4000-0x00000000774D6000-memory.dmp

    Filesize

    8KB

  • memory/2972-18-0x0000000000DD0000-0x00000000010F2000-memory.dmp

    Filesize

    3.1MB

  • memory/2972-4-0x0000000000DD0000-0x00000000010F2000-memory.dmp

    Filesize

    3.1MB

  • memory/2972-3-0x0000000000DD0000-0x00000000010F2000-memory.dmp

    Filesize

    3.1MB

  • memory/2972-0-0x0000000000DD0000-0x00000000010F2000-memory.dmp

    Filesize

    3.1MB

  • memory/3000-1398-0x00000000009D0000-0x000000000165B000-memory.dmp

    Filesize

    12.5MB

  • memory/3000-1470-0x00000000009D0000-0x000000000165B000-memory.dmp

    Filesize

    12.5MB

  • memory/4004-1312-0x000001A67F6F0000-0x000001A67F712000-memory.dmp

    Filesize

    136KB

  • memory/4016-44-0x0000000000640000-0x00000000008D0000-memory.dmp

    Filesize

    2.6MB

  • memory/5068-22-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB

  • memory/5068-20-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB

  • memory/5068-16-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB

  • memory/5068-19-0x00000000006B1000-0x00000000006DF000-memory.dmp

    Filesize

    184KB

  • memory/5068-21-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB

  • memory/5068-43-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB

  • memory/5068-121-0x00000000006B0000-0x00000000009D2000-memory.dmp

    Filesize

    3.1MB