Analysis

  • max time kernel
    18s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-04-2021 10:03

General

  • Target

    Pendants (2).exe

  • Size

    24KB

  • MD5

    fd27f0d132c4cfe0b8a63480d297007c

  • SHA1

    2132be80f51eb8044e330bbe013970649229b18a

  • SHA256

    7418a63befca526ff62f4a9230ecd45d82585e2612d0bf4c5baf14d3f4d984a4

  • SHA512

    c326bec33bdc411f1701ec070d48b1acd789dc6ed83c561472d5dca04faf21e7d8a022559d8dce960aba91f6d9d1479d544ac44fe4b8594504e734885c20a8ca

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    Smtp.atlassecuritys.com
  • Port:
    587
  • Username:
    holyman@atlassecuritys.com
  • Password:
    }I9@Yru*QfuS

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Windows security bypass 2 TTPs
  • AgentTesla Payload 4 IoCs
  • Nirsoft 14 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe
    "C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Windows security modification
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe" /SpecialRun 4101d8 1540
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:428
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1456
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1056
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:984
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1460
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1224
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1616
      • C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
        3⤵
          PID:2404
          • C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
            "C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe" /SpecialRun 4101d8 2404
            4⤵
              PID:2476
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe" -Force
            3⤵
              PID:2612
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe" -Force
              3⤵
                PID:2664
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\BZctRAPq\svchost.exe" -Force
                3⤵
                  PID:2728
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe" -Force
                  3⤵
                    PID:2808
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\BZctRAPq\svchost.exe" -Force
                    3⤵
                      PID:2880
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c timeout 1
                      3⤵
                        PID:2380
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout 1
                          4⤵
                          • Delays execution with timeout.exe
                          PID:1580
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe"
                        3⤵
                          PID:2484
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\BZctRAPq\svchost.exe" -Force
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:544
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe" -Force
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2064
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\BZctRAPq\svchost.exe" -Force
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2100
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c timeout 1
                        2⤵
                          PID:2228
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout 1
                            3⤵
                            • Delays execution with timeout.exe
                            PID:2284
                        • C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe
                          "C:\Users\Admin\AppData\Local\Temp\Pendants (2).exe"
                          2⤵
                            PID:2288
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 1636
                            2⤵
                            • Program crash
                            PID:1592

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Persistence

                        Modify Existing Service

                        1
                        T1031

                        Defense Evasion

                        Modify Registry

                        3
                        T1112

                        Disabling Security Tools

                        3
                        T1089

                        Discovery

                        System Information Discovery

                        1
                        T1082

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_3bf4f350-86fe-486e-8b87-41ab96d0ad9c
                          MD5

                          b6d38f250ccc9003dd70efd3b778117f

                          SHA1

                          d5a17c02cac698d4f0a4a9b7d71db2aa19e3f18a

                          SHA256

                          4de9d7b5ccab7b67ca8efc83084c7ee6e5e872b7216ed4683bc5da950bf41265

                          SHA512

                          67d8195836b7f280d3f9219fd0f58276342e55d5dfdd8a4c54355030d96685d73f1b2b6da0eb39322ec7c3a1d1c5ef06b52d22646cea30a96f822de1800d31e9

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4408bb97-19ee-4815-b02c-5a0939dddad8
                          MD5

                          df44874327d79bd75e4264cb8dc01811

                          SHA1

                          1396b06debed65ea93c24998d244edebd3c0209d

                          SHA256

                          55de642c5c9e436ec01c57004dae797022442c3245daf7162d19a5585f221181

                          SHA512

                          95dc9298b8db059bbe746f67e6a7f8515781c7053cc60c01532e47623a996be7e1bd23d1bd8f5f2045adff27454f44930d503c15b695690088841cedbd2a06c3

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_644b5728-e9b5-45ab-9104-7136ec814422
                          MD5

                          be4d72095faf84233ac17b94744f7084

                          SHA1

                          cc78ce5b9c57573bd214a8f423ee622b00ebb1ec

                          SHA256

                          b0d72c5c22e57913476ac8fc686a4593f137c6667d5094522c0a0685dabd7adc

                          SHA512

                          43856e9b1032b8690ceea810c931bed3655e9190414bb220fb6afc136f31b8335e07604dffb28405d4006f266a54cff424c527d29924b1b732c9647a3252b097

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6532a425-51ae-4577-837f-c6e09d9fcfcf
                          MD5

                          75a8da7754349b38d64c87c938545b1b

                          SHA1

                          5c28c257d51f1c1587e29164cc03ea880c21b417

                          SHA256

                          bf08151c174b5d00c9dbc7907b2c6a01b4be76bfa3afce1e8bd98a04ad833c96

                          SHA512

                          798797bc74c56c874e9a5fdcb0157c04e37a1b3cce285ef064b01bceef8cec45f11a5198918c6c647220b62883606b5e12e3cca3ea369f3a66e69dea6e15f643

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_69670b6c-d49a-42a9-993a-10d18807f7c6
                          MD5

                          5e3c7184a75d42dda1a83606a45001d8

                          SHA1

                          94ca15637721d88f30eb4b6220b805c5be0360ed

                          SHA256

                          8278033a65d1ff48be4d86e11f87930d187692f59f8bf2f0a9d170de285afb59

                          SHA512

                          fae99b6e9b106e0f1c30aa4082b25ae1ad643455c1295c2c16ad534e3e611b9b08492353ffe1af1cfdddc9b2b7c330747a64012c45e62b8f4a4982dcc214e05b

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_e9f9468a-8cbd-4472-b808-e8b3772f4134
                          MD5

                          02ff38ac870de39782aeee04d7b48231

                          SHA1

                          0390d39fa216c9b0ecdb38238304e518fb2b5095

                          SHA256

                          fbd66a9baf753db31b8de23f2d51b67f8676687503653103080c45b16f1dc876

                          SHA512

                          24a1ff76ee42ff7a5ea42843928c4df07b06178f7781cd840e1e086e88735d81506eb67259ff1e6ce5aaa7c5baea03886da265eb7e025ff4dc4c4b5f8cd3e341

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
                          MD5

                          322220e5ad0c8e41565312df89110172

                          SHA1

                          6b213280377eb82971442ba6afa73d2f271a3ca2

                          SHA256

                          1c407fb94e9c5bd3a6863a662419be25a2f5f6322888e17feaa53c6a86028f40

                          SHA512

                          fe9f4b74b34608e8fe4dff6f2a29a30922bf506037ae8317dda66af1c07306465eba3a4720e84377269bf8181652b6b1e76f28c404b3c811c06b1c8854715a4a

                        • C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                          MD5

                          47f7e755daa6f57b4c7d973c40a7e48d

                          SHA1

                          6b2bc54631915fd9bba3a1d35ccf666353e0cd67

                          SHA256

                          49c184aa46c6334cbcd1c98ddf1cdd6a3a5d528b9661bc8633509eb6fabdc7de

                          SHA512

                          854d306115a6b3e13f6d66dae21c929a4cee851e0680de0ac0a6dafc02b763aa31feacd7361cf1bbc64be945dce8cf79c5080a989c0255198edc4775da62ad0a

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe
                          MD5

                          fd27f0d132c4cfe0b8a63480d297007c

                          SHA1

                          2132be80f51eb8044e330bbe013970649229b18a

                          SHA256

                          7418a63befca526ff62f4a9230ecd45d82585e2612d0bf4c5baf14d3f4d984a4

                          SHA512

                          c326bec33bdc411f1701ec070d48b1acd789dc6ed83c561472d5dca04faf21e7d8a022559d8dce960aba91f6d9d1479d544ac44fe4b8594504e734885c20a8ca

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe
                          MD5

                          fd27f0d132c4cfe0b8a63480d297007c

                          SHA1

                          2132be80f51eb8044e330bbe013970649229b18a

                          SHA256

                          7418a63befca526ff62f4a9230ecd45d82585e2612d0bf4c5baf14d3f4d984a4

                          SHA512

                          c326bec33bdc411f1701ec070d48b1acd789dc6ed83c561472d5dca04faf21e7d8a022559d8dce960aba91f6d9d1479d544ac44fe4b8594504e734885c20a8ca

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe
                          MD5

                          fd27f0d132c4cfe0b8a63480d297007c

                          SHA1

                          2132be80f51eb8044e330bbe013970649229b18a

                          SHA256

                          7418a63befca526ff62f4a9230ecd45d82585e2612d0bf4c5baf14d3f4d984a4

                          SHA512

                          c326bec33bdc411f1701ec070d48b1acd789dc6ed83c561472d5dca04faf21e7d8a022559d8dce960aba91f6d9d1479d544ac44fe4b8594504e734885c20a8ca

                        • \Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Local\Temp\96e8fbd8-1364-4d7e-8490-0d9bce3cd096\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Local\Temp\c9787544-40d9-4003-9d1d-92689c2fc726\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iKGwOHKIun.exe
                          MD5

                          fd27f0d132c4cfe0b8a63480d297007c

                          SHA1

                          2132be80f51eb8044e330bbe013970649229b18a

                          SHA256

                          7418a63befca526ff62f4a9230ecd45d82585e2612d0bf4c5baf14d3f4d984a4

                          SHA512

                          c326bec33bdc411f1701ec070d48b1acd789dc6ed83c561472d5dca04faf21e7d8a022559d8dce960aba91f6d9d1479d544ac44fe4b8594504e734885c20a8ca

                        • memory/428-15-0x0000000000000000-mapping.dmp
                        • memory/544-84-0x0000000004882000-0x0000000004883000-memory.dmp
                          Filesize

                          4KB

                        • memory/544-79-0x0000000004880000-0x0000000004881000-memory.dmp
                          Filesize

                          4KB

                        • memory/544-76-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/544-62-0x0000000000000000-mapping.dmp
                        • memory/984-21-0x0000000000000000-mapping.dmp
                        • memory/984-34-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
                          Filesize

                          4KB

                        • memory/984-60-0x0000000004AE2000-0x0000000004AE3000-memory.dmp
                          Filesize

                          4KB

                        • memory/984-31-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/984-46-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1056-95-0x0000000002860000-0x0000000002861000-memory.dmp
                          Filesize

                          4KB

                        • memory/1056-30-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1056-39-0x0000000004A40000-0x0000000004A41000-memory.dmp
                          Filesize

                          4KB

                        • memory/1056-69-0x0000000002680000-0x0000000002681000-memory.dmp
                          Filesize

                          4KB

                        • memory/1056-49-0x0000000004A02000-0x0000000004A03000-memory.dmp
                          Filesize

                          4KB

                        • memory/1056-19-0x0000000000000000-mapping.dmp
                        • memory/1056-47-0x0000000004A00000-0x0000000004A01000-memory.dmp
                          Filesize

                          4KB

                        • memory/1152-5-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1152-6-0x0000000004F00000-0x0000000004FAB000-memory.dmp
                          Filesize

                          684KB

                        • memory/1152-2-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1152-3-0x0000000000D60000-0x0000000000D61000-memory.dmp
                          Filesize

                          4KB

                        • memory/1224-63-0x00000000048C2000-0x00000000048C3000-memory.dmp
                          Filesize

                          4KB

                        • memory/1224-58-0x00000000048C0000-0x00000000048C1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1224-24-0x0000000000000000-mapping.dmp
                        • memory/1224-38-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1456-18-0x0000000000000000-mapping.dmp
                        • memory/1456-56-0x0000000004A92000-0x0000000004A93000-memory.dmp
                          Filesize

                          4KB

                        • memory/1456-131-0x00000000061B0000-0x00000000061B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1456-124-0x00000000061F0000-0x00000000061F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1456-33-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1456-123-0x00000000056B0000-0x00000000056B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1456-48-0x0000000004A90000-0x0000000004A91000-memory.dmp
                          Filesize

                          4KB

                        • memory/1456-142-0x0000000006290000-0x0000000006291000-memory.dmp
                          Filesize

                          4KB

                        • memory/1456-119-0x000000007EF30000-0x000000007EF31000-memory.dmp
                          Filesize

                          4KB

                        • memory/1456-117-0x0000000005630000-0x0000000005631000-memory.dmp
                          Filesize

                          4KB

                        • memory/1460-23-0x0000000000000000-mapping.dmp
                        • memory/1460-55-0x0000000002672000-0x0000000002673000-memory.dmp
                          Filesize

                          4KB

                        • memory/1460-45-0x0000000002670000-0x0000000002671000-memory.dmp
                          Filesize

                          4KB

                        • memory/1460-29-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1540-9-0x0000000000000000-mapping.dmp
                        • memory/1540-11-0x00000000760C1000-0x00000000760C3000-memory.dmp
                          Filesize

                          8KB

                        • memory/1580-206-0x0000000000000000-mapping.dmp
                        • memory/1592-204-0x0000000000000000-mapping.dmp
                        • memory/1616-57-0x0000000000C10000-0x0000000000C11000-memory.dmp
                          Filesize

                          4KB

                        • memory/1616-54-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1616-61-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1616-51-0x0000000000000000-mapping.dmp
                        • memory/2064-87-0x0000000004A42000-0x0000000004A43000-memory.dmp
                          Filesize

                          4KB

                        • memory/2064-64-0x0000000000000000-mapping.dmp
                        • memory/2064-82-0x0000000004A40000-0x0000000004A41000-memory.dmp
                          Filesize

                          4KB

                        • memory/2064-77-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2100-85-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2100-94-0x0000000004982000-0x0000000004983000-memory.dmp
                          Filesize

                          4KB

                        • memory/2100-93-0x0000000004980000-0x0000000004981000-memory.dmp
                          Filesize

                          4KB

                        • memory/2100-66-0x0000000000000000-mapping.dmp
                        • memory/2228-196-0x0000000000000000-mapping.dmp
                        • memory/2284-197-0x0000000000000000-mapping.dmp
                        • memory/2288-203-0x0000000004B70000-0x0000000004B71000-memory.dmp
                          Filesize

                          4KB

                        • memory/2288-215-0x0000000004B71000-0x0000000004B72000-memory.dmp
                          Filesize

                          4KB

                        • memory/2288-199-0x000000000043750E-mapping.dmp
                        • memory/2288-198-0x0000000000400000-0x000000000043C000-memory.dmp
                          Filesize

                          240KB

                        • memory/2288-200-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2288-201-0x0000000000400000-0x000000000043C000-memory.dmp
                          Filesize

                          240KB

                        • memory/2380-205-0x0000000000000000-mapping.dmp
                        • memory/2404-106-0x0000000000000000-mapping.dmp
                        • memory/2476-112-0x0000000000000000-mapping.dmp
                        • memory/2484-213-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2484-208-0x000000000043750E-mapping.dmp
                        • memory/2484-210-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2484-214-0x0000000004AE1000-0x0000000004AE2000-memory.dmp
                          Filesize

                          4KB

                        • memory/2612-134-0x0000000000000000-mapping.dmp
                        • memory/2612-161-0x0000000004900000-0x0000000004901000-memory.dmp
                          Filesize

                          4KB

                        • memory/2612-168-0x0000000004902000-0x0000000004903000-memory.dmp
                          Filesize

                          4KB

                        • memory/2612-146-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2664-167-0x0000000004752000-0x0000000004753000-memory.dmp
                          Filesize

                          4KB

                        • memory/2664-139-0x0000000000000000-mapping.dmp
                        • memory/2664-156-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2664-170-0x0000000004750000-0x0000000004751000-memory.dmp
                          Filesize

                          4KB

                        • memory/2728-143-0x0000000000000000-mapping.dmp
                        • memory/2728-171-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2728-186-0x0000000004A32000-0x0000000004A33000-memory.dmp
                          Filesize

                          4KB

                        • memory/2728-185-0x0000000004A30000-0x0000000004A31000-memory.dmp
                          Filesize

                          4KB

                        • memory/2808-151-0x0000000000000000-mapping.dmp
                        • memory/2808-188-0x0000000004A42000-0x0000000004A43000-memory.dmp
                          Filesize

                          4KB

                        • memory/2808-173-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2808-187-0x0000000004A40000-0x0000000004A41000-memory.dmp
                          Filesize

                          4KB

                        • memory/2880-158-0x0000000000000000-mapping.dmp
                        • memory/2880-181-0x0000000074360000-0x0000000074A4E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2880-190-0x0000000000CA2000-0x0000000000CA3000-memory.dmp
                          Filesize

                          4KB

                        • memory/2880-189-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
                          Filesize

                          4KB