Analysis

  • max time kernel
    142s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    20-06-2021 04:34

General

  • Target

    arnatic_6.exe

  • Size

    780KB

  • MD5

    fd4160bc3c35b4eaed8c02abd8e2f505

  • SHA1

    3c7bcdc27da78c813548a6465d59d00c4dc75bba

  • SHA256

    46836190326258f65c9dbc1930b01e9d3de04996a1a2c79e39a36c281d79fe0a

  • SHA512

    37e671e355c6a533c3273f2af12277b4457719e9b2d4fa9859386eae78010a9be6e63941f85b319ce5c9f98867f82a067bca16c208d2d38dee9f0fee0f656895

Malware Config

Extracted

Family

redline

Botnet

19_6_r

C2

qitoshalan.xyz:80

Extracted

Family

smokeloader

Version

2020

C2

http://999080321newfolder1002002131-service1002.space/

http://999080321newfolder1002002231-service1002.space/

http://999080321newfolder3100231-service1002.space/

http://999080321newfolder1002002431-service1002.space/

http://999080321newfolder1002002531-service1002.space/

http://999080321newfolder33417-012425999080321.space/

http://999080321test125831-service10020125999080321.space/

http://999080321test136831-service10020125999080321.space/

http://999080321test147831-service10020125999080321.space/

http://999080321test146831-service10020125999080321.space/

http://999080321test134831-service10020125999080321.space/

http://999080321est213531-service1002012425999080321.ru/

http://999080321yes1t3481-service10020125999080321.ru/

http://999080321test13561-service10020125999080321.su/

http://999080321test14781-service10020125999080321.info/

http://999080321test13461-service10020125999080321.net/

http://999080321test15671-service10020125999080321.tech/

http://999080321test12671-service10020125999080321.online/

http://999080321utest1341-service10020125999080321.ru/

http://999080321uest71-service100201dom25999080321.ru/

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

39.3

Botnet

865

C2

https://bandakere.tumblr.com

Attributes
  • profile_id

    865

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 2 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 23 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 9 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 45 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 20 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:468
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:884
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k SystemNetworkService
        2⤵
        • Drops file in System32 directory
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:2520
    • C:\Users\Admin\AppData\Local\Temp\arnatic_6.exe
      "C:\Users\Admin\AppData\Local\Temp\arnatic_6.exe"
      1⤵
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\Documents\XTh1ZyToB6HjC59HxKQHyYar.exe
        "C:\Users\Admin\Documents\XTh1ZyToB6HjC59HxKQHyYar.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:604
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2676
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          PID:1332
      • C:\Users\Admin\Documents\BDE0A59q1sLdM_awO58iTLXA.exe
        "C:\Users\Admin\Documents\BDE0A59q1sLdM_awO58iTLXA.exe"
        2⤵
          PID:1156
        • C:\Users\Admin\Documents\OMsvMbTj5HSR9fAer9gekmGW.exe
          "C:\Users\Admin\Documents\OMsvMbTj5HSR9fAer9gekmGW.exe"
          2⤵
          • Executes dropped EXE
          PID:1104
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c taskkill /im "OMsvMbTj5HSR9fAer9gekmGW.exe" /f & erase "C:\Users\Admin\Documents\OMsvMbTj5HSR9fAer9gekmGW.exe" & exit
            3⤵
              PID:2896
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /im "OMsvMbTj5HSR9fAer9gekmGW.exe" /f
                4⤵
                • Kills process with taskkill
                PID:2948
          • C:\Users\Admin\Documents\duWPoz93pkSivzOjeK7TLph7.exe
            "C:\Users\Admin\Documents\duWPoz93pkSivzOjeK7TLph7.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:332
            • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
              "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1020
              • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                4⤵
                • Executes dropped EXE
                PID:1900
              • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2704
            • C:\Program Files (x86)\Company\NewProduct\jingzhang.exe
              "C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"
              3⤵
              • Executes dropped EXE
              PID:1272
              • C:\Windows\SysWOW64\rUNdlL32.eXe
                "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl
                4⤵
                • Loads dropped DLL
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2396
            • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
              "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1432
            • C:\Program Files (x86)\Company\NewProduct\file4.exe
              "C:\Program Files (x86)\Company\NewProduct\file4.exe"
              3⤵
              • Executes dropped EXE
              PID:1672
          • C:\Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe
            "C:\Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            PID:1220
            • C:\Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe
              C:\Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2380
          • C:\Users\Admin\Documents\p9LyFM00dj3mX6qu_koLe5fM.exe
            "C:\Users\Admin\Documents\p9LyFM00dj3mX6qu_koLe5fM.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:972
            • C:\Users\Admin\Documents\p9LyFM00dj3mX6qu_koLe5fM.exe
              "C:\Users\Admin\Documents\p9LyFM00dj3mX6qu_koLe5fM.exe"
              3⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              PID:1348
          • C:\Users\Admin\Documents\_Hpltz3AYhK0BxVT72EOQ2vf.exe
            "C:\Users\Admin\Documents\_Hpltz3AYhK0BxVT72EOQ2vf.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks processor information in registry
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:1892
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /im _Hpltz3AYhK0BxVT72EOQ2vf.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\_Hpltz3AYhK0BxVT72EOQ2vf.exe" & del C:\ProgramData\*.dll & exit
              3⤵
                PID:1176
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /im _Hpltz3AYhK0BxVT72EOQ2vf.exe /f
                  4⤵
                  • Kills process with taskkill
                  PID:2364
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 6
                  4⤵
                  • Delays execution with timeout.exe
                  PID:1816
            • C:\Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe
              "C:\Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1636
              • C:\Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe
                "C:\Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:2300
            • C:\Users\Admin\Documents\ifMuj3HSA4pvaG_svBPuJiHE.exe
              "C:\Users\Admin\Documents\ifMuj3HSA4pvaG_svBPuJiHE.exe"
              2⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              PID:924
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe"
                3⤵
                  PID:476
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe"
                    4⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2056
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.0.1069815432\1290340261" -parentBuildID 20200403170909 -prefsHandle 1084 -prefMapHandle 1076 -prefsLen 1 -prefMapSize 219622 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 1148 gpu
                      5⤵
                        PID:2468
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.3.920607034\1237408896" -childID 1 -isForBrowser -prefsHandle 3220 -prefMapHandle 3216 -prefsLen 156 -prefMapSize 219622 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 3232 tab
                        5⤵
                          PID:1016
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.13.807999642\794126318" -childID 2 -isForBrowser -prefsHandle 1692 -prefMapHandle 2368 -prefsLen 7013 -prefMapSize 219622 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 2240 tab
                          5⤵
                            PID:476
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2056.20.311633240\1075024119" -childID 3 -isForBrowser -prefsHandle 1720 -prefMapHandle 3496 -prefsLen 7784 -prefMapSize 219622 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2056 "\\.\pipe\gecko-crash-server-pipe.2056" 3484 tab
                            5⤵
                              PID:1972
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                          3⤵
                          • Enumerates system info in registry
                          • Suspicious use of FindShellTrayWindow
                          PID:2276
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef45b4f50,0x7fef45b4f60,0x7fef45b4f70
                            4⤵
                              PID:1852
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1004,5512065875035687420,304459591225034647,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1028 /prefetch:2
                              4⤵
                                PID:2236
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1004,5512065875035687420,304459591225034647,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1416 /prefetch:8
                                4⤵
                                  PID:2316
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1004,5512065875035687420,304459591225034647,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1668 /prefetch:8
                                  4⤵
                                    PID:2116
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,5512065875035687420,304459591225034647,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:1
                                    4⤵
                                      PID:2988
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,5512065875035687420,304459591225034647,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:1
                                      4⤵
                                        PID:756
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,5512065875035687420,304459591225034647,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:1
                                        4⤵
                                          PID:2688
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "cmd.exe" /C taskkill /F /PID 924 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\ifMuj3HSA4pvaG_svBPuJiHE.exe"
                                        3⤵
                                          PID:2016
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /F /PID 924
                                            4⤵
                                            • Kills process with taskkill
                                            PID:2636
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "cmd.exe" /C taskkill /F /PID 924 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\ifMuj3HSA4pvaG_svBPuJiHE.exe"
                                          3⤵
                                            PID:2816
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /PID 924
                                              4⤵
                                              • Kills process with taskkill
                                              PID:368
                                        • C:\Users\Admin\Documents\z1ST6hLHdT3FZm_MyR6vNqlS.exe
                                          "C:\Users\Admin\Documents\z1ST6hLHdT3FZm_MyR6vNqlS.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          PID:2152
                                          • C:\Windows\SysWOW64\rUNdlL32.eXe
                                            "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub
                                            3⤵
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2388
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 192
                                        1⤵
                                        • Loads dropped DLL
                                        • Program crash
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2120
                                      • C:\Users\Admin\AppData\Local\Temp\E87B.exe
                                        C:\Users\Admin\AppData\Local\Temp\E87B.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1856
                                      • C:\Users\Admin\AppData\Local\Temp\EFEB.exe
                                        C:\Users\Admin\AppData\Local\Temp\EFEB.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2236

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v6

                                      Persistence

                                      Modify Existing Service

                                      1
                                      T1031

                                      Defense Evasion

                                      Modify Registry

                                      2
                                      T1112

                                      Disabling Security Tools

                                      1
                                      T1089

                                      Install Root Certificate

                                      1
                                      T1130

                                      Credential Access

                                      Credentials in Files

                                      3
                                      T1081

                                      Discovery

                                      Query Registry

                                      4
                                      T1012

                                      System Information Discovery

                                      4
                                      T1082

                                      Peripheral Device Discovery

                                      1
                                      T1120

                                      Collection

                                      Data from Local System

                                      3
                                      T1005

                                      Command and Control

                                      Web Service

                                      1
                                      T1102

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Program Files (x86)\Company\NewProduct\file4.exe
                                        MD5

                                        02580709c0e95aba9fdd1fbdf7c348e9

                                        SHA1

                                        c39c2f4039262345121ecee1ea62cc4a124a0347

                                        SHA256

                                        70d1bfb908eab66681a858d85bb910b822cc76377010abd6a77fd5a78904ea15

                                        SHA512

                                        1de4f5c98a1330a75f3ccc8a07e095640aac893a41a41bfa7d0cd7ebc11d22b706dbd91e0eb9a8fe027b6365c0d4cad57ab8f1b130a77ac1b1a4da2c21a34cb5

                                      • C:\Program Files (x86)\Company\NewProduct\jingzhang.exe
                                        MD5

                                        a4c547cfac944ad816edf7c54bb58c5c

                                        SHA1

                                        b1d3662d12a400ada141e24bc014c256f5083eb0

                                        SHA256

                                        2f158fe98389b164103a1c3aac49e10520dfd332559d64a546b65af7ef00cd5f

                                        SHA512

                                        ad5891faee33a7f91c5f699017c2c14448ca6fda23ac10dc449354ce2c3e533383df28678e0d170856400f364a99f9996ad35555be891d2d9ef97d83fdd91bbb

                                      • C:\Program Files (x86)\Company\NewProduct\jingzhang.exe
                                        MD5

                                        a4c547cfac944ad816edf7c54bb58c5c

                                        SHA1

                                        b1d3662d12a400ada141e24bc014c256f5083eb0

                                        SHA256

                                        2f158fe98389b164103a1c3aac49e10520dfd332559d64a546b65af7ef00cd5f

                                        SHA512

                                        ad5891faee33a7f91c5f699017c2c14448ca6fda23ac10dc449354ce2c3e533383df28678e0d170856400f364a99f9996ad35555be891d2d9ef97d83fdd91bbb

                                      • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
                                        MD5

                                        aed57d50123897b0012c35ef5dec4184

                                        SHA1

                                        568571b12ca44a585df589dc810bf53adf5e8050

                                        SHA256

                                        096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e

                                        SHA512

                                        ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c

                                      • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                                        MD5

                                        6045baccf49e1eba0e674945311a06e6

                                        SHA1

                                        379c6234849eecede26fad192c2ee59e0f0221cb

                                        SHA256

                                        65830a65cb913bee83258e4ac3e140faf131e7eb084d39f7020c7acc825b0a58

                                        SHA512

                                        da32af6a730884e73956e4eb6bff61a1326b3ef8ba0a213b5b4aad6de4fbd471b3550b6ac2110f1d0b2091e33c70d44e498f897376f8e1998b1d2afac789abeb

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                        MD5

                                        725529e15e07cdd9cbfafd0c0aa66ea2

                                        SHA1

                                        34fdf81e997cdfb5ffe69552d01d0883fb4ece93

                                        SHA256

                                        7c6ba3f6d2671042cc1818364a1153f2d45fda587349348569c3d69d3693764f

                                        SHA512

                                        726c202c8a1c759be6a5fc49795e2f70277ba6475d5def856f6700b46cf480800431e0f507a9a0950d7cb332689db66cf8ef23c8741492253d0d9498fc0fcb5e

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                        MD5

                                        65a89997d30fe0437783a96dcd6f87a6

                                        SHA1

                                        ff5ac732236a3f264682740155f14358d02ab01f

                                        SHA256

                                        87b97ab75614eed809c0578919197f892086990f22edf2ad77a9f14eef0cab1f

                                        SHA512

                                        ecdbd5dce6830cdd4a173eae3b8fde6e47c65a2507d61178a74c21c3934af5f8bb81734343c4b862e7b13dae2ca97ea7ac2ee101cd48f3089fabed38cbe4e9b3

                                      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                        MD5

                                        b7161c0845a64ff6d7345b67ff97f3b0

                                        SHA1

                                        d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                        SHA256

                                        fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                        SHA512

                                        98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                        MD5

                                        b7161c0845a64ff6d7345b67ff97f3b0

                                        SHA1

                                        d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                        SHA256

                                        fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                        SHA512

                                        98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                      • C:\Users\Admin\AppData\Local\Temp\install.dat
                                        MD5

                                        e2f2838e65bd2777ba0e61ce60b1cb54

                                        SHA1

                                        17d525f74820f9605d3867806d252f9bae4b4415

                                        SHA256

                                        60ee8dbf1ed96982dd234f593547d50d79c402e27d28d08715f5c4c209bee8e6

                                        SHA512

                                        b39ac41e966010146a0583bc2080629c77c450077c07a04c9bf7df167728f21a4ffaacdab16f4fb5349ca6d0553ca9d143e2d5951e9e4933472d855dea92c9b0

                                      • C:\Users\Admin\AppData\Local\Temp\install.dll
                                        MD5

                                        957460132c11b2b5ea57964138453b00

                                        SHA1

                                        12e46d4c46feff30071bf8b0b6e13eabba22237f

                                        SHA256

                                        9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc

                                        SHA512

                                        0026197e173ee92ccdc39005a8c0a8bc91241c356b44b2b47d11729bfa184ecd1d6d15f698a14e53e8de1e35b9108b38bb89bbc8dbdfe7be0ebf89ca65f50cd8

                                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                        MD5

                                        7fee8223d6e4f82d6cd115a28f0b6d58

                                        SHA1

                                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                                        SHA256

                                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                        SHA512

                                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                        MD5

                                        7fee8223d6e4f82d6cd115a28f0b6d58

                                        SHA1

                                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                                        SHA256

                                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                        SHA512

                                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                        MD5

                                        7fee8223d6e4f82d6cd115a28f0b6d58

                                        SHA1

                                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                                        SHA256

                                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                        SHA512

                                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                      • C:\Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe
                                        MD5

                                        0fd2ee1bd641b50a4cb725edeec6f46e

                                        SHA1

                                        b0d5227d9fe2161964455525c3763af0926cbf73

                                        SHA256

                                        0ae05623bf8b99489bd0ccbb23e7b4b30cb41b37dcf0026e5c48bb509ec1480b

                                        SHA512

                                        abb06490e993987832a255c10f334d08de78c3a412b78030b6e0cf38cd5224f96641972ea58b6bdc754231cd6c95cf2836e29926c875571cbfc9426daff2a950

                                      • C:\Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe
                                        MD5

                                        0fd2ee1bd641b50a4cb725edeec6f46e

                                        SHA1

                                        b0d5227d9fe2161964455525c3763af0926cbf73

                                        SHA256

                                        0ae05623bf8b99489bd0ccbb23e7b4b30cb41b37dcf0026e5c48bb509ec1480b

                                        SHA512

                                        abb06490e993987832a255c10f334d08de78c3a412b78030b6e0cf38cd5224f96641972ea58b6bdc754231cd6c95cf2836e29926c875571cbfc9426daff2a950

                                      • C:\Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe
                                        MD5

                                        0fd2ee1bd641b50a4cb725edeec6f46e

                                        SHA1

                                        b0d5227d9fe2161964455525c3763af0926cbf73

                                        SHA256

                                        0ae05623bf8b99489bd0ccbb23e7b4b30cb41b37dcf0026e5c48bb509ec1480b

                                        SHA512

                                        abb06490e993987832a255c10f334d08de78c3a412b78030b6e0cf38cd5224f96641972ea58b6bdc754231cd6c95cf2836e29926c875571cbfc9426daff2a950

                                      • C:\Users\Admin\Documents\BDE0A59q1sLdM_awO58iTLXA.exe
                                        MD5

                                        1c32647a706fbef6faeac45a75201489

                                        SHA1

                                        9055c809cc813d8358bc465603165be70f9216b7

                                        SHA256

                                        f60e23e0d5cbd44794977c641d07228f8c7a9255f469a1fe9b2ae4c4cc009edc

                                        SHA512

                                        c8acb58b5686b5daf16de893a9a09c61429892b61195442c456982b14be16baef714b4cf1ad61705480afb880c48d82ace5f65a055ad3bad204a8e776971a3d0

                                      • C:\Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe
                                        MD5

                                        f6c86fcba14550740e6ad7468f6ad59e

                                        SHA1

                                        f411059643a3e9854635750a442c3d0c677f3ea6

                                        SHA256

                                        2899fd4889efb16d5b5257b8b05801829b5d10a14264b3734c0ca324cf51e5ca

                                        SHA512

                                        766574b9fe367623ec9cf27b62b24f63db76f13d086232bf95f15b54e85a7808636abf65c111007139297fdf6a64413495afdd380746327b723e67b5a8db0cf6

                                      • C:\Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe
                                        MD5

                                        f6c86fcba14550740e6ad7468f6ad59e

                                        SHA1

                                        f411059643a3e9854635750a442c3d0c677f3ea6

                                        SHA256

                                        2899fd4889efb16d5b5257b8b05801829b5d10a14264b3734c0ca324cf51e5ca

                                        SHA512

                                        766574b9fe367623ec9cf27b62b24f63db76f13d086232bf95f15b54e85a7808636abf65c111007139297fdf6a64413495afdd380746327b723e67b5a8db0cf6

                                      • C:\Users\Admin\Documents\OMsvMbTj5HSR9fAer9gekmGW.exe
                                        MD5

                                        26781b5f89eec75eb2ba9ea9a692edc9

                                        SHA1

                                        d3462096ed87de0559d15b96d0e81a45de3b75bb

                                        SHA256

                                        ce0ac04ab37aefb8b87413453770c44a6c3be760e4e805243fb2073edde10e8d

                                        SHA512

                                        0f28f46a804b0a754c2cbe08947d0e5a668a109c1c72986b89328521a64c4035dd30303c5588295f63a3094ffe7647b3f39983b49f611e46979cc3a296cc7d4e

                                      • C:\Users\Admin\Documents\XTh1ZyToB6HjC59HxKQHyYar.exe
                                        MD5

                                        aed57d50123897b0012c35ef5dec4184

                                        SHA1

                                        568571b12ca44a585df589dc810bf53adf5e8050

                                        SHA256

                                        096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e

                                        SHA512

                                        ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c

                                      • C:\Users\Admin\Documents\_Hpltz3AYhK0BxVT72EOQ2vf.exe
                                        MD5

                                        93a9015edc62b53c12a3e3c9ca7e17f0

                                        SHA1

                                        5102f1f1a500a4089ccf6188a76fe664ec810870

                                        SHA256

                                        b0bf944eb3f2f6706a87e98b89a862ac20501beda28e8805116190f51bb56133

                                        SHA512

                                        fc27a538d61bbebfef194ed15113ceeeeffe72949996a9c7fb4f19f731f283bd95450cafd4e34a2b99c28e289a52448612e964dd7b47d2cb7b5b2d7215d3890c

                                      • C:\Users\Admin\Documents\duWPoz93pkSivzOjeK7TLph7.exe
                                        MD5

                                        623c88cc55a2df1115600910bbe14457

                                        SHA1

                                        8c7e43140b1558b5ccbfeb978567daf57e3fc44f

                                        SHA256

                                        47bb97567ec946832d0bf77a9f2c4300032d4d7b2293f64fcd25d9b83e7c1178

                                        SHA512

                                        501eab92ffcce75126459c267d06e58fef590fd860be63233630126f6008eb083d3d1f87dd419e1aa311e3eed2bbf9366cf722d55d10d02dff79f8615d4989f6

                                      • C:\Users\Admin\Documents\duWPoz93pkSivzOjeK7TLph7.exe
                                        MD5

                                        623c88cc55a2df1115600910bbe14457

                                        SHA1

                                        8c7e43140b1558b5ccbfeb978567daf57e3fc44f

                                        SHA256

                                        47bb97567ec946832d0bf77a9f2c4300032d4d7b2293f64fcd25d9b83e7c1178

                                        SHA512

                                        501eab92ffcce75126459c267d06e58fef590fd860be63233630126f6008eb083d3d1f87dd419e1aa311e3eed2bbf9366cf722d55d10d02dff79f8615d4989f6

                                      • C:\Users\Admin\Documents\ifMuj3HSA4pvaG_svBPuJiHE.exe
                                        MD5

                                        856cf6ed735093f5fe523f0d99e18424

                                        SHA1

                                        d8946c746ac52c383a8547a4c8ff96ec85108b76

                                        SHA256

                                        f47a0c643ec5aa9d2b0302391d39bedfd675abd8892d5a2bd18b66fc303f66f7

                                        SHA512

                                        cbdfed752970534997542ce70f7a610eff7e28d42507865855af29b47f5c5500adab6dcc163b695347086b9bb6a7f1f5d6826a473b0a387b5a8f4ad944a1f322

                                      • C:\Users\Admin\Documents\p9LyFM00dj3mX6qu_koLe5fM.exe
                                        MD5

                                        ea57c9a4177b1022ec4d053af865cbc9

                                        SHA1

                                        7ec0f509955223f91ff3f225bfdc53e5ec56a6d8

                                        SHA256

                                        0e2bcbe99b84383cfa549598d998bddce096daa94e1eb6dfbfa66d3cf12cc1e4

                                        SHA512

                                        a889aa2439957fb8d78c1d582f5f0a3c2a084e1e085ac1ef00a42d69d144599769c6bbb6c0ad24aaf310db9ac153b54970ec292cc75d1bacbb57c1f603297802

                                      • C:\Users\Admin\Documents\z1ST6hLHdT3FZm_MyR6vNqlS.exe
                                        MD5

                                        41c69a7f93fbe7edc44fd1b09795fa67

                                        SHA1

                                        f09309b52d2a067585266ec57a58817b3fc0c9df

                                        SHA256

                                        8b720f6963165f9aca1600e2e3efb04a7162014d0d738fb7f8b9872019f49bd5

                                        SHA512

                                        c561b02eb7aeb0e994716a6b046973ac36c3fd004fa2524b402c1a9b09e931cf0db41ec938c808acadefc708e9e6950a7262f4b7f3b60c0083a660f58e0b01a9

                                      • C:\Users\Admin\Documents\z1ST6hLHdT3FZm_MyR6vNqlS.exe
                                        MD5

                                        41c69a7f93fbe7edc44fd1b09795fa67

                                        SHA1

                                        f09309b52d2a067585266ec57a58817b3fc0c9df

                                        SHA256

                                        8b720f6963165f9aca1600e2e3efb04a7162014d0d738fb7f8b9872019f49bd5

                                        SHA512

                                        c561b02eb7aeb0e994716a6b046973ac36c3fd004fa2524b402c1a9b09e931cf0db41ec938c808acadefc708e9e6950a7262f4b7f3b60c0083a660f58e0b01a9

                                      • \Program Files (x86)\Company\NewProduct\file4.exe
                                        MD5

                                        02580709c0e95aba9fdd1fbdf7c348e9

                                        SHA1

                                        c39c2f4039262345121ecee1ea62cc4a124a0347

                                        SHA256

                                        70d1bfb908eab66681a858d85bb910b822cc76377010abd6a77fd5a78904ea15

                                        SHA512

                                        1de4f5c98a1330a75f3ccc8a07e095640aac893a41a41bfa7d0cd7ebc11d22b706dbd91e0eb9a8fe027b6365c0d4cad57ab8f1b130a77ac1b1a4da2c21a34cb5

                                      • \Program Files (x86)\Company\NewProduct\jingzhang.exe
                                        MD5

                                        a4c547cfac944ad816edf7c54bb58c5c

                                        SHA1

                                        b1d3662d12a400ada141e24bc014c256f5083eb0

                                        SHA256

                                        2f158fe98389b164103a1c3aac49e10520dfd332559d64a546b65af7ef00cd5f

                                        SHA512

                                        ad5891faee33a7f91c5f699017c2c14448ca6fda23ac10dc449354ce2c3e533383df28678e0d170856400f364a99f9996ad35555be891d2d9ef97d83fdd91bbb

                                      • \Program Files (x86)\Company\NewProduct\jingzhang.exe
                                        MD5

                                        a4c547cfac944ad816edf7c54bb58c5c

                                        SHA1

                                        b1d3662d12a400ada141e24bc014c256f5083eb0

                                        SHA256

                                        2f158fe98389b164103a1c3aac49e10520dfd332559d64a546b65af7ef00cd5f

                                        SHA512

                                        ad5891faee33a7f91c5f699017c2c14448ca6fda23ac10dc449354ce2c3e533383df28678e0d170856400f364a99f9996ad35555be891d2d9ef97d83fdd91bbb

                                      • \Program Files (x86)\Company\NewProduct\jooyu.exe
                                        MD5

                                        aed57d50123897b0012c35ef5dec4184

                                        SHA1

                                        568571b12ca44a585df589dc810bf53adf5e8050

                                        SHA256

                                        096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e

                                        SHA512

                                        ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c

                                      • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • \Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                        MD5

                                        7a151db96e506bd887e3ffa5ab81b1a5

                                        SHA1

                                        1133065fce3b06bd483b05cca09e519b53f71447

                                        SHA256

                                        288376e11301c8ca3eb52871d09133f0199b911a33b9658579929ef6bac8ea6c

                                        SHA512

                                        33b21b9a3f84a847475c99c642447138344fc53379c40044b50768e5ebe2fa5b5064126678151d86fb4aa47e4b4a8fefd2b20ee126abf11d1c9e56d46a2fbe78

                                      • \Users\Admin\AppData\Local\Temp\AE30.tmp
                                        MD5

                                        d124f55b9393c976963407dff51ffa79

                                        SHA1

                                        2c7bbedd79791bfb866898c85b504186db610b5d

                                        SHA256

                                        ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                                        SHA512

                                        278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

                                      • \Users\Admin\AppData\Local\Temp\install.dll
                                        MD5

                                        957460132c11b2b5ea57964138453b00

                                        SHA1

                                        12e46d4c46feff30071bf8b0b6e13eabba22237f

                                        SHA256

                                        9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc

                                        SHA512

                                        0026197e173ee92ccdc39005a8c0a8bc91241c356b44b2b47d11729bfa184ecd1d6d15f698a14e53e8de1e35b9108b38bb89bbc8dbdfe7be0ebf89ca65f50cd8

                                      • \Users\Admin\AppData\Local\Temp\install.dll
                                        MD5

                                        957460132c11b2b5ea57964138453b00

                                        SHA1

                                        12e46d4c46feff30071bf8b0b6e13eabba22237f

                                        SHA256

                                        9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc

                                        SHA512

                                        0026197e173ee92ccdc39005a8c0a8bc91241c356b44b2b47d11729bfa184ecd1d6d15f698a14e53e8de1e35b9108b38bb89bbc8dbdfe7be0ebf89ca65f50cd8

                                      • \Users\Admin\AppData\Local\Temp\install.dll
                                        MD5

                                        957460132c11b2b5ea57964138453b00

                                        SHA1

                                        12e46d4c46feff30071bf8b0b6e13eabba22237f

                                        SHA256

                                        9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc

                                        SHA512

                                        0026197e173ee92ccdc39005a8c0a8bc91241c356b44b2b47d11729bfa184ecd1d6d15f698a14e53e8de1e35b9108b38bb89bbc8dbdfe7be0ebf89ca65f50cd8

                                      • \Users\Admin\AppData\Local\Temp\install.dll
                                        MD5

                                        957460132c11b2b5ea57964138453b00

                                        SHA1

                                        12e46d4c46feff30071bf8b0b6e13eabba22237f

                                        SHA256

                                        9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc

                                        SHA512

                                        0026197e173ee92ccdc39005a8c0a8bc91241c356b44b2b47d11729bfa184ecd1d6d15f698a14e53e8de1e35b9108b38bb89bbc8dbdfe7be0ebf89ca65f50cd8

                                      • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                        MD5

                                        7fee8223d6e4f82d6cd115a28f0b6d58

                                        SHA1

                                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                                        SHA256

                                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                        SHA512

                                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                      • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                        MD5

                                        7fee8223d6e4f82d6cd115a28f0b6d58

                                        SHA1

                                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                                        SHA256

                                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                        SHA512

                                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                      • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                        MD5

                                        7fee8223d6e4f82d6cd115a28f0b6d58

                                        SHA1

                                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                                        SHA256

                                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                        SHA512

                                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                      • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                        MD5

                                        7fee8223d6e4f82d6cd115a28f0b6d58

                                        SHA1

                                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                                        SHA256

                                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                        SHA512

                                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                      • \Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe
                                        MD5

                                        0fd2ee1bd641b50a4cb725edeec6f46e

                                        SHA1

                                        b0d5227d9fe2161964455525c3763af0926cbf73

                                        SHA256

                                        0ae05623bf8b99489bd0ccbb23e7b4b30cb41b37dcf0026e5c48bb509ec1480b

                                        SHA512

                                        abb06490e993987832a255c10f334d08de78c3a412b78030b6e0cf38cd5224f96641972ea58b6bdc754231cd6c95cf2836e29926c875571cbfc9426daff2a950

                                      • \Users\Admin\Documents\30vgr0CMnhB6JOu9Ww9k7OFa.exe
                                        MD5

                                        0fd2ee1bd641b50a4cb725edeec6f46e

                                        SHA1

                                        b0d5227d9fe2161964455525c3763af0926cbf73

                                        SHA256

                                        0ae05623bf8b99489bd0ccbb23e7b4b30cb41b37dcf0026e5c48bb509ec1480b

                                        SHA512

                                        abb06490e993987832a255c10f334d08de78c3a412b78030b6e0cf38cd5224f96641972ea58b6bdc754231cd6c95cf2836e29926c875571cbfc9426daff2a950

                                      • \Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe
                                        MD5

                                        f6c86fcba14550740e6ad7468f6ad59e

                                        SHA1

                                        f411059643a3e9854635750a442c3d0c677f3ea6

                                        SHA256

                                        2899fd4889efb16d5b5257b8b05801829b5d10a14264b3734c0ca324cf51e5ca

                                        SHA512

                                        766574b9fe367623ec9cf27b62b24f63db76f13d086232bf95f15b54e85a7808636abf65c111007139297fdf6a64413495afdd380746327b723e67b5a8db0cf6

                                      • \Users\Admin\Documents\ChkUqaln08QDHFUdZtTC9Z3U.exe
                                        MD5

                                        f6c86fcba14550740e6ad7468f6ad59e

                                        SHA1

                                        f411059643a3e9854635750a442c3d0c677f3ea6

                                        SHA256

                                        2899fd4889efb16d5b5257b8b05801829b5d10a14264b3734c0ca324cf51e5ca

                                        SHA512

                                        766574b9fe367623ec9cf27b62b24f63db76f13d086232bf95f15b54e85a7808636abf65c111007139297fdf6a64413495afdd380746327b723e67b5a8db0cf6

                                      • \Users\Admin\Documents\OMsvMbTj5HSR9fAer9gekmGW.exe
                                        MD5

                                        26781b5f89eec75eb2ba9ea9a692edc9

                                        SHA1

                                        d3462096ed87de0559d15b96d0e81a45de3b75bb

                                        SHA256

                                        ce0ac04ab37aefb8b87413453770c44a6c3be760e4e805243fb2073edde10e8d

                                        SHA512

                                        0f28f46a804b0a754c2cbe08947d0e5a668a109c1c72986b89328521a64c4035dd30303c5588295f63a3094ffe7647b3f39983b49f611e46979cc3a296cc7d4e

                                      • \Users\Admin\Documents\OMsvMbTj5HSR9fAer9gekmGW.exe
                                        MD5

                                        26781b5f89eec75eb2ba9ea9a692edc9

                                        SHA1

                                        d3462096ed87de0559d15b96d0e81a45de3b75bb

                                        SHA256

                                        ce0ac04ab37aefb8b87413453770c44a6c3be760e4e805243fb2073edde10e8d

                                        SHA512

                                        0f28f46a804b0a754c2cbe08947d0e5a668a109c1c72986b89328521a64c4035dd30303c5588295f63a3094ffe7647b3f39983b49f611e46979cc3a296cc7d4e

                                      • \Users\Admin\Documents\XTh1ZyToB6HjC59HxKQHyYar.exe
                                        MD5

                                        aed57d50123897b0012c35ef5dec4184

                                        SHA1

                                        568571b12ca44a585df589dc810bf53adf5e8050

                                        SHA256

                                        096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e

                                        SHA512

                                        ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c

                                      • \Users\Admin\Documents\_Hpltz3AYhK0BxVT72EOQ2vf.exe
                                        MD5

                                        93a9015edc62b53c12a3e3c9ca7e17f0

                                        SHA1

                                        5102f1f1a500a4089ccf6188a76fe664ec810870

                                        SHA256

                                        b0bf944eb3f2f6706a87e98b89a862ac20501beda28e8805116190f51bb56133

                                        SHA512

                                        fc27a538d61bbebfef194ed15113ceeeeffe72949996a9c7fb4f19f731f283bd95450cafd4e34a2b99c28e289a52448612e964dd7b47d2cb7b5b2d7215d3890c

                                      • \Users\Admin\Documents\_Hpltz3AYhK0BxVT72EOQ2vf.exe
                                        MD5

                                        93a9015edc62b53c12a3e3c9ca7e17f0

                                        SHA1

                                        5102f1f1a500a4089ccf6188a76fe664ec810870

                                        SHA256

                                        b0bf944eb3f2f6706a87e98b89a862ac20501beda28e8805116190f51bb56133

                                        SHA512

                                        fc27a538d61bbebfef194ed15113ceeeeffe72949996a9c7fb4f19f731f283bd95450cafd4e34a2b99c28e289a52448612e964dd7b47d2cb7b5b2d7215d3890c

                                      • \Users\Admin\Documents\duWPoz93pkSivzOjeK7TLph7.exe
                                        MD5

                                        623c88cc55a2df1115600910bbe14457

                                        SHA1

                                        8c7e43140b1558b5ccbfeb978567daf57e3fc44f

                                        SHA256

                                        47bb97567ec946832d0bf77a9f2c4300032d4d7b2293f64fcd25d9b83e7c1178

                                        SHA512

                                        501eab92ffcce75126459c267d06e58fef590fd860be63233630126f6008eb083d3d1f87dd419e1aa311e3eed2bbf9366cf722d55d10d02dff79f8615d4989f6

                                      • \Users\Admin\Documents\ifMuj3HSA4pvaG_svBPuJiHE.exe
                                        MD5

                                        856cf6ed735093f5fe523f0d99e18424

                                        SHA1

                                        d8946c746ac52c383a8547a4c8ff96ec85108b76

                                        SHA256

                                        f47a0c643ec5aa9d2b0302391d39bedfd675abd8892d5a2bd18b66fc303f66f7

                                        SHA512

                                        cbdfed752970534997542ce70f7a610eff7e28d42507865855af29b47f5c5500adab6dcc163b695347086b9bb6a7f1f5d6826a473b0a387b5a8f4ad944a1f322

                                      • \Users\Admin\Documents\p9LyFM00dj3mX6qu_koLe5fM.exe
                                        MD5

                                        ea57c9a4177b1022ec4d053af865cbc9

                                        SHA1

                                        7ec0f509955223f91ff3f225bfdc53e5ec56a6d8

                                        SHA256

                                        0e2bcbe99b84383cfa549598d998bddce096daa94e1eb6dfbfa66d3cf12cc1e4

                                        SHA512

                                        a889aa2439957fb8d78c1d582f5f0a3c2a084e1e085ac1ef00a42d69d144599769c6bbb6c0ad24aaf310db9ac153b54970ec292cc75d1bacbb57c1f603297802

                                      • \Users\Admin\Documents\p9LyFM00dj3mX6qu_koLe5fM.exe
                                        MD5

                                        ea57c9a4177b1022ec4d053af865cbc9

                                        SHA1

                                        7ec0f509955223f91ff3f225bfdc53e5ec56a6d8

                                        SHA256

                                        0e2bcbe99b84383cfa549598d998bddce096daa94e1eb6dfbfa66d3cf12cc1e4

                                        SHA512

                                        a889aa2439957fb8d78c1d582f5f0a3c2a084e1e085ac1ef00a42d69d144599769c6bbb6c0ad24aaf310db9ac153b54970ec292cc75d1bacbb57c1f603297802

                                      • \Users\Admin\Documents\z1ST6hLHdT3FZm_MyR6vNqlS.exe
                                        MD5

                                        41c69a7f93fbe7edc44fd1b09795fa67

                                        SHA1

                                        f09309b52d2a067585266ec57a58817b3fc0c9df

                                        SHA256

                                        8b720f6963165f9aca1600e2e3efb04a7162014d0d738fb7f8b9872019f49bd5

                                        SHA512

                                        c561b02eb7aeb0e994716a6b046973ac36c3fd004fa2524b402c1a9b09e931cf0db41ec938c808acadefc708e9e6950a7262f4b7f3b60c0083a660f58e0b01a9

                                      • memory/332-69-0x0000000000000000-mapping.dmp
                                      • memory/368-233-0x0000000000000000-mapping.dmp
                                      • memory/476-222-0x0000000000000000-mapping.dmp
                                      • memory/476-203-0x0000000000000000-mapping.dmp
                                      • memory/604-61-0x0000000000000000-mapping.dmp
                                      • memory/756-247-0x0000000000000000-mapping.dmp
                                      • memory/884-164-0x0000000000BC0000-0x0000000000C0C000-memory.dmp
                                        Filesize

                                        304KB

                                      • memory/884-167-0x00000000010E0000-0x0000000001150000-memory.dmp
                                        Filesize

                                        448KB

                                      • memory/884-171-0x0000000001690000-0x0000000001701000-memory.dmp
                                        Filesize

                                        452KB

                                      • memory/884-166-0x0000000000A00000-0x0000000000A4B000-memory.dmp
                                        Filesize

                                        300KB

                                      • memory/924-202-0x0000000005114000-0x0000000005116000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/924-201-0x0000000000D80000-0x0000000000D8B000-memory.dmp
                                        Filesize

                                        44KB

                                      • memory/924-200-0x00000000027A0000-0x000000000286D000-memory.dmp
                                        Filesize

                                        820KB

                                      • memory/924-198-0x0000000005112000-0x0000000005113000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/924-199-0x0000000005113000-0x0000000005114000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/924-73-0x0000000000000000-mapping.dmp
                                      • memory/924-195-0x00000000022C0000-0x000000000234E000-memory.dmp
                                        Filesize

                                        568KB

                                      • memory/924-197-0x0000000005111000-0x0000000005112000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/924-196-0x0000000000400000-0x000000000095D000-memory.dmp
                                        Filesize

                                        5.4MB

                                      • memory/924-194-0x0000000002970000-0x0000000002A3F000-memory.dmp
                                        Filesize

                                        828KB

                                      • memory/972-85-0x0000000000000000-mapping.dmp
                                      • memory/972-190-0x0000000000400000-0x0000000000D41000-memory.dmp
                                        Filesize

                                        9.3MB

                                      • memory/972-187-0x0000000002A70000-0x0000000003396000-memory.dmp
                                        Filesize

                                        9.1MB

                                      • memory/1016-217-0x0000000000000000-mapping.dmp
                                      • memory/1020-95-0x0000000000000000-mapping.dmp
                                      • memory/1104-191-0x0000000000400000-0x00000000008F7000-memory.dmp
                                        Filesize

                                        5.0MB

                                      • memory/1104-189-0x0000000000220000-0x000000000024F000-memory.dmp
                                        Filesize

                                        188KB

                                      • memory/1104-65-0x0000000000000000-mapping.dmp
                                      • memory/1176-207-0x0000000000000000-mapping.dmp
                                      • memory/1220-144-0x0000000004CE0000-0x0000000004CE1000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/1220-126-0x0000000000C90000-0x0000000000C91000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/1220-87-0x0000000000000000-mapping.dmp
                                      • memory/1224-180-0x0000000003900000-0x0000000003917000-memory.dmp
                                        Filesize

                                        92KB

                                      • memory/1272-100-0x0000000000000000-mapping.dmp
                                      • memory/1332-109-0x0000000000000000-mapping.dmp
                                      • memory/1348-206-0x0000000000000000-mapping.dmp
                                      • memory/1432-105-0x0000000000000000-mapping.dmp
                                      • memory/1432-124-0x0000000000400000-0x00000000005DE000-memory.dmp
                                        Filesize

                                        1.9MB

                                      • memory/1636-152-0x0000000000220000-0x000000000022C000-memory.dmp
                                        Filesize

                                        48KB

                                      • memory/1636-77-0x0000000000000000-mapping.dmp
                                      • memory/1672-123-0x0000000000290000-0x00000000002A2000-memory.dmp
                                        Filesize

                                        72KB

                                      • memory/1672-120-0x0000000000240000-0x0000000000250000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/1672-93-0x0000000000000000-mapping.dmp
                                      • memory/1816-210-0x0000000000000000-mapping.dmp
                                      • memory/1852-230-0x0000000000000000-mapping.dmp
                                      • memory/1856-252-0x0000000000000000-mapping.dmp
                                      • memory/1892-183-0x0000000000400000-0x000000000093E000-memory.dmp
                                        Filesize

                                        5.2MB

                                      • memory/1892-179-0x0000000000220000-0x00000000002B7000-memory.dmp
                                        Filesize

                                        604KB

                                      • memory/1892-83-0x0000000000000000-mapping.dmp
                                      • memory/1900-118-0x0000000000000000-mapping.dmp
                                      • memory/1972-225-0x0000000000000000-mapping.dmp
                                      • memory/2016-231-0x0000000000000000-mapping.dmp
                                      • memory/2020-59-0x0000000076A81000-0x0000000076A83000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/2056-251-0x000007FF0EEB0000-0x000007FF0EEBA000-memory.dmp
                                        Filesize

                                        40KB

                                      • memory/2056-204-0x0000000000000000-mapping.dmp
                                      • memory/2056-250-0x000007FEF4020000-0x000007FEF4163000-memory.dmp
                                        Filesize

                                        1.3MB

                                      • memory/2116-240-0x0000000000000000-mapping.dmp
                                      • memory/2120-134-0x0000000000000000-mapping.dmp
                                      • memory/2120-151-0x0000000000570000-0x0000000000571000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/2152-130-0x0000000000000000-mapping.dmp
                                      • memory/2236-236-0x0000000000000000-mapping.dmp
                                      • memory/2236-238-0x0000000077AF0000-0x0000000077AF1000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/2236-255-0x0000000000000000-mapping.dmp
                                      • memory/2276-229-0x0000000000000000-mapping.dmp
                                      • memory/2276-246-0x0000000006370000-0x0000000006371000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/2300-142-0x0000000000400000-0x000000000040C000-memory.dmp
                                        Filesize

                                        48KB

                                      • memory/2300-143-0x0000000000402F68-mapping.dmp
                                      • memory/2316-237-0x0000000000000000-mapping.dmp
                                      • memory/2364-208-0x0000000000000000-mapping.dmp
                                      • memory/2380-181-0x0000000004D00000-0x0000000004D01000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/2380-174-0x0000000000400000-0x000000000041E000-memory.dmp
                                        Filesize

                                        120KB

                                      • memory/2380-173-0x0000000000417F16-mapping.dmp
                                      • memory/2380-172-0x0000000000400000-0x000000000041E000-memory.dmp
                                        Filesize

                                        120KB

                                      • memory/2388-168-0x0000000002060000-0x0000000002161000-memory.dmp
                                        Filesize

                                        1.0MB

                                      • memory/2388-153-0x0000000000000000-mapping.dmp
                                      • memory/2388-169-0x00000000003B0000-0x000000000040D000-memory.dmp
                                        Filesize

                                        372KB

                                      • memory/2396-154-0x0000000000000000-mapping.dmp
                                      • memory/2396-163-0x0000000000860000-0x0000000000961000-memory.dmp
                                        Filesize

                                        1.0MB

                                      • memory/2396-165-0x00000000009B0000-0x0000000000A0C000-memory.dmp
                                        Filesize

                                        368KB

                                      • memory/2468-211-0x0000000000000000-mapping.dmp
                                      • memory/2520-170-0x00000000FF63246C-mapping.dmp
                                      • memory/2520-227-0x00000000028A0000-0x00000000029A6000-memory.dmp
                                        Filesize

                                        1.0MB

                                      • memory/2520-228-0x0000000000480000-0x000000000049B000-memory.dmp
                                        Filesize

                                        108KB

                                      • memory/2520-178-0x00000000004C0000-0x0000000000531000-memory.dmp
                                        Filesize

                                        452KB

                                      • memory/2636-234-0x0000000000000000-mapping.dmp
                                      • memory/2676-182-0x0000000000000000-mapping.dmp
                                      • memory/2704-185-0x0000000000000000-mapping.dmp
                                      • memory/2816-232-0x0000000000000000-mapping.dmp
                                      • memory/2896-192-0x0000000000000000-mapping.dmp
                                      • memory/2948-193-0x0000000000000000-mapping.dmp
                                      • memory/2988-243-0x0000000000000000-mapping.dmp