Resubmissions

14-11-2021 08:09

211114-j2cn6agbb5 10

14-11-2021 07:52

211114-jqdr3sgba4 10

Analysis

  • max time kernel
    846s
  • max time network
    848s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    14-11-2021 08:09

General

  • Target

    0a52a6c6f04350ec811665f96d3935f0.exe

  • Size

    219KB

  • MD5

    0a52a6c6f04350ec811665f96d3935f0

  • SHA1

    10a62112af2ba30630debf91c777af60624e545b

  • SHA256

    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

  • SHA512

    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

185.159.80.90:38637

Extracted

Family

redline

Botnet

SuperStar

C2

185.215.113.29:36224

Extracted

Family

redline

Botnet

ОШИБКА

C2

185.183.32.161:45391

Extracted

Family

redline

Botnet

11/13

C2

94.103.9.133:1169

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 21 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe
    "C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe
      "C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1708
  • C:\Users\Admin\AppData\Local\Temp\F8D2.exe
    C:\Users\Admin\AppData\Local\Temp\F8D2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Users\Admin\AppData\Local\Temp\F8D2.exe
      C:\Users\Admin\AppData\Local\Temp\F8D2.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:408
  • C:\Users\Admin\AppData\Local\Temp\FD57.exe
    C:\Users\Admin\AppData\Local\Temp\FD57.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\FD57.exe
      C:\Users\Admin\AppData\Local\Temp\FD57.exe
      2⤵
      • Executes dropped EXE
      PID:1912
  • C:\Users\Admin\AppData\Local\Temp\17.exe
    C:\Users\Admin\AppData\Local\Temp\17.exe
    1⤵
    • Executes dropped EXE
    PID:1772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 300
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2260
  • C:\Users\Admin\AppData\Local\Temp\289.exe
    C:\Users\Admin\AppData\Local\Temp\289.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\289.exe
      C:\Users\Admin\AppData\Local\Temp\289.exe
      2⤵
      • Executes dropped EXE
      PID:4432
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1772 -ip 1772
    1⤵
    • Suspicious use of NtCreateProcessExOtherParentProcess
    • Suspicious use of WriteProcessMemory
    PID:2280
  • C:\Users\Admin\AppData\Local\Temp\72E.exe
    C:\Users\Admin\AppData\Local\Temp\72E.exe
    1⤵
    • Executes dropped EXE
    PID:2624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 276
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1892
  • C:\Users\Admin\AppData\Local\Temp\12A8.exe
    C:\Users\Admin\AppData\Local\Temp\12A8.exe
    1⤵
    • Executes dropped EXE
    PID:4012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 296
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1996
  • C:\Users\Admin\AppData\Local\Temp\15F5.exe
    C:\Users\Admin\AppData\Local\Temp\15F5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\clean.exe
      "C:\Users\Admin\AppData\Local\Temp\clean.exe"
      2⤵
      • Executes dropped EXE
      PID:1500
    • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
      "C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4448
      • C:\Windows\SysWOW64\makecab.exe
        makecab
        3⤵
          PID:1000
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Duro.potx
          3⤵
            PID:4868
            • C:\Windows\SysWOW64\cmd.exe
              cmd
              4⤵
                PID:1744
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V /R "^JdynOpYGXnWkzSuDQWhFskbJYxaqZbxLWAnCRclynOJXkaaxpyDmJmtnSvAxQXHArlfSxDLxLiiDBmnGwYRUUVevcZJcVQgAupUqemqFzoNBaA$" Due.potx
                  5⤵
                    PID:4188
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    Forma.exe.com b
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1016
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com b
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:1724
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com b
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:3344
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                          8⤵
                          • Executes dropped EXE
                          PID:1564
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1
                    5⤵
                    • Runs ping.exe
                    PID:2056
            • C:\Users\Admin\AppData\Local\Temp\clean.exe
              "C:\Users\Admin\AppData\Local\Temp\clean.exe"
              2⤵
              • Executes dropped EXE
              PID:1324
            • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
              "C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe"
              2⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:3316
              • C:\Windows\SysWOW64\makecab.exe
                makecab
                3⤵
                  PID:5008
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c cmd < Aggrava.accdt
                  3⤵
                    PID:3960
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd
                      4⤵
                        PID:1428
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /V /R "^ShpzYFLbYRfWJuFRXyNbzLysSxWtdBORrgKocLRwRlexRlxdHPIcxtdioSAEIHivrnSxvvvjgLGoIKmHZGvBSzvYYDqDljzlrGszaqTlaviIninbaTFelFEKwTcTvTew$" Pie.accdt
                          5⤵
                            PID:4052
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                            Udi.exe.com k
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:2748
                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com k
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:2296
                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                                7⤵
                                • Executes dropped EXE
                                PID:3028
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1
                            5⤵
                            • Runs ping.exe
                            PID:4800
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4012 -ip 4012
                    1⤵
                    • Suspicious use of NtCreateProcessExOtherParentProcess
                    • Suspicious use of WriteProcessMemory
                    PID:1564
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2624 -ip 2624
                    1⤵
                    • Suspicious use of NtCreateProcessExOtherParentProcess
                    PID:1228

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  4
                  T1012

                  System Information Discovery

                  4
                  T1082

                  Peripheral Device Discovery

                  1
                  T1120

                  Remote System Discovery

                  1
                  T1018

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FD57.exe.log
                    MD5

                    e07da89fc7e325db9d25e845e27027a8

                    SHA1

                    4b6a03bcdb46f325984cbbb6302ff79f33637e19

                    SHA256

                    94ab73c00494d10a2159175b81e23047621451e3a566e5a0b1222379db634aaf

                    SHA512

                    1e33e34595ebb6ce129d0244199d29722c916c036da542c3001f84b10a964b96cec7a9fdd19e120d7840614b307b504be993a4f8538d54382aa4944575476dda

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
                    MD5

                    79e0927b299d73de30b0a0c157571452

                    SHA1

                    30958d8d86f294a834efa3eb1fe68a0a1a3871c9

                    SHA256

                    d83dc0bf198e911af34d035c1385a3cb4fa117c714f00ab91ed6f6eb457fea4e

                    SHA512

                    932bb49bd3fb4074d755f31301d06ae8e26d3b79f80cbf97227687fd865f8eb29a629d871e7a88e36f063079c012618b359a887984954530e41ace4862225321

                  • C:\Users\Admin\AppData\Local\Temp\12A8.exe
                    MD5

                    100f06c3c5a50552ecfde1fbf3e9b4bb

                    SHA1

                    1749c9ac51e7d76c5138c7a8a4de13ce16e7423a

                    SHA256

                    879b3d8f4e4f90f19da28a6ff8b46fac43c972a2b4b268a708966650b9148b7f

                    SHA512

                    474dd5169b516f0dba5d15d6ab75ef2b1e45dec18b7958a020cbe4a98499f6d9e13879ffa37777cad11a0b4fa84dd960a4b452fe4b475a8967768e1b28bda32a

                  • C:\Users\Admin\AppData\Local\Temp\12A8.exe
                    MD5

                    100f06c3c5a50552ecfde1fbf3e9b4bb

                    SHA1

                    1749c9ac51e7d76c5138c7a8a4de13ce16e7423a

                    SHA256

                    879b3d8f4e4f90f19da28a6ff8b46fac43c972a2b4b268a708966650b9148b7f

                    SHA512

                    474dd5169b516f0dba5d15d6ab75ef2b1e45dec18b7958a020cbe4a98499f6d9e13879ffa37777cad11a0b4fa84dd960a4b452fe4b475a8967768e1b28bda32a

                  • C:\Users\Admin\AppData\Local\Temp\15F5.exe
                    MD5

                    03efae21eae96e2e8c788217b0e68377

                    SHA1

                    ba46c911a47cced4b72a68d5e3083f6e0e153e45

                    SHA256

                    37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b

                    SHA512

                    4fa856972b7174b333e9aa1142834c6c25c2d31958cf7379f10ca2a948f99e134943e2a3c591ad88fd06d1d2d6fefa906eec6998c6c90f208b89b8bf11326d4c

                  • C:\Users\Admin\AppData\Local\Temp\15F5.exe
                    MD5

                    03efae21eae96e2e8c788217b0e68377

                    SHA1

                    ba46c911a47cced4b72a68d5e3083f6e0e153e45

                    SHA256

                    37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b

                    SHA512

                    4fa856972b7174b333e9aa1142834c6c25c2d31958cf7379f10ca2a948f99e134943e2a3c591ad88fd06d1d2d6fefa906eec6998c6c90f208b89b8bf11326d4c

                  • C:\Users\Admin\AppData\Local\Temp\17.exe
                    MD5

                    d985b4cfdceecc3c0fe4f3e4fda4e416

                    SHA1

                    f3c14a4d87569e54faaf0eac73ec1aafa2621dfa

                    SHA256

                    a8b37d6b073ee045ae63473cb1a592c974e896b19e3db06d552f955901c06db7

                    SHA512

                    560a056c076db6893f6407807d9a10d1078c148aa588d9de6ce1874eeac0a4feaf2102b656ba96316a32c89df97986f20cf77e55117e2c9bf97e52ef3381335c

                  • C:\Users\Admin\AppData\Local\Temp\17.exe
                    MD5

                    d985b4cfdceecc3c0fe4f3e4fda4e416

                    SHA1

                    f3c14a4d87569e54faaf0eac73ec1aafa2621dfa

                    SHA256

                    a8b37d6b073ee045ae63473cb1a592c974e896b19e3db06d552f955901c06db7

                    SHA512

                    560a056c076db6893f6407807d9a10d1078c148aa588d9de6ce1874eeac0a4feaf2102b656ba96316a32c89df97986f20cf77e55117e2c9bf97e52ef3381335c

                  • C:\Users\Admin\AppData\Local\Temp\289.exe
                    MD5

                    e39bd76b67571a7b3b5d906acd28912f

                    SHA1

                    1af7b40c48e84410ae95240b6694d8e1dcf11eeb

                    SHA256

                    17289dbd3bfde0ef26d5965a743d9658e88b46c72aa942e2df6e81a30e99153c

                    SHA512

                    e1abef757be16a1c2b5ff12be143681b71b2862b8ddad589594c89a8b30f3faf901a32cf6d2ac9693b744718bd5d1a6363457cfc7b415feccdf1ae945eb18a8b

                  • C:\Users\Admin\AppData\Local\Temp\289.exe
                    MD5

                    e39bd76b67571a7b3b5d906acd28912f

                    SHA1

                    1af7b40c48e84410ae95240b6694d8e1dcf11eeb

                    SHA256

                    17289dbd3bfde0ef26d5965a743d9658e88b46c72aa942e2df6e81a30e99153c

                    SHA512

                    e1abef757be16a1c2b5ff12be143681b71b2862b8ddad589594c89a8b30f3faf901a32cf6d2ac9693b744718bd5d1a6363457cfc7b415feccdf1ae945eb18a8b

                  • C:\Users\Admin\AppData\Local\Temp\289.exe
                    MD5

                    e39bd76b67571a7b3b5d906acd28912f

                    SHA1

                    1af7b40c48e84410ae95240b6694d8e1dcf11eeb

                    SHA256

                    17289dbd3bfde0ef26d5965a743d9658e88b46c72aa942e2df6e81a30e99153c

                    SHA512

                    e1abef757be16a1c2b5ff12be143681b71b2862b8ddad589594c89a8b30f3faf901a32cf6d2ac9693b744718bd5d1a6363457cfc7b415feccdf1ae945eb18a8b

                  • C:\Users\Admin\AppData\Local\Temp\72E.exe
                    MD5

                    0f9d1f2e3aaad601bb95a039b0aedcfb

                    SHA1

                    141e7b7b2a4a31b2a7e599b2d2064239fcc66707

                    SHA256

                    db4ec306ea32c01cb486566c699b9b88013beb26c2830319785bf5a4ee4735b5

                    SHA512

                    b68708a0aa425a3f90df3c1639aeb2358f34fa5bfb3691d3010cd528cdce99692269b13cda9f05172d8608fc08b7b7ca5449d495290a5e9e81221edfe9d052e7

                  • C:\Users\Admin\AppData\Local\Temp\72E.exe
                    MD5

                    0f9d1f2e3aaad601bb95a039b0aedcfb

                    SHA1

                    141e7b7b2a4a31b2a7e599b2d2064239fcc66707

                    SHA256

                    db4ec306ea32c01cb486566c699b9b88013beb26c2830319785bf5a4ee4735b5

                    SHA512

                    b68708a0aa425a3f90df3c1639aeb2358f34fa5bfb3691d3010cd528cdce99692269b13cda9f05172d8608fc08b7b7ca5449d495290a5e9e81221edfe9d052e7

                  • C:\Users\Admin\AppData\Local\Temp\F8D2.exe
                    MD5

                    0a52a6c6f04350ec811665f96d3935f0

                    SHA1

                    10a62112af2ba30630debf91c777af60624e545b

                    SHA256

                    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

                    SHA512

                    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

                  • C:\Users\Admin\AppData\Local\Temp\F8D2.exe
                    MD5

                    0a52a6c6f04350ec811665f96d3935f0

                    SHA1

                    10a62112af2ba30630debf91c777af60624e545b

                    SHA256

                    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

                    SHA512

                    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

                  • C:\Users\Admin\AppData\Local\Temp\F8D2.exe
                    MD5

                    0a52a6c6f04350ec811665f96d3935f0

                    SHA1

                    10a62112af2ba30630debf91c777af60624e545b

                    SHA256

                    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

                    SHA512

                    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

                  • C:\Users\Admin\AppData\Local\Temp\FD57.exe
                    MD5

                    5e34695c9f46f1e69ce731d3b7359c88

                    SHA1

                    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

                    SHA256

                    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

                    SHA512

                    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

                  • C:\Users\Admin\AppData\Local\Temp\FD57.exe
                    MD5

                    5e34695c9f46f1e69ce731d3b7359c88

                    SHA1

                    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

                    SHA256

                    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

                    SHA512

                    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

                  • C:\Users\Admin\AppData\Local\Temp\FD57.exe
                    MD5

                    5e34695c9f46f1e69ce731d3b7359c88

                    SHA1

                    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

                    SHA256

                    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

                    SHA512

                    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Due.potx
                    MD5

                    6684f94034e10a93758e2c22c75f1613

                    SHA1

                    25b7d85449caa642beafcf488f1af1fb745ad0ca

                    SHA256

                    3e6fff185ac509106bed8e02969acc2c272f65300249e66b5a504c92d4a58d0e

                    SHA512

                    43141e2a5f1cd92cff9a63e1af68d9a1af458ae8f5f7b489172d06e21fe103793a045ed4ee613b4618b42665c5d644d058c0ac78d19d0ef55cf5936201cfd1fb

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Duro.potx
                    MD5

                    32672958dfe282494f18f8be6b5daea8

                    SHA1

                    29eb8689b235ffc001286410039ff1399b9e3d33

                    SHA256

                    a9a4218d1a194894aaf6b487c502a24f0f84041a20e720a4a719201ffc31ae02

                    SHA512

                    05a7c2ee83b6284df5f072ba493a0b90e315e54c786ee22b159e3d1197335c72f8b637ddf2e1c7884c4275e0ebc553d68492ae2ed42b43d11c0010808e5dc5f4

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Era.potx
                    MD5

                    016c737a43c6e6e2cb7abf7d85c5057d

                    SHA1

                    e68f088fa89473aa3cc032429bcc62b4b0f61116

                    SHA256

                    b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b

                    SHA512

                    ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    MD5

                    42ab6e035df99a43dbb879c86b620b91

                    SHA1

                    c6e116569d17d8142dbb217b1f8bfa95bc148c38

                    SHA256

                    53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                    SHA512

                    2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    MD5

                    42ab6e035df99a43dbb879c86b620b91

                    SHA1

                    c6e116569d17d8142dbb217b1f8bfa95bc148c38

                    SHA256

                    53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                    SHA512

                    2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b
                    MD5

                    016c737a43c6e6e2cb7abf7d85c5057d

                    SHA1

                    e68f088fa89473aa3cc032429bcc62b4b0f61116

                    SHA256

                    b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b

                    SHA512

                    ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Aggrava.accdt
                    MD5

                    ea7b73c99c39a859e7e8b0a815570986

                    SHA1

                    bd74eb1f49d26a461060f131683021750889a65f

                    SHA256

                    edd2efdd14116825ff18d706aad2bd716382acbe678eda85c5057bd257b1a02e

                    SHA512

                    167288428c40eab8e1864bf7db8e70721790763bed0db598af1da860950839058255f58398a61070fbafeea575d9557ec7c6d5b9c424b217602968a40cdf34d9

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Migliore.accdt
                    MD5

                    d9119aa074bfaff410bb7a4139146a19

                    SHA1

                    74ea5a967fcba2dde0b27de519dbaf1ef7028636

                    SHA256

                    797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7

                    SHA512

                    1187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pie.accdt
                    MD5

                    a172c86dab6bebb6c82410c1f1c1567d

                    SHA1

                    56a171dfe8137793f45640fc31b3a159f5a84c7d

                    SHA256

                    d83dd02bf0531d87e4b1af3a68cd601b21d33e2a9e77bc7e8cf1753f77b10438

                    SHA512

                    107df456743e3e793ca75e2c5e7bfad1ee1801cae03636dec2539cd4c4995b601c3d79118ad0874c6caf8293d1812bf31d459549f7925cb814e30bad4fc30896

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                    MD5

                    42ab6e035df99a43dbb879c86b620b91

                    SHA1

                    c6e116569d17d8142dbb217b1f8bfa95bc148c38

                    SHA256

                    53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                    SHA512

                    2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                    MD5

                    42ab6e035df99a43dbb879c86b620b91

                    SHA1

                    c6e116569d17d8142dbb217b1f8bfa95bc148c38

                    SHA256

                    53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                    SHA512

                    2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k
                    MD5

                    d9119aa074bfaff410bb7a4139146a19

                    SHA1

                    74ea5a967fcba2dde0b27de519dbaf1ef7028636

                    SHA256

                    797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7

                    SHA512

                    1187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6

                  • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
                    MD5

                    ae5b62f74b751690528b1158da869f4b

                    SHA1

                    9ba07ae06ba49b16fa32dfdd51df33ae771597f4

                    SHA256

                    9300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5

                    SHA512

                    ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2

                  • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
                    MD5

                    ae5b62f74b751690528b1158da869f4b

                    SHA1

                    9ba07ae06ba49b16fa32dfdd51df33ae771597f4

                    SHA256

                    9300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5

                    SHA512

                    ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2

                  • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
                    MD5

                    6a537efb426fe0de4d613615a82fa729

                    SHA1

                    ed5acfd81d01a5804df26cb259793e532992f07a

                    SHA256

                    0f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b

                    SHA512

                    bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5

                  • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
                    MD5

                    6a537efb426fe0de4d613615a82fa729

                    SHA1

                    ed5acfd81d01a5804df26cb259793e532992f07a

                    SHA256

                    0f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b

                    SHA512

                    bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5

                  • C:\Users\Admin\AppData\Local\Temp\clean.exe
                    MD5

                    374a47aa60ba4ef1c2306be2949f0849

                    SHA1

                    612fedf2475d75d3805d9801f00de1111591b7cc

                    SHA256

                    c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

                    SHA512

                    ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

                  • C:\Users\Admin\AppData\Local\Temp\clean.exe
                    MD5

                    374a47aa60ba4ef1c2306be2949f0849

                    SHA1

                    612fedf2475d75d3805d9801f00de1111591b7cc

                    SHA256

                    c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

                    SHA512

                    ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

                  • C:\Users\Admin\AppData\Local\Temp\clean.exe
                    MD5

                    374a47aa60ba4ef1c2306be2949f0849

                    SHA1

                    612fedf2475d75d3805d9801f00de1111591b7cc

                    SHA256

                    c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

                    SHA512

                    ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

                  • memory/408-154-0x0000000000000000-mapping.dmp
                  • memory/864-148-0x00000000005D0000-0x00000000005D8000-memory.dmp
                    Filesize

                    32KB

                  • memory/864-149-0x0000000002250000-0x0000000002259000-memory.dmp
                    Filesize

                    36KB

                  • memory/1000-237-0x0000000000000000-mapping.dmp
                  • memory/1016-254-0x0000000000000000-mapping.dmp
                  • memory/1324-228-0x0000000000000000-mapping.dmp
                  • memory/1428-241-0x0000000000000000-mapping.dmp
                  • memory/1500-224-0x0000000000000000-mapping.dmp
                  • memory/1564-314-0x0000000006450000-0x0000000006A68000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/1564-297-0x0000000000000000-mapping.dmp
                  • memory/1564-298-0x0000000001200000-0x0000000001238000-memory.dmp
                    Filesize

                    224KB

                  • memory/1632-168-0x0000000005850000-0x0000000005851000-memory.dmp
                    Filesize

                    4KB

                  • memory/1632-167-0x0000000005E10000-0x0000000005E11000-memory.dmp
                    Filesize

                    4KB

                  • memory/1632-162-0x00000000056A0000-0x00000000056A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1632-160-0x0000000000C50000-0x0000000000C51000-memory.dmp
                    Filesize

                    4KB

                  • memory/1632-166-0x0000000005670000-0x0000000005671000-memory.dmp
                    Filesize

                    4KB

                  • memory/1632-157-0x0000000000000000-mapping.dmp
                  • memory/1708-146-0x0000000000000000-mapping.dmp
                  • memory/1708-147-0x0000000000400000-0x0000000000409000-memory.dmp
                    Filesize

                    36KB

                  • memory/1724-263-0x0000000000000000-mapping.dmp
                  • memory/1744-243-0x0000000000000000-mapping.dmp
                  • memory/1772-173-0x00000000005E0000-0x00000000005E9000-memory.dmp
                    Filesize

                    36KB

                  • memory/1772-172-0x00000000005D0000-0x00000000005D8000-memory.dmp
                    Filesize

                    32KB

                  • memory/1772-163-0x0000000000000000-mapping.dmp
                  • memory/1912-271-0x0000000006DA0000-0x0000000006DA1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1912-272-0x0000000007900000-0x0000000007901000-memory.dmp
                    Filesize

                    4KB

                  • memory/1912-273-0x0000000008000000-0x0000000008001000-memory.dmp
                    Filesize

                    4KB

                  • memory/1912-274-0x0000000007870000-0x0000000007871000-memory.dmp
                    Filesize

                    4KB

                  • memory/1912-268-0x0000000006610000-0x0000000006611000-memory.dmp
                    Filesize

                    4KB

                  • memory/1912-211-0x0000000005810000-0x0000000005E28000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/1912-198-0x0000000000000000-mapping.dmp
                  • memory/1912-199-0x0000000000400000-0x0000000000420000-memory.dmp
                    Filesize

                    128KB

                  • memory/2056-256-0x0000000000000000-mapping.dmp
                  • memory/2108-191-0x0000000002190000-0x00000000021C0000-memory.dmp
                    Filesize

                    192KB

                  • memory/2108-169-0x0000000000000000-mapping.dmp
                  • memory/2108-190-0x0000000002160000-0x0000000002182000-memory.dmp
                    Filesize

                    136KB

                  • memory/2296-261-0x0000000000000000-mapping.dmp
                  • memory/2624-246-0x00000000048B0000-0x000000000493F000-memory.dmp
                    Filesize

                    572KB

                  • memory/2624-236-0x0000000002D97000-0x0000000002DE6000-memory.dmp
                    Filesize

                    316KB

                  • memory/2624-174-0x0000000000000000-mapping.dmp
                  • memory/2748-251-0x0000000000000000-mapping.dmp
                  • memory/3028-291-0x00000000053A0000-0x00000000059B8000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/3028-284-0x00000000065F0000-0x00000000065F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3028-276-0x0000000000D50000-0x0000000000D70000-memory.dmp
                    Filesize

                    128KB

                  • memory/3028-275-0x0000000000000000-mapping.dmp
                  • memory/3220-216-0x0000000005460000-0x0000000005476000-memory.dmp
                    Filesize

                    88KB

                  • memory/3220-150-0x0000000000D20000-0x0000000000D36000-memory.dmp
                    Filesize

                    88KB

                  • memory/3316-231-0x0000000000000000-mapping.dmp
                  • memory/3344-265-0x0000000000000000-mapping.dmp
                  • memory/3792-151-0x0000000000000000-mapping.dmp
                  • memory/3960-239-0x0000000000000000-mapping.dmp
                  • memory/4012-223-0x00000000020E0000-0x000000000216F000-memory.dmp
                    Filesize

                    572KB

                  • memory/4012-222-0x0000000002090000-0x00000000020DF000-memory.dmp
                    Filesize

                    316KB

                  • memory/4012-213-0x0000000000000000-mapping.dmp
                  • memory/4052-244-0x0000000000000000-mapping.dmp
                  • memory/4188-245-0x0000000000000000-mapping.dmp
                  • memory/4432-186-0x0000000005940000-0x0000000005941000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-185-0x0000000005830000-0x0000000005831000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-195-0x0000000004C33000-0x0000000004C34000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-194-0x0000000004C32000-0x0000000004C33000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-193-0x0000000004C30000-0x0000000004C31000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-196-0x0000000004C34000-0x0000000004C36000-memory.dmp
                    Filesize

                    8KB

                  • memory/4432-192-0x0000000000400000-0x0000000000433000-memory.dmp
                    Filesize

                    204KB

                  • memory/4432-189-0x0000000005D40000-0x0000000005D41000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-188-0x0000000005A90000-0x0000000005A91000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-187-0x0000000005A40000-0x0000000005A41000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-176-0x0000000000000000-mapping.dmp
                  • memory/4432-197-0x0000000005E20000-0x0000000005E21000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-177-0x0000000000400000-0x0000000000433000-memory.dmp
                    Filesize

                    204KB

                  • memory/4432-180-0x0000000002470000-0x000000000248C000-memory.dmp
                    Filesize

                    112KB

                  • memory/4432-184-0x0000000005810000-0x0000000005811000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-183-0x00000000051F0000-0x00000000051F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4432-182-0x0000000002510000-0x000000000252B000-memory.dmp
                    Filesize

                    108KB

                  • memory/4448-227-0x0000000000000000-mapping.dmp
                  • memory/4800-253-0x0000000000000000-mapping.dmp
                  • memory/4868-238-0x0000000000000000-mapping.dmp
                  • memory/5008-235-0x0000000000000000-mapping.dmp
                  • memory/5076-219-0x00000000033C0000-0x00000000033C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/5076-220-0x00000000033C0000-0x00000000033C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/5076-217-0x0000000000000000-mapping.dmp