Analysis

  • max time kernel
    163s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    19-03-2022 11:46

General

  • Target

    d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989.exe

  • Size

    8KB

  • MD5

    8e0cb3ec8385850c7dae3859e3e16cc9

  • SHA1

    f199182de1a4eabac1cecb49687c579bac783b6b

  • SHA256

    d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989

  • SHA512

    97a4065ce4a0e42cd3299209cfa48e0dbf0da0715ff4ddff70dda9c38e31c6597210a7fa1c4e52ca8efbd0f9da7afeab2e91f85ce5ae930f6bd19e05d0cd3889

Malware Config

Extracted

Family

vidar

Version

48.7

Botnet

933

C2

https://mstdn.social/@anapa

https://mastodon.social/@mniami

Attributes
  • profile_id

    933

Signatures

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • OnlyLogger Payload 2 IoCs
  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • NSIS installer 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989.exe
    "C:\Users\Admin\AppData\Local\Temp\d41c3b72a7759a814becaa2a49e3290ee6cd957da85a300e37c48658e3ad1989.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
      "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Users\Admin\AppData\Local\Temp\chrome.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3056
      • C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe
        "C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3092
      • C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe
        "C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe"
        3⤵
        • Executes dropped EXE
        PID:2064
      • C:\Users\Admin\AppData\Local\Temp\inst1.exe
        "C:\Users\Admin\AppData\Local\Temp\inst1.exe"
        3⤵
        • Executes dropped EXE
        PID:4184
      • C:\Users\Admin\AppData\Local\Temp\chrome update.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome update.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4844
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 4844 -s 1688
          4⤵
          • Program crash
          PID:4076
      • C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe
        "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"
        3⤵
        • Executes dropped EXE
        PID:1796
      • C:\Users\Admin\AppData\Local\Temp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\setup.exe"
        3⤵
        • Executes dropped EXE
        PID:2388
      • C:\Users\Admin\AppData\Local\Temp\lish-game.exe
        "C:\Users\Admin\AppData\Local\Temp\lish-game.exe"
        3⤵
        • Executes dropped EXE
        PID:4920
      • C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe
        "C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3908
      • C:\Users\Admin\AppData\Local\Temp\chrome1.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:544
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 544 -s 1688
          4⤵
          • Program crash
          PID:1772
      • C:\Users\Admin\AppData\Local\Temp\chrome2.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2728 -s 1672
          4⤵
          • Program crash
          PID:208
      • C:\Users\Admin\AppData\Local\Temp\chrome3.exe
        "C:\Users\Admin\AppData\Local\Temp\chrome3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4820
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 4820 -s 1672
          4⤵
          • Program crash
          PID:4112
      • C:\Users\Admin\AppData\Local\Temp\Chrome5.exe
        "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4672
        • C:\Windows\System32\conhost.exe
          "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"
          4⤵
            PID:4636
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 460 -p 4820 -ip 4820
      1⤵
        PID:4532
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 404 -p 3056 -ip 3056
        1⤵
          PID:4788
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 488 -p 4844 -ip 4844
          1⤵
            PID:4584
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 484 -p 544 -ip 544
            1⤵
              PID:1856
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -pss -s 432 -p 2728 -ip 2728
              1⤵
                PID:3504
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2388 -ip 2388
                1⤵
                  PID:3280
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2388 -ip 2388
                  1⤵
                    PID:3020
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2388 -ip 2388
                    1⤵
                      PID:2300
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2388 -ip 2388
                      1⤵
                        PID:3804
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2388 -ip 2388
                        1⤵
                          PID:3448
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2388 -ip 2388
                          1⤵
                            PID:4420
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2388 -ip 2388
                            1⤵
                              PID:4932
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2388 -ip 2388
                              1⤵
                                PID:4840
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2388 -ip 2388
                                1⤵
                                  PID:1240
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 2388 -ip 2388
                                  1⤵
                                    PID:1756
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2388 -ip 2388
                                    1⤵
                                      PID:4836
                                    • C:\Windows\system32\rundll32.exe
                                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                      1⤵
                                      • Process spawned unexpected child process
                                      • Suspicious use of WriteProcessMemory
                                      PID:4588
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                        2⤵
                                          PID:2180

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v6

                                      Discovery

                                      Query Registry

                                      1
                                      T1012

                                      System Information Discovery

                                      2
                                      T1082

                                      Command and Control

                                      Web Service

                                      1
                                      T1102

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
                                        MD5

                                        54e9306f95f32e50ccd58af19753d929

                                        SHA1

                                        eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

                                        SHA256

                                        45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

                                        SHA512

                                        8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
                                        MD5

                                        beb1b1c56940c3cee6994038104e896e

                                        SHA1

                                        5b1dd56882d3e88f3f4a2b2e22caa1198e79f955

                                        SHA256

                                        4667ace817516c4344a52fac5bdf4f75e1ea9b4e4afc767a21b87916811469d8

                                        SHA512

                                        944bb0909909290b253758af221d6d59df9fb2070ba116d180f00fd399b24a8094bf3fbcaa288cd0fba6d234d3fdd7dc3eb809d1f19bc9fd1955d309af6c13bb

                                      • C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe
                                        MD5

                                        8aefe56525e8a1a44a80b622a82c50b1

                                        SHA1

                                        d347b5db4687b32cef74a25ac6a35365e51285da

                                        SHA256

                                        49e777a3e6a8c700bedec5c50a02af63de5c755aea26cc5e600ba6fc3f60bfd4

                                        SHA512

                                        2b1097344b65c77d136f7f0fa673aa07add3613faa09e9b534623a2f748c2e3a8c6c3062b45b5c719a2ce0208c0e6266f2ed7f08eb49c13d9a65198748f84b99

                                      • C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe
                                        MD5

                                        8aefe56525e8a1a44a80b622a82c50b1

                                        SHA1

                                        d347b5db4687b32cef74a25ac6a35365e51285da

                                        SHA256

                                        49e777a3e6a8c700bedec5c50a02af63de5c755aea26cc5e600ba6fc3f60bfd4

                                        SHA512

                                        2b1097344b65c77d136f7f0fa673aa07add3613faa09e9b534623a2f748c2e3a8c6c3062b45b5c719a2ce0208c0e6266f2ed7f08eb49c13d9a65198748f84b99

                                      • C:\Users\Admin\AppData\Local\Temp\Chrome5.exe
                                        MD5

                                        077b29fe766f4a64261a2e9c3f9b7394

                                        SHA1

                                        11e58cbbb788569e91806f11102293622c353536

                                        SHA256

                                        a6f300440a7accb018ac2dd7c5fe23619b15cc28ac58c56a6671c03ca47d4f86

                                        SHA512

                                        d52b50c602319cc8c52f7900066088f9d242107263c41d2bf50b89f74a19d9cddb3effb84175417f2dfc05fee8b505e3bb2eeae4c0f9213a7f89f4afaea4dd98

                                      • C:\Users\Admin\AppData\Local\Temp\Chrome5.exe
                                        MD5

                                        077b29fe766f4a64261a2e9c3f9b7394

                                        SHA1

                                        11e58cbbb788569e91806f11102293622c353536

                                        SHA256

                                        a6f300440a7accb018ac2dd7c5fe23619b15cc28ac58c56a6671c03ca47d4f86

                                        SHA512

                                        d52b50c602319cc8c52f7900066088f9d242107263c41d2bf50b89f74a19d9cddb3effb84175417f2dfc05fee8b505e3bb2eeae4c0f9213a7f89f4afaea4dd98

                                      • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                                        MD5

                                        4f1db9417e53b38a7e876f873dad6e93

                                        SHA1

                                        4939f732568bd8bef4e08ef4df83162f12584cdd

                                        SHA256

                                        3fa5bcd3452f9ac5c4692f3d6bc97aa870e1e73161beda8f10c1155bd1f27487

                                        SHA512

                                        773a5ff00af9845bfc0f39006212eec05907def360f20e4c8816fed0067b101e99c8d69a7dc359ac126cceea8e0190ec290b7ad42a6f707240b95edf4e81b088

                                      • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                                        MD5

                                        4f1db9417e53b38a7e876f873dad6e93

                                        SHA1

                                        4939f732568bd8bef4e08ef4df83162f12584cdd

                                        SHA256

                                        3fa5bcd3452f9ac5c4692f3d6bc97aa870e1e73161beda8f10c1155bd1f27487

                                        SHA512

                                        773a5ff00af9845bfc0f39006212eec05907def360f20e4c8816fed0067b101e99c8d69a7dc359ac126cceea8e0190ec290b7ad42a6f707240b95edf4e81b088

                                      • C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe
                                        MD5

                                        52889bee8775514810948425fefc87dc

                                        SHA1

                                        c9f99a89c0d411a09266e087ec64532d0aab3662

                                        SHA256

                                        cc578634e357aa83afa588548183f83506119a35dada831d2a00afc27a9b7de7

                                        SHA512

                                        e7bcd8f39ec44e1094e5dbd3351c50b889a12ab9e1be38db5dc00508bd79dd7ebff49590b378c2635e7eeee6a1ec7c33d57980a7b472acf39924eba14586c094

                                      • C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe
                                        MD5

                                        52889bee8775514810948425fefc87dc

                                        SHA1

                                        c9f99a89c0d411a09266e087ec64532d0aab3662

                                        SHA256

                                        cc578634e357aa83afa588548183f83506119a35dada831d2a00afc27a9b7de7

                                        SHA512

                                        e7bcd8f39ec44e1094e5dbd3351c50b889a12ab9e1be38db5dc00508bd79dd7ebff49590b378c2635e7eeee6a1ec7c33d57980a7b472acf39924eba14586c094

                                      • C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe
                                        MD5

                                        7e8d320488f6bf62b6897dbfb180dfbb

                                        SHA1

                                        d6f2a930c00cf942655c3fdc0ca7bc25c6253a8d

                                        SHA256

                                        a31d27a19c731712dced8db96354085502f7607a72bc9659d095b028db5ec13b

                                        SHA512

                                        406f882cb72c75d7ec3f4e4d45e3a62cd2f7b5c25dcb8ebba66561317f12638a1acd79934a9ddf083a0c979e2c6571fda5ce4d9f484f8573bddae02c17550b94

                                      • C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe
                                        MD5

                                        7e8d320488f6bf62b6897dbfb180dfbb

                                        SHA1

                                        d6f2a930c00cf942655c3fdc0ca7bc25c6253a8d

                                        SHA256

                                        a31d27a19c731712dced8db96354085502f7607a72bc9659d095b028db5ec13b

                                        SHA512

                                        406f882cb72c75d7ec3f4e4d45e3a62cd2f7b5c25dcb8ebba66561317f12638a1acd79934a9ddf083a0c979e2c6571fda5ce4d9f484f8573bddae02c17550b94

                                      • C:\Users\Admin\AppData\Local\Temp\chrome update.exe
                                        MD5

                                        e564aedef8ad08e6c527b78cfc5b4e01

                                        SHA1

                                        074d41078e373d0d1b6485a91f14040eb4755e23

                                        SHA256

                                        86b61831f8aebb7315c6566a6790782a3f341bc66b2f629377273c9fcd29afae

                                        SHA512

                                        b7b0777cfd96c4098b98516c33d37a1f244129b814ae682507bf725cb23eb350a6ab4685f58a9aea623920338a1d4c1d8e538f14fa2048ecc0ea954d21b7c9a4

                                      • C:\Users\Admin\AppData\Local\Temp\chrome update.exe
                                        MD5

                                        e564aedef8ad08e6c527b78cfc5b4e01

                                        SHA1

                                        074d41078e373d0d1b6485a91f14040eb4755e23

                                        SHA256

                                        86b61831f8aebb7315c6566a6790782a3f341bc66b2f629377273c9fcd29afae

                                        SHA512

                                        b7b0777cfd96c4098b98516c33d37a1f244129b814ae682507bf725cb23eb350a6ab4685f58a9aea623920338a1d4c1d8e538f14fa2048ecc0ea954d21b7c9a4

                                      • C:\Users\Admin\AppData\Local\Temp\chrome.exe
                                        MD5

                                        b248271e30b2b63030c181d9d70b2bba

                                        SHA1

                                        b2d2e5d20228b33f05d19eb0574cd8889cdce6c9

                                        SHA256

                                        5711be360c092c7162d782d4b77efada964b3b2336f1513e98c172742214c5f5

                                        SHA512

                                        da0a1a8190ee375aa8a047ad483d972f7944535b5a8bec02e6dcb787944abe80410a1fab2dc0a297c7100898b9acc1b5392893846d14b9306314057dc8883e23

                                      • C:\Users\Admin\AppData\Local\Temp\chrome.exe
                                        MD5

                                        b248271e30b2b63030c181d9d70b2bba

                                        SHA1

                                        b2d2e5d20228b33f05d19eb0574cd8889cdce6c9

                                        SHA256

                                        5711be360c092c7162d782d4b77efada964b3b2336f1513e98c172742214c5f5

                                        SHA512

                                        da0a1a8190ee375aa8a047ad483d972f7944535b5a8bec02e6dcb787944abe80410a1fab2dc0a297c7100898b9acc1b5392893846d14b9306314057dc8883e23

                                      • C:\Users\Admin\AppData\Local\Temp\chrome1.exe
                                        MD5

                                        134dbe8d27a376420a53946c9a9757c3

                                        SHA1

                                        52be04e72a41c9de2a19d5942a8beba29d9fe3bc

                                        SHA256

                                        e7202f1c7090f8fffc4b1c87d2cb8eaaa3078a3c7a66afeda9344204b0749ea8

                                        SHA512

                                        8fa5cd9b681cfde0132b81a2dbf5bbb55c622933605a3c13ef40b3287ab91c4c91e0b03155a086d161cd3d9c9570dd10f79ff768f1fc7a1e3eb2361b890757e0

                                      • C:\Users\Admin\AppData\Local\Temp\chrome1.exe
                                        MD5

                                        134dbe8d27a376420a53946c9a9757c3

                                        SHA1

                                        52be04e72a41c9de2a19d5942a8beba29d9fe3bc

                                        SHA256

                                        e7202f1c7090f8fffc4b1c87d2cb8eaaa3078a3c7a66afeda9344204b0749ea8

                                        SHA512

                                        8fa5cd9b681cfde0132b81a2dbf5bbb55c622933605a3c13ef40b3287ab91c4c91e0b03155a086d161cd3d9c9570dd10f79ff768f1fc7a1e3eb2361b890757e0

                                      • C:\Users\Admin\AppData\Local\Temp\chrome2.exe
                                        MD5

                                        a25ebcd36aef469ae5474e950b731cb0

                                        SHA1

                                        428d0af5e0d7c2c20104ee43de72518e963af9c2

                                        SHA256

                                        d52616c948cfec352ef52d0400f71d3d8d8fc391fbd7c1083fdfe1f1378862f9

                                        SHA512

                                        f8c250015166605f5e66f3b943b269486b4b2e5ce8d0b44d16dddf29a62d149baaa4c1ac2de12d9239168a057ec53f59e840c64cfac581663f7877f3b1cfcda4

                                      • C:\Users\Admin\AppData\Local\Temp\chrome2.exe
                                        MD5

                                        a25ebcd36aef469ae5474e950b731cb0

                                        SHA1

                                        428d0af5e0d7c2c20104ee43de72518e963af9c2

                                        SHA256

                                        d52616c948cfec352ef52d0400f71d3d8d8fc391fbd7c1083fdfe1f1378862f9

                                        SHA512

                                        f8c250015166605f5e66f3b943b269486b4b2e5ce8d0b44d16dddf29a62d149baaa4c1ac2de12d9239168a057ec53f59e840c64cfac581663f7877f3b1cfcda4

                                      • C:\Users\Admin\AppData\Local\Temp\chrome3.exe
                                        MD5

                                        0282b4088abcfcb8bf001a2a179802e8

                                        SHA1

                                        9248480290e847b83a92165ae191fd7592daef2d

                                        SHA256

                                        e89dea4f2578aff5745390f66f91092c3d31f8caecf2814e9ae5e0a7e7f66505

                                        SHA512

                                        5888d5b9d6232f162f9267b0b01eba0cd5ff6a59b791009d8250c9b2dcb0c1538bab9fb5c0e5107a926a6ab654872ccbf1307196b46280a19bd3afb868f06920

                                      • C:\Users\Admin\AppData\Local\Temp\chrome3.exe
                                        MD5

                                        0282b4088abcfcb8bf001a2a179802e8

                                        SHA1

                                        9248480290e847b83a92165ae191fd7592daef2d

                                        SHA256

                                        e89dea4f2578aff5745390f66f91092c3d31f8caecf2814e9ae5e0a7e7f66505

                                        SHA512

                                        5888d5b9d6232f162f9267b0b01eba0cd5ff6a59b791009d8250c9b2dcb0c1538bab9fb5c0e5107a926a6ab654872ccbf1307196b46280a19bd3afb868f06920

                                      • C:\Users\Admin\AppData\Local\Temp\inst1.exe
                                        MD5

                                        e5f9bcffdde599dd66c729fe2868e411

                                        SHA1

                                        2990ab84be3b99e687ced6c25c9548c3a0757e25

                                        SHA256

                                        c5099f6b446fcc8fd368148b66879910466a02f84d2975467a43a0e4cac11fe8

                                        SHA512

                                        7965c1b0828835adb171ac2a8a5938fd175aefce43353eb29d124e9cb5e324376c3f6e74528c8e066b3ee67f08bff06b5cbd9072772986713360423276e8a8fa

                                      • C:\Users\Admin\AppData\Local\Temp\inst1.exe
                                        MD5

                                        e5f9bcffdde599dd66c729fe2868e411

                                        SHA1

                                        2990ab84be3b99e687ced6c25c9548c3a0757e25

                                        SHA256

                                        c5099f6b446fcc8fd368148b66879910466a02f84d2975467a43a0e4cac11fe8

                                        SHA512

                                        7965c1b0828835adb171ac2a8a5938fd175aefce43353eb29d124e9cb5e324376c3f6e74528c8e066b3ee67f08bff06b5cbd9072772986713360423276e8a8fa

                                      • C:\Users\Admin\AppData\Local\Temp\lish-game.exe
                                        MD5

                                        058a556e487e905e46fc83332b7eef90

                                        SHA1

                                        a0bcaa89842a012d8d9d5665485c16989598716e

                                        SHA256

                                        5cde61ced88b7d559bec83458381d34bc976463059f9712c429c4f8f7c9dbf7a

                                        SHA512

                                        2e3908e0fe50914573f10dadb1c30dcacedaac063b4d8354a3be46c910d83979623ebfdefaa51ffded5cc58860413e72e088a68d2ee08284029766ddab58c0e9

                                      • C:\Users\Admin\AppData\Local\Temp\lish-game.exe
                                        MD5

                                        058a556e487e905e46fc83332b7eef90

                                        SHA1

                                        a0bcaa89842a012d8d9d5665485c16989598716e

                                        SHA256

                                        5cde61ced88b7d559bec83458381d34bc976463059f9712c429c4f8f7c9dbf7a

                                        SHA512

                                        2e3908e0fe50914573f10dadb1c30dcacedaac063b4d8354a3be46c910d83979623ebfdefaa51ffded5cc58860413e72e088a68d2ee08284029766ddab58c0e9

                                      • C:\Users\Admin\AppData\Local\Temp\nsd4F3F.tmp\INetC.dll
                                        MD5

                                        2b342079303895c50af8040a91f30f71

                                        SHA1

                                        b11335e1cb8356d9c337cb89fe81d669a69de17e

                                        SHA256

                                        2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                        SHA512

                                        550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                      • C:\Users\Admin\AppData\Local\Temp\nsd4F3F.tmp\INetC.dll
                                        MD5

                                        2b342079303895c50af8040a91f30f71

                                        SHA1

                                        b11335e1cb8356d9c337cb89fe81d669a69de17e

                                        SHA256

                                        2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                        SHA512

                                        550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                      • C:\Users\Admin\AppData\Local\Temp\nsd4F3F.tmp\INetC.dll
                                        MD5

                                        2b342079303895c50af8040a91f30f71

                                        SHA1

                                        b11335e1cb8356d9c337cb89fe81d669a69de17e

                                        SHA256

                                        2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                        SHA512

                                        550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                      • C:\Users\Admin\AppData\Local\Temp\nsd4F3F.tmp\INetC.dll
                                        MD5

                                        2b342079303895c50af8040a91f30f71

                                        SHA1

                                        b11335e1cb8356d9c337cb89fe81d669a69de17e

                                        SHA256

                                        2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                        SHA512

                                        550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                      • C:\Users\Admin\AppData\Local\Temp\nsd4F3F.tmp\INetC.dll
                                        MD5

                                        2b342079303895c50af8040a91f30f71

                                        SHA1

                                        b11335e1cb8356d9c337cb89fe81d669a69de17e

                                        SHA256

                                        2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                        SHA512

                                        550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                      • C:\Users\Admin\AppData\Local\Temp\nsd4F3F.tmp\INetC.dll
                                        MD5

                                        2b342079303895c50af8040a91f30f71

                                        SHA1

                                        b11335e1cb8356d9c337cb89fe81d669a69de17e

                                        SHA256

                                        2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

                                        SHA512

                                        550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

                                      • C:\Users\Admin\AppData\Local\Temp\nsd4F3F.tmp\System.dll
                                        MD5

                                        fbe295e5a1acfbd0a6271898f885fe6a

                                        SHA1

                                        d6d205922e61635472efb13c2bb92c9ac6cb96da

                                        SHA256

                                        a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1

                                        SHA512

                                        2cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06

                                      • C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe
                                        MD5

                                        dd3f5335f760b949760b02aac1187694

                                        SHA1

                                        f53535bb3093caef66890688e6c214bcb4c51ef9

                                        SHA256

                                        90206625829c37a60ab736cfd7a8ff46f89524123b3246eabeaa77a2126bba26

                                        SHA512

                                        e715b69ca632f51c449a415ef831ed0d7e0160af20a3f79b09cb31bdce8920697c30c5f625851e9418bc087145b7b16deea7cc57c159c331350f1c88e7785004

                                      • C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe
                                        MD5

                                        dd3f5335f760b949760b02aac1187694

                                        SHA1

                                        f53535bb3093caef66890688e6c214bcb4c51ef9

                                        SHA256

                                        90206625829c37a60ab736cfd7a8ff46f89524123b3246eabeaa77a2126bba26

                                        SHA512

                                        e715b69ca632f51c449a415ef831ed0d7e0160af20a3f79b09cb31bdce8920697c30c5f625851e9418bc087145b7b16deea7cc57c159c331350f1c88e7785004

                                      • C:\Users\Admin\AppData\Local\Temp\setup.exe
                                        MD5

                                        e2d983220085f0494ff1e8c0b10bcb16

                                        SHA1

                                        5716a56cdc261fcd552b95a4536b17ffd325dbab

                                        SHA256

                                        bf15a11a3211f2bf79558594dd7d86b4116acd6fb0ca26c9fdcfd86be236b6b1

                                        SHA512

                                        9e07a1e371c8e6593628d37fe290e4052a120ec49682c4ff10f78f9af0bd1f736a45ca590f4d6afa892f06544be4bb057825932d4e85ff1c4a64dcee9df2fdb2

                                      • C:\Users\Admin\AppData\Local\Temp\setup.exe
                                        MD5

                                        e2d983220085f0494ff1e8c0b10bcb16

                                        SHA1

                                        5716a56cdc261fcd552b95a4536b17ffd325dbab

                                        SHA256

                                        bf15a11a3211f2bf79558594dd7d86b4116acd6fb0ca26c9fdcfd86be236b6b1

                                        SHA512

                                        9e07a1e371c8e6593628d37fe290e4052a120ec49682c4ff10f78f9af0bd1f736a45ca590f4d6afa892f06544be4bb057825932d4e85ff1c4a64dcee9df2fdb2

                                      • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                                        MD5

                                        e7232d152ca0bf8e9e69cfbe11b231f6

                                        SHA1

                                        9c00ea3d8b2ccfb24b9fbd1772944ea26b5bb0f5

                                        SHA256

                                        dd19804b5823cf2cab3afe4a386b427d9016e2673e82e0f030e4cff74ef73ce1

                                        SHA512

                                        3d87325fbea81b4559d435725e58670222d12478bdbc10dd97033c6f3e06314de89b7b5fa27881a9020a0395fa861c5e992f61f99b3271c4ac7e8616bd0d3bbf

                                      • memory/544-170-0x0000000000BC0000-0x0000000000BC8000-memory.dmp
                                        Filesize

                                        32KB

                                      • memory/544-178-0x00007FFFECE20000-0x00007FFFED8E1000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/544-182-0x0000000001120000-0x0000000001122000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/2064-152-0x0000000002120000-0x000000000219B000-memory.dmp
                                        Filesize

                                        492KB

                                      • memory/2064-154-0x00000000021A0000-0x0000000002275000-memory.dmp
                                        Filesize

                                        852KB

                                      • memory/2064-162-0x0000000000400000-0x00000000004D8000-memory.dmp
                                        Filesize

                                        864KB

                                      • memory/2388-189-0x0000000001F90000-0x0000000001FD3000-memory.dmp
                                        Filesize

                                        268KB

                                      • memory/2388-190-0x0000000000400000-0x000000000044A000-memory.dmp
                                        Filesize

                                        296KB

                                      • memory/2388-188-0x0000000001F60000-0x0000000001F86000-memory.dmp
                                        Filesize

                                        152KB

                                      • memory/2728-176-0x00000000001E0000-0x00000000001E8000-memory.dmp
                                        Filesize

                                        32KB

                                      • memory/2728-181-0x000000001AD80000-0x000000001AD82000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/2728-183-0x00007FFFECE20000-0x00007FFFED8E1000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/3056-143-0x0000000000CD0000-0x0000000000CD8000-memory.dmp
                                        Filesize

                                        32KB

                                      • memory/3056-145-0x00000000011F0000-0x00000000011F2000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/3056-144-0x00007FFFECE20000-0x00007FFFED8E1000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/3092-194-0x0000000005310000-0x0000000005311000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/3092-149-0x0000000074BE0000-0x0000000075390000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/3092-148-0x00000000007F0000-0x0000000000818000-memory.dmp
                                        Filesize

                                        160KB

                                      • memory/3352-136-0x000000001ADC0000-0x000000001ADC2000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/3352-134-0x0000000000030000-0x0000000000038000-memory.dmp
                                        Filesize

                                        32KB

                                      • memory/3352-135-0x00007FFFED2A0000-0x00007FFFEDD61000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/3932-139-0x0000000074BE0000-0x0000000075390000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/3932-140-0x0000000000370000-0x00000000008F6000-memory.dmp
                                        Filesize

                                        5.5MB

                                      • memory/4184-163-0x0000000000590000-0x00000000005A0000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/4184-177-0x00000000005C0000-0x00000000005D2000-memory.dmp
                                        Filesize

                                        72KB

                                      • memory/4636-203-0x00000232C8830000-0x00000232C8A50000-memory.dmp
                                        Filesize

                                        2.1MB

                                      • memory/4636-207-0x00000232C8C06000-0x00000232C8C07000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/4636-206-0x00000232C8C03000-0x00000232C8C05000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/4636-205-0x00000232C8C00000-0x00000232C8C02000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/4636-204-0x00007FFFECE20000-0x00007FFFED8E1000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/4820-185-0x0000000000710000-0x0000000000718000-memory.dmp
                                        Filesize

                                        32KB

                                      • memory/4820-184-0x00007FFFECE20000-0x00007FFFED8E1000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/4820-186-0x000000001B430000-0x000000001B432000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/4844-158-0x00000000006B0000-0x00000000006B8000-memory.dmp
                                        Filesize

                                        32KB

                                      • memory/4844-159-0x00007FFFECE20000-0x00007FFFED8E1000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/4844-160-0x000000001B210000-0x000000001B212000-memory.dmp
                                        Filesize

                                        8KB