Resubmissions

14-11-2021 08:09

211114-j2cn6agbb5 10

14-11-2021 07:52

211114-jqdr3sgba4 10

Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    14-11-2021 07:52

General

  • Target

    0a52a6c6f04350ec811665f96d3935f0.exe

  • Size

    219KB

  • MD5

    0a52a6c6f04350ec811665f96d3935f0

  • SHA1

    10a62112af2ba30630debf91c777af60624e545b

  • SHA256

    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

  • SHA512

    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

185.159.80.90:38637

Extracted

Family

redline

Botnet

SuperStar

C2

185.215.113.29:36224

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

675718a5f2ce6d3cacf6cb04a512f5637eae995f

Attributes
  • url4cnc

    http://91.219.236.27/agrybirdsgamerept

    http://5.181.156.92/agrybirdsgamerept

    http://91.219.236.207/agrybirdsgamerept

    http://185.225.19.18/agrybirdsgamerept

    http://91.219.237.227/agrybirdsgamerept

    http://185.163.47.176/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

ddf183af4241e3172885cf1b2c4c1fb4ee03d05a

Attributes
  • url4cnc

    http://91.219.236.27/capibar

    http://5.181.156.92/capibar

    http://91.219.236.207/capibar

    http://185.225.19.18/capibar

    http://91.219.237.227/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

ОШИБКА

C2

185.183.32.161:45391

Extracted

Family

redline

Botnet

11/13

C2

94.103.9.133:1169

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe
    "C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe
      "C:\Users\Admin\AppData\Local\Temp\0a52a6c6f04350ec811665f96d3935f0.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2504
  • C:\Users\Admin\AppData\Local\Temp\246C.exe
    C:\Users\Admin\AppData\Local\Temp\246C.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\246C.exe
      C:\Users\Admin\AppData\Local\Temp\246C.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:2936
  • C:\Users\Admin\AppData\Local\Temp\293F.exe
    C:\Users\Admin\AppData\Local\Temp\293F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\293F.exe
      C:\Users\Admin\AppData\Local\Temp\293F.exe
      2⤵
      • Executes dropped EXE
      PID:544
  • C:\Users\Admin\AppData\Local\Temp\2C7D.exe
    C:\Users\Admin\AppData\Local\Temp\2C7D.exe
    1⤵
    • Executes dropped EXE
    PID:3756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 480
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:368
  • C:\Users\Admin\AppData\Local\Temp\3046.exe
    C:\Users\Admin\AppData\Local\Temp\3046.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\3046.exe
      C:\Users\Admin\AppData\Local\Temp\3046.exe
      2⤵
      • Executes dropped EXE
      PID:3624
  • C:\Users\Admin\AppData\Local\Temp\3597.exe
    C:\Users\Admin\AppData\Local\Temp\3597.exe
    1⤵
    • Executes dropped EXE
    PID:2488
  • C:\Users\Admin\AppData\Local\Temp\471C.exe
    C:\Users\Admin\AppData\Local\Temp\471C.exe
    1⤵
    • Executes dropped EXE
    PID:2248
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 884
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3192
  • C:\Users\Admin\AppData\Local\Temp\4FB8.exe
    C:\Users\Admin\AppData\Local\Temp\4FB8.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3636
    • C:\Users\Admin\AppData\Local\Temp\clean.exe
      "C:\Users\Admin\AppData\Local\Temp\clean.exe"
      2⤵
      • Executes dropped EXE
      PID:4012
    • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
      "C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\SysWOW64\makecab.exe
        makecab
        3⤵
          PID:296
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Duro.potx
          3⤵
            PID:604
            • C:\Windows\SysWOW64\cmd.exe
              cmd
              4⤵
                PID:820
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V /R "^JdynOpYGXnWkzSuDQWhFskbJYxaqZbxLWAnCRclynOJXkaaxpyDmJmtnSvAxQXHArlfSxDLxLiiDBmnGwYRUUVevcZJcVQgAupUqemqFzoNBaA$" Due.potx
                  5⤵
                    PID:1316
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    Forma.exe.com b
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:3264
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com b
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:3580
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                        7⤵
                        • Executes dropped EXE
                        PID:3820
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1
                    5⤵
                    • Runs ping.exe
                    PID:1328
            • C:\Users\Admin\AppData\Local\Temp\clean.exe
              "C:\Users\Admin\AppData\Local\Temp\clean.exe"
              2⤵
              • Executes dropped EXE
              PID:1420
            • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
              "C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe"
              2⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1700
              • C:\Windows\SysWOW64\makecab.exe
                makecab
                3⤵
                  PID:1144
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c cmd < Aggrava.accdt
                  3⤵
                    PID:3736
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd
                      4⤵
                        PID:3476
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /V /R "^ShpzYFLbYRfWJuFRXyNbzLysSxWtdBORrgKocLRwRlexRlxdHPIcxtdioSAEIHivrnSxvvvjgLGoIKmHZGvBSzvYYDqDljzlrGszaqTlaviIninbaTFelFEKwTcTvTew$" Pie.accdt
                          5⤵
                            PID:2860
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                            Udi.exe.com k
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:3440
                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com k
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3984
                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                                7⤵
                                • Executes dropped EXE
                                PID:3096
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1
                            5⤵
                            • Runs ping.exe
                            PID:2704

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  2
                  T1081

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Peripheral Device Discovery

                  1
                  T1120

                  Remote System Discovery

                  1
                  T1018

                  Collection

                  Data from Local System

                  2
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\293F.exe.log
                    MD5

                    41fbed686f5700fc29aaccf83e8ba7fd

                    SHA1

                    5271bc29538f11e42a3b600c8dc727186e912456

                    SHA256

                    df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

                    SHA512

                    234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
                    MD5

                    d275cb1d914b41587ddc53a37454cc66

                    SHA1

                    485baaa5262b5fd5b4ae275bba17795ca7604874

                    SHA256

                    664798f951d554c293bf967523bf011af3c2b27f9ff02fd3ef5b472911a1995c

                    SHA512

                    019afc1076f2c0efbc287f20c944bfa6915123f133aa9e4555d9ab0bb95660a6253aa00bdd63cff2c32e71d967bce4aa8548a82d5b9406fe9f4d0351cadddb03

                  • C:\Users\Admin\AppData\Local\Temp\246C.exe
                    MD5

                    0a52a6c6f04350ec811665f96d3935f0

                    SHA1

                    10a62112af2ba30630debf91c777af60624e545b

                    SHA256

                    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

                    SHA512

                    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

                  • C:\Users\Admin\AppData\Local\Temp\246C.exe
                    MD5

                    0a52a6c6f04350ec811665f96d3935f0

                    SHA1

                    10a62112af2ba30630debf91c777af60624e545b

                    SHA256

                    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

                    SHA512

                    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

                  • C:\Users\Admin\AppData\Local\Temp\246C.exe
                    MD5

                    0a52a6c6f04350ec811665f96d3935f0

                    SHA1

                    10a62112af2ba30630debf91c777af60624e545b

                    SHA256

                    78eb62fcd7085f6e34ca30b112672ab1ddca5d98f81d85b6021621b98c43ee0f

                    SHA512

                    6da5f167f412b3f59fd088c8026cd1df720b29beb640d8fb2ebbff1fbc6fdd089994514ee24757aa75f927ec0d55d4ca7d2d5ce18e7da45444feeb203f95ae63

                  • C:\Users\Admin\AppData\Local\Temp\293F.exe
                    MD5

                    5e34695c9f46f1e69ce731d3b7359c88

                    SHA1

                    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

                    SHA256

                    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

                    SHA512

                    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

                  • C:\Users\Admin\AppData\Local\Temp\293F.exe
                    MD5

                    5e34695c9f46f1e69ce731d3b7359c88

                    SHA1

                    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

                    SHA256

                    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

                    SHA512

                    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

                  • C:\Users\Admin\AppData\Local\Temp\293F.exe
                    MD5

                    5e34695c9f46f1e69ce731d3b7359c88

                    SHA1

                    e1e5bb43f0c7556bcccc8cb698f854694bdc024a

                    SHA256

                    97f96815d81f9c1c8ede31f1c21fda2bee7cbab3490184ef833d9d2e8c17e6fc

                    SHA512

                    659fa0b695942c35dd4ef499d6c01d9b2a8c23254ea31465a126fd71a0d542ee71da9349ffc8226083393ed37c0668f63c97cc7ef3e014eae793b1f1ba7d6b43

                  • C:\Users\Admin\AppData\Local\Temp\2C7D.exe
                    MD5

                    d985b4cfdceecc3c0fe4f3e4fda4e416

                    SHA1

                    f3c14a4d87569e54faaf0eac73ec1aafa2621dfa

                    SHA256

                    a8b37d6b073ee045ae63473cb1a592c974e896b19e3db06d552f955901c06db7

                    SHA512

                    560a056c076db6893f6407807d9a10d1078c148aa588d9de6ce1874eeac0a4feaf2102b656ba96316a32c89df97986f20cf77e55117e2c9bf97e52ef3381335c

                  • C:\Users\Admin\AppData\Local\Temp\2C7D.exe
                    MD5

                    d985b4cfdceecc3c0fe4f3e4fda4e416

                    SHA1

                    f3c14a4d87569e54faaf0eac73ec1aafa2621dfa

                    SHA256

                    a8b37d6b073ee045ae63473cb1a592c974e896b19e3db06d552f955901c06db7

                    SHA512

                    560a056c076db6893f6407807d9a10d1078c148aa588d9de6ce1874eeac0a4feaf2102b656ba96316a32c89df97986f20cf77e55117e2c9bf97e52ef3381335c

                  • C:\Users\Admin\AppData\Local\Temp\3046.exe
                    MD5

                    9e4a09225727cabc9f2e2ddbc5f1f139

                    SHA1

                    e9cc19f732c10d61406e9ac5952aac729713f84f

                    SHA256

                    aab06233ca39c09e8f64b81f2f972f6bc546363c8c8edd542d92fc9c3a9f64d8

                    SHA512

                    fe81f4dfb1a0137fae83bb04ad88d1f4525fa60fa931ca3c54f4f1783786b02e193daa9cdda5e1bbb946a58e2b203b91aeaaedc48dadcf91cbfa1bfc4e259d2f

                  • C:\Users\Admin\AppData\Local\Temp\3046.exe
                    MD5

                    9e4a09225727cabc9f2e2ddbc5f1f139

                    SHA1

                    e9cc19f732c10d61406e9ac5952aac729713f84f

                    SHA256

                    aab06233ca39c09e8f64b81f2f972f6bc546363c8c8edd542d92fc9c3a9f64d8

                    SHA512

                    fe81f4dfb1a0137fae83bb04ad88d1f4525fa60fa931ca3c54f4f1783786b02e193daa9cdda5e1bbb946a58e2b203b91aeaaedc48dadcf91cbfa1bfc4e259d2f

                  • C:\Users\Admin\AppData\Local\Temp\3046.exe
                    MD5

                    9e4a09225727cabc9f2e2ddbc5f1f139

                    SHA1

                    e9cc19f732c10d61406e9ac5952aac729713f84f

                    SHA256

                    aab06233ca39c09e8f64b81f2f972f6bc546363c8c8edd542d92fc9c3a9f64d8

                    SHA512

                    fe81f4dfb1a0137fae83bb04ad88d1f4525fa60fa931ca3c54f4f1783786b02e193daa9cdda5e1bbb946a58e2b203b91aeaaedc48dadcf91cbfa1bfc4e259d2f

                  • C:\Users\Admin\AppData\Local\Temp\3597.exe
                    MD5

                    0f9d1f2e3aaad601bb95a039b0aedcfb

                    SHA1

                    141e7b7b2a4a31b2a7e599b2d2064239fcc66707

                    SHA256

                    db4ec306ea32c01cb486566c699b9b88013beb26c2830319785bf5a4ee4735b5

                    SHA512

                    b68708a0aa425a3f90df3c1639aeb2358f34fa5bfb3691d3010cd528cdce99692269b13cda9f05172d8608fc08b7b7ca5449d495290a5e9e81221edfe9d052e7

                  • C:\Users\Admin\AppData\Local\Temp\3597.exe
                    MD5

                    0f9d1f2e3aaad601bb95a039b0aedcfb

                    SHA1

                    141e7b7b2a4a31b2a7e599b2d2064239fcc66707

                    SHA256

                    db4ec306ea32c01cb486566c699b9b88013beb26c2830319785bf5a4ee4735b5

                    SHA512

                    b68708a0aa425a3f90df3c1639aeb2358f34fa5bfb3691d3010cd528cdce99692269b13cda9f05172d8608fc08b7b7ca5449d495290a5e9e81221edfe9d052e7

                  • C:\Users\Admin\AppData\Local\Temp\471C.exe
                    MD5

                    7eff0f5b940a4369f71f85c3bf7b0f0d

                    SHA1

                    e1cf8d6fbdf6ff77a8f0391b472fa2752acadf90

                    SHA256

                    5523638949848b383861e23b4d54caa09d1c7e047fb2293bd3938416339d5b59

                    SHA512

                    823e180101da006dd2eb1dad1a7b1a9b35bf71589a1cedec62a006151a38e138bcb59cf881a61ed6b8f95fa62703a729d89adffd7728e39eec2bc8fe5c7312a9

                  • C:\Users\Admin\AppData\Local\Temp\471C.exe
                    MD5

                    7eff0f5b940a4369f71f85c3bf7b0f0d

                    SHA1

                    e1cf8d6fbdf6ff77a8f0391b472fa2752acadf90

                    SHA256

                    5523638949848b383861e23b4d54caa09d1c7e047fb2293bd3938416339d5b59

                    SHA512

                    823e180101da006dd2eb1dad1a7b1a9b35bf71589a1cedec62a006151a38e138bcb59cf881a61ed6b8f95fa62703a729d89adffd7728e39eec2bc8fe5c7312a9

                  • C:\Users\Admin\AppData\Local\Temp\4FB8.exe
                    MD5

                    03efae21eae96e2e8c788217b0e68377

                    SHA1

                    ba46c911a47cced4b72a68d5e3083f6e0e153e45

                    SHA256

                    37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b

                    SHA512

                    4fa856972b7174b333e9aa1142834c6c25c2d31958cf7379f10ca2a948f99e134943e2a3c591ad88fd06d1d2d6fefa906eec6998c6c90f208b89b8bf11326d4c

                  • C:\Users\Admin\AppData\Local\Temp\4FB8.exe
                    MD5

                    03efae21eae96e2e8c788217b0e68377

                    SHA1

                    ba46c911a47cced4b72a68d5e3083f6e0e153e45

                    SHA256

                    37b17ce0ed1fcc87e0f94f0039686901af4c6e822a7d514eafca4c5faae88f0b

                    SHA512

                    4fa856972b7174b333e9aa1142834c6c25c2d31958cf7379f10ca2a948f99e134943e2a3c591ad88fd06d1d2d6fefa906eec6998c6c90f208b89b8bf11326d4c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Due.potx
                    MD5

                    6684f94034e10a93758e2c22c75f1613

                    SHA1

                    25b7d85449caa642beafcf488f1af1fb745ad0ca

                    SHA256

                    3e6fff185ac509106bed8e02969acc2c272f65300249e66b5a504c92d4a58d0e

                    SHA512

                    43141e2a5f1cd92cff9a63e1af68d9a1af458ae8f5f7b489172d06e21fe103793a045ed4ee613b4618b42665c5d644d058c0ac78d19d0ef55cf5936201cfd1fb

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Duro.potx
                    MD5

                    32672958dfe282494f18f8be6b5daea8

                    SHA1

                    29eb8689b235ffc001286410039ff1399b9e3d33

                    SHA256

                    a9a4218d1a194894aaf6b487c502a24f0f84041a20e720a4a719201ffc31ae02

                    SHA512

                    05a7c2ee83b6284df5f072ba493a0b90e315e54c786ee22b159e3d1197335c72f8b637ddf2e1c7884c4275e0ebc553d68492ae2ed42b43d11c0010808e5dc5f4

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Era.potx
                    MD5

                    016c737a43c6e6e2cb7abf7d85c5057d

                    SHA1

                    e68f088fa89473aa3cc032429bcc62b4b0f61116

                    SHA256

                    b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b

                    SHA512

                    ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forma.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b
                    MD5

                    016c737a43c6e6e2cb7abf7d85c5057d

                    SHA1

                    e68f088fa89473aa3cc032429bcc62b4b0f61116

                    SHA256

                    b1263474b5adfaa1419a51ebd697ddcb05ff89bc6c037e08d376994f4550957b

                    SHA512

                    ebba96e749127d7678bae1d47cd00a287812a49840da72932f97e8469e49a3eb01b0c198aa69ae42c03211cfed275c77fdf086679433dc8c55ea60b1ccf3c607

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Aggrava.accdt
                    MD5

                    ea7b73c99c39a859e7e8b0a815570986

                    SHA1

                    bd74eb1f49d26a461060f131683021750889a65f

                    SHA256

                    edd2efdd14116825ff18d706aad2bd716382acbe678eda85c5057bd257b1a02e

                    SHA512

                    167288428c40eab8e1864bf7db8e70721790763bed0db598af1da860950839058255f58398a61070fbafeea575d9557ec7c6d5b9c424b217602968a40cdf34d9

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Migliore.accdt
                    MD5

                    d9119aa074bfaff410bb7a4139146a19

                    SHA1

                    74ea5a967fcba2dde0b27de519dbaf1ef7028636

                    SHA256

                    797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7

                    SHA512

                    1187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pie.accdt
                    MD5

                    a172c86dab6bebb6c82410c1f1c1567d

                    SHA1

                    56a171dfe8137793f45640fc31b3a159f5a84c7d

                    SHA256

                    d83dd02bf0531d87e4b1af3a68cd601b21d33e2a9e77bc7e8cf1753f77b10438

                    SHA512

                    107df456743e3e793ca75e2c5e7bfad1ee1801cae03636dec2539cd4c4995b601c3d79118ad0874c6caf8293d1812bf31d459549f7925cb814e30bad4fc30896

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe
                    MD5

                    b58b926c3574d28d5b7fdd2ca3ec30d5

                    SHA1

                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                    SHA256

                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                    SHA512

                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Udi.exe.com
                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k
                    MD5

                    d9119aa074bfaff410bb7a4139146a19

                    SHA1

                    74ea5a967fcba2dde0b27de519dbaf1ef7028636

                    SHA256

                    797bdb0508bf241ccc4beff1da822e26b5113592556fbbf53623ec2f0c432ec7

                    SHA512

                    1187f6c0f0f9488bfd57129622b24e747b54a50cb1141bc7fc9e1d62e9a80c415efa85c7322d3391a88fb9e9b8335daabf0e258d3896f2eba571e9e7fbba32b6

                  • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
                    MD5

                    ae5b62f74b751690528b1158da869f4b

                    SHA1

                    9ba07ae06ba49b16fa32dfdd51df33ae771597f4

                    SHA256

                    9300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5

                    SHA512

                    ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2

                  • C:\Users\Admin\AppData\Local\Temp\OQTGVRp.exe
                    MD5

                    ae5b62f74b751690528b1158da869f4b

                    SHA1

                    9ba07ae06ba49b16fa32dfdd51df33ae771597f4

                    SHA256

                    9300234fb143a410b3fc3fa0e0631a6a15f563a086af6854d0917ae5653ff0f5

                    SHA512

                    ba5fd421118e296b9678cbabc19419db1645dbf4c403e5d20cc29a6a2e6e41b71a18e4779004dd79c2f8ede2f13ca9d7ebd5717954cb92bc990d338b77a6e3a2

                  • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
                    MD5

                    6a537efb426fe0de4d613615a82fa729

                    SHA1

                    ed5acfd81d01a5804df26cb259793e532992f07a

                    SHA256

                    0f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b

                    SHA512

                    bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5

                  • C:\Users\Admin\AppData\Local\Temp\QdUPABU.exe
                    MD5

                    6a537efb426fe0de4d613615a82fa729

                    SHA1

                    ed5acfd81d01a5804df26cb259793e532992f07a

                    SHA256

                    0f20bd03381fabc111c319d58c04e5c8c4fdf4a12fbfed2ae5b0d13b8964ff7b

                    SHA512

                    bbdc5c3ffd04bc2e35b6cb476dd05315db9d6673edea1b7beafbf70544d4f4a54652213c149362dd8392fddb47d341ee9b17e109d0f8fd8286fceca7abf17ba5

                  • C:\Users\Admin\AppData\Local\Temp\clean.exe
                    MD5

                    374a47aa60ba4ef1c2306be2949f0849

                    SHA1

                    612fedf2475d75d3805d9801f00de1111591b7cc

                    SHA256

                    c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

                    SHA512

                    ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

                  • C:\Users\Admin\AppData\Local\Temp\clean.exe
                    MD5

                    374a47aa60ba4ef1c2306be2949f0849

                    SHA1

                    612fedf2475d75d3805d9801f00de1111591b7cc

                    SHA256

                    c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

                    SHA512

                    ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

                  • C:\Users\Admin\AppData\Local\Temp\clean.exe
                    MD5

                    374a47aa60ba4ef1c2306be2949f0849

                    SHA1

                    612fedf2475d75d3805d9801f00de1111591b7cc

                    SHA256

                    c1570c01feaf033c8d7697a7a873b77754b22aa67e0ca0499ed22095b651d2af

                    SHA512

                    ecb64e77cbca48ae129c08c93565c937a336c7f0016d19a12b76aee8e2508f21615ee1c104123ed5b5dc5e0e077bc81ac8c7042285e778b855a009b6087fad9d

                  • memory/296-206-0x0000000000000000-mapping.dmp
                  • memory/544-238-0x0000000006A30000-0x0000000006A31000-memory.dmp
                    Filesize

                    4KB

                  • memory/544-178-0x0000000004EA0000-0x00000000054A6000-memory.dmp
                    Filesize

                    6.0MB

                  • memory/544-212-0x0000000005F40000-0x0000000005F41000-memory.dmp
                    Filesize

                    4KB

                  • memory/544-208-0x0000000005AC0000-0x0000000005AC1000-memory.dmp
                    Filesize

                    4KB

                  • memory/544-168-0x0000000000400000-0x0000000000420000-memory.dmp
                    Filesize

                    128KB

                  • memory/544-169-0x0000000000418EEA-mapping.dmp
                  • memory/544-239-0x0000000007130000-0x0000000007131000-memory.dmp
                    Filesize

                    4KB

                  • memory/604-218-0x0000000000000000-mapping.dmp
                  • memory/820-221-0x0000000000000000-mapping.dmp
                  • memory/1028-137-0x0000000000000000-mapping.dmp
                  • memory/1028-156-0x0000000001F60000-0x0000000001F90000-memory.dmp
                    Filesize

                    192KB

                  • memory/1028-153-0x0000000001F30000-0x0000000001F52000-memory.dmp
                    Filesize

                    136KB

                  • memory/1144-205-0x0000000000000000-mapping.dmp
                  • memory/1316-225-0x0000000000000000-mapping.dmp
                  • memory/1328-233-0x0000000000000000-mapping.dmp
                  • memory/1420-198-0x0000000000000000-mapping.dmp
                  • memory/1652-197-0x0000000000000000-mapping.dmp
                  • memory/1700-202-0x0000000000000000-mapping.dmp
                  • memory/1904-120-0x0000000000000000-mapping.dmp
                  • memory/1904-128-0x0000000000440000-0x00000000004EE000-memory.dmp
                    Filesize

                    696KB

                  • memory/1904-126-0x0000000000440000-0x00000000004EE000-memory.dmp
                    Filesize

                    696KB

                  • memory/2096-115-0x0000000000490000-0x0000000000498000-memory.dmp
                    Filesize

                    32KB

                  • memory/2096-116-0x0000000000680000-0x0000000000689000-memory.dmp
                    Filesize

                    36KB

                  • memory/2248-186-0x0000000000400000-0x0000000000491000-memory.dmp
                    Filesize

                    580KB

                  • memory/2248-185-0x0000000002220000-0x00000000022AF000-memory.dmp
                    Filesize

                    572KB

                  • memory/2248-184-0x0000000000550000-0x000000000069A000-memory.dmp
                    Filesize

                    1.3MB

                  • memory/2248-180-0x0000000000000000-mapping.dmp
                  • memory/2488-193-0x0000000000400000-0x0000000002B85000-memory.dmp
                    Filesize

                    39.5MB

                  • memory/2488-149-0x0000000000000000-mapping.dmp
                  • memory/2488-187-0x0000000004800000-0x000000000488F000-memory.dmp
                    Filesize

                    572KB

                  • memory/2504-117-0x0000000000400000-0x0000000000409000-memory.dmp
                    Filesize

                    36KB

                  • memory/2504-118-0x0000000000402DD8-mapping.dmp
                  • memory/2704-224-0x0000000000000000-mapping.dmp
                  • memory/2860-215-0x0000000000000000-mapping.dmp
                  • memory/2936-124-0x0000000000402DD8-mapping.dmp
                  • memory/3008-119-0x0000000000E30000-0x0000000000E46000-memory.dmp
                    Filesize

                    88KB

                  • memory/3008-167-0x0000000002EB0000-0x0000000002EC6000-memory.dmp
                    Filesize

                    88KB

                  • memory/3096-251-0x0000000004BF0000-0x00000000051F6000-memory.dmp
                    Filesize

                    6.0MB

                  • memory/3096-240-0x0000000000390000-0x00000000003B0000-memory.dmp
                    Filesize

                    128KB

                  • memory/3264-229-0x0000000000000000-mapping.dmp
                  • memory/3440-219-0x0000000000000000-mapping.dmp
                  • memory/3476-214-0x0000000000000000-mapping.dmp
                  • memory/3580-236-0x0000000000000000-mapping.dmp
                  • memory/3624-163-0x0000000005510000-0x0000000005511000-memory.dmp
                    Filesize

                    4KB

                  • memory/3624-164-0x0000000005620000-0x0000000005621000-memory.dmp
                    Filesize

                    4KB

                  • memory/3624-161-0x0000000002273000-0x0000000002274000-memory.dmp
                    Filesize

                    4KB

                  • memory/3624-159-0x0000000002270000-0x0000000002271000-memory.dmp
                    Filesize

                    4KB

                  • memory/3624-158-0x0000000000400000-0x0000000000433000-memory.dmp
                    Filesize

                    204KB

                  • memory/3624-157-0x00000000024E0000-0x00000000024FB000-memory.dmp
                    Filesize

                    108KB

                  • memory/3624-152-0x0000000002250000-0x000000000226C000-memory.dmp
                    Filesize

                    112KB

                  • memory/3624-155-0x0000000002272000-0x0000000002273000-memory.dmp
                    Filesize

                    4KB

                  • memory/3624-162-0x00000000054E0000-0x00000000054E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3624-160-0x0000000004E70000-0x0000000004E71000-memory.dmp
                    Filesize

                    4KB

                  • memory/3624-146-0x000000000040CD2F-mapping.dmp
                  • memory/3624-145-0x0000000000400000-0x0000000000433000-memory.dmp
                    Filesize

                    204KB

                  • memory/3624-165-0x0000000002274000-0x0000000002276000-memory.dmp
                    Filesize

                    8KB

                  • memory/3624-166-0x00000000056A0000-0x00000000056A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3636-190-0x0000000002450000-0x0000000002451000-memory.dmp
                    Filesize

                    4KB

                  • memory/3636-191-0x0000000002450000-0x0000000002451000-memory.dmp
                    Filesize

                    4KB

                  • memory/3636-188-0x0000000000000000-mapping.dmp
                  • memory/3736-211-0x0000000000000000-mapping.dmp
                  • memory/3756-143-0x0000000000400000-0x0000000000433000-memory.dmp
                    Filesize

                    204KB

                  • memory/3756-142-0x0000000002030000-0x0000000002039000-memory.dmp
                    Filesize

                    36KB

                  • memory/3756-141-0x0000000002020000-0x0000000002028000-memory.dmp
                    Filesize

                    32KB

                  • memory/3756-131-0x0000000000000000-mapping.dmp
                  • memory/3820-269-0x0000000006D40000-0x0000000006D41000-memory.dmp
                    Filesize

                    4KB

                  • memory/3820-277-0x0000000007D30000-0x0000000007D31000-memory.dmp
                    Filesize

                    4KB

                  • memory/3820-257-0x0000000000710000-0x0000000000748000-memory.dmp
                    Filesize

                    224KB

                  • memory/3932-148-0x0000000005570000-0x0000000005571000-memory.dmp
                    Filesize

                    4KB

                  • memory/3932-127-0x0000000000000000-mapping.dmp
                  • memory/3932-134-0x0000000000710000-0x0000000000711000-memory.dmp
                    Filesize

                    4KB

                  • memory/3932-136-0x0000000004F40000-0x0000000004F41000-memory.dmp
                    Filesize

                    4KB

                  • memory/3932-140-0x0000000001160000-0x0000000001161000-memory.dmp
                    Filesize

                    4KB

                  • memory/3932-144-0x0000000001100000-0x0000000001176000-memory.dmp
                    Filesize

                    472KB

                  • memory/3984-234-0x0000000000000000-mapping.dmp
                  • memory/4012-194-0x0000000000000000-mapping.dmp