Analysis

  • max time kernel
    300s
  • max time network
    324s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2022 14:13

General

  • Target

    TrashMalwares-main/Dro trojan. Virus prank.exe

  • Size

    1.8MB

  • MD5

    af483a4c67d358dd807194ef89484f1e

  • SHA1

    4aefb5884e289fb85af3f5a5bec344b738073603

  • SHA256

    480ca2097e13abb1444b69b0d984961702f8ee8122fc0f0acc5bff217d253854

  • SHA512

    e5739841097828a7789e7a3317a0efa1ce4c109490df1d1ce62e559fa555affc7aee69d389bb50d5dbb4bf5d1d87d94a22cf4a5b9a0e3d7da3b48813c1c75917

  • SSDEEP

    49152:ysNjxEmz1dG6HOMlDTsBQL/difgzGSe5Wa6IQ:yYymicDT2C/EfyuUl

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Executes dropped EXE 15 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 9 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs regedit.exe 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\Dro trojan. Virus prank.exe
    "C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\Dro trojan. Virus prank.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\START.exe
      "C:\Users\Admin\AppData\Local\Temp\START.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ZbDz.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZbDz.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v "DisableTaskMgr" /t REG_DWORD /d 1
            5⤵
              PID:1960
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /IM Taskmgr.exe /F
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4112
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /IM Taskmgr.exe /F
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1104
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /IM Taskmgr.exe /F
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2116
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /IM Taskmgr.exe /F
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:400
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /IM Taskmgr.exe /F
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:772
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v "DisableTaskMgr" /t REG_DWORD /d 1
              5⤵
                PID:1100
          • C:\Users\Admin\AppData\Local\Temp\Killer.exe
            "C:\Users\Admin\AppData\Local\Temp\Killer.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1500
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Collapse_all.js"
            3⤵
            • Suspicious use of FindShellTrayWindow
            PID:3924
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SHK.vbs"
            3⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:760
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SHK.bat" "
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1828
              • C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe
                Shaking_horizontally.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2692
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 1
                5⤵
                • Delays execution with timeout.exe
                PID:1452
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /IM Shaking_horizontally.exe /F
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1444
          • C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exe
            "C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exe"
            3⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3972
            • C:\Windows\SysWOW64\control.exe
              "C:\Windows\System32\control.exe"
              4⤵
              • Modifies registry class
              PID:2824
            • C:\Windows\SysWOW64\regedit.exe
              "C:\Windows\System32\regedit.exe"
              4⤵
              • Runs regedit.exe
              • Suspicious behavior: GetForegroundWindowSpam
              PID:2060
            • C:\Windows\SysWOW64\control.exe
              "C:\Windows\System32\control.exe"
              4⤵
              • Modifies registry class
              PID:2456
            • C:\Windows\SysWOW64\notepad.exe
              "C:\Windows\System32\notepad.exe"
              4⤵
                PID:4716
              • C:\Windows\SysWOW64\control.exe
                "C:\Windows\System32\control.exe"
                4⤵
                • Modifies registry class
                PID:4024
              • C:\Windows\SysWOW64\control.exe
                "C:\Windows\System32\control.exe"
                4⤵
                • Modifies registry class
                PID:1520
              • C:\Windows\SysWOW64\regedit.exe
                "C:\Windows\System32\regedit.exe"
                4⤵
                • Runs regedit.exe
                PID:3608
              • C:\Windows\SysWOW64\control.exe
                "C:\Windows\System32\control.exe"
                4⤵
                • Modifies registry class
                PID:3016
              • C:\Windows\SysWOW64\notepad.exe
                "C:\Windows\System32\notepad.exe"
                4⤵
                  PID:3912
                • C:\Windows\SysWOW64\calc.exe
                  "C:\Windows\System32\calc.exe"
                  4⤵
                  • Modifies registry class
                  PID:1880
                • C:\Windows\SysWOW64\calc.exe
                  "C:\Windows\System32\calc.exe"
                  4⤵
                  • Modifies registry class
                  PID:1644
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://neave.tv/
                  4⤵
                  • Adds Run key to start application
                  • Enumerates system info in registry
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:4024
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcce7546f8,0x7ffcce754708,0x7ffcce754718
                    5⤵
                      PID:3916
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                      5⤵
                        PID:4076
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:3
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1264
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8
                        5⤵
                          PID:4148
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:1
                          5⤵
                            PID:1060
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:1
                            5⤵
                              PID:516
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5304 /prefetch:8
                              5⤵
                                PID:1184
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3344 /prefetch:8
                                5⤵
                                  PID:684
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5308 /prefetch:8
                                  5⤵
                                    PID:1112
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                                    5⤵
                                      PID:908
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                                      5⤵
                                        PID:2532
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:8
                                        5⤵
                                          PID:4324
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                          5⤵
                                          • Drops file in Program Files directory
                                          PID:3100
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff72e685460,0x7ff72e685470,0x7ff72e685480
                                            6⤵
                                              PID:4608
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6524 /prefetch:8
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1884
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10752959236591714512,5990415880301127518,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:1
                                            5⤵
                                              PID:3732
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://neave.tv/
                                            4⤵
                                              PID:3460
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce7546f8,0x7ffcce754708,0x7ffcce754718
                                                5⤵
                                                  PID:3928
                                              • C:\Windows\SysWOW64\notepad.exe
                                                "C:\Windows\System32\notepad.exe"
                                                4⤵
                                                  PID:4244
                                              • C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:2320
                                              • C:\Users\Admin\AppData\Local\Temp\Error_icons.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Error_icons.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:2036
                                              • C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:2616
                                              • C:\Users\Admin\AppData\Local\Temp\New_Names.exe
                                                "C:\Users\Admin\AppData\Local\Temp\New_Names.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                PID:4924
                                              • C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:4764
                                              • C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:2372
                                              • C:\Windows\SysWOW64\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\SPZ.vbs"
                                                3⤵
                                                • Checks computer location settings
                                                PID:3832
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SPZ.bat" "
                                                  4⤵
                                                    PID:2328
                                                    • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                      SPAM.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:3192
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:684
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /IM SPAM.exe /F
                                                      5⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2068
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:1280
                                                    • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                      SPAM.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:2232
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:644
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /IM SPAM.exe /F
                                                      5⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4000
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:3976
                                                    • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                      SPAM.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:744
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:3180
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /IM SPAM.exe /F
                                                      5⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:960
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:1508
                                                    • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                      SPAM.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      PID:1588
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:3964
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /IM SPAM.exe /F
                                                      5⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4324
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 13
                                                      5⤵
                                                      • Delays execution with timeout.exe
                                                      PID:4784
                                                • C:\Users\Admin\AppData\Local\Temp\Glitch.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Glitch.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:2440
                                            • C:\Windows\explorer.exe
                                              C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                              1⤵
                                              • Modifies Internet Explorer settings
                                              • Modifies registry class
                                              • Suspicious behavior: AddClipboardFormatListener
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              PID:3524
                                            • C:\Windows\SysWOW64\DllHost.exe
                                              C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                              1⤵
                                                PID:1072
                                              • C:\Windows\system32\OpenWith.exe
                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                1⤵
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1884
                                              • C:\Windows\system32\OpenWith.exe
                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                1⤵
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2268
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:3284
                                                • C:\Windows\system32\AUDIODG.EXE
                                                  C:\Windows\system32\AUDIODG.EXE 0x244 0x518
                                                  1⤵
                                                    PID:2068

                                                  Network

                                                  MITRE ATT&CK Matrix ATT&CK v6

                                                  Persistence

                                                  Registry Run Keys / Startup Folder

                                                  1
                                                  T1060

                                                  Defense Evasion

                                                  Modify Registry

                                                  2
                                                  T1112

                                                  Discovery

                                                  Query Registry

                                                  2
                                                  T1012

                                                  System Information Discovery

                                                  3
                                                  T1082

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                    Filesize

                                                    152B

                                                    MD5

                                                    f647a9024e00f209b4882586b48a6d1c

                                                    SHA1

                                                    825a1e51260086c4261315dbc9704e1848fe5ff7

                                                    SHA256

                                                    77614c9d1cb42c41c0ce0415aecc9a20823ba79bdcdb8a27e90be7a16c57229b

                                                    SHA512

                                                    84961cc97defa398b0053b40453db58198b3e5bd2ad59770707ed11eb282eff479664253e616427826b40377e6486cdc1676369324617e5b5b0262b904f2ca9a

                                                  • C:\Users\Admin\AppData\Local\Temp\Collapse_all.js
                                                    Filesize

                                                    58B

                                                    MD5

                                                    f60e1a46f1e7301a7eb36f723cdec4b3

                                                    SHA1

                                                    5e46742927659e3fb0cef6c67542cb5ec2b0926d

                                                    SHA256

                                                    5fdab6a87288b929290f603f813a254efa019d8fe6c73d8757ebc543ba6949eb

                                                    SHA512

                                                    945f7f053700cf18a80553e09c3d64c8481aeb70d871dd00106bf66fcb33b4360b4412cb4bf9391e4dfd8e6df92d11ffe896bee6f864bdbdddedc1877714ee16

                                                  • C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    4f5d56501b68860d79846d1c4a567459

                                                    SHA1

                                                    548a514797c85e982a0f636030a18566895efaaa

                                                    SHA256

                                                    0df880855797fb52bcaac0e11074869ed409b9daaabfe8939ecd4039962292cd

                                                    SHA512

                                                    5efc549dcef528f0f5b09758ce18686106781788c0e78467d02fb12b7b138c0ca301d68e81305e7053f5471fa6c9c192d6bad81067fe70803e237b8dbf7d1f41

                                                  • C:\Users\Admin\AppData\Local\Temp\Draw_cursor.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    4f5d56501b68860d79846d1c4a567459

                                                    SHA1

                                                    548a514797c85e982a0f636030a18566895efaaa

                                                    SHA256

                                                    0df880855797fb52bcaac0e11074869ed409b9daaabfe8939ecd4039962292cd

                                                    SHA512

                                                    5efc549dcef528f0f5b09758ce18686106781788c0e78467d02fb12b7b138c0ca301d68e81305e7053f5471fa6c9c192d6bad81067fe70803e237b8dbf7d1f41

                                                  • C:\Users\Admin\AppData\Local\Temp\Error_icons.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    d9c07b7bc1a4df56ecb73941aafa2d78

                                                    SHA1

                                                    9d64ca9262852e3ee4b5e098e2762401364e80e8

                                                    SHA256

                                                    506b80e8f8551e29fa1e93082fefc99ce6613ad7abae895d61bdda92f4dce8c3

                                                    SHA512

                                                    ca282eedf7851df48e0ae001684ca4400b6a43e14893610972496e7c4c7002c508b95278896176ef4d49d371d95b6cc759609313a833bcdbc010a064cb28170f

                                                  • C:\Users\Admin\AppData\Local\Temp\Error_icons.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    d9c07b7bc1a4df56ecb73941aafa2d78

                                                    SHA1

                                                    9d64ca9262852e3ee4b5e098e2762401364e80e8

                                                    SHA256

                                                    506b80e8f8551e29fa1e93082fefc99ce6613ad7abae895d61bdda92f4dce8c3

                                                    SHA512

                                                    ca282eedf7851df48e0ae001684ca4400b6a43e14893610972496e7c4c7002c508b95278896176ef4d49d371d95b6cc759609313a833bcdbc010a064cb28170f

                                                  • C:\Users\Admin\AppData\Local\Temp\Glitch.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    b36c78f38d93bc656f2bed0a42e23abf

                                                    SHA1

                                                    25622233b69ec6319d7ae9fa69874503f6c6a561

                                                    SHA256

                                                    4aa85f00bce73794e4190bf29cd3cd09959f2ade6bb4e0b56f6c733fcc6008c7

                                                    SHA512

                                                    f723c96a3a4800c935a584ce5f8a0c26118c96331649ed8ce439c826f03caecbb4c75be25645cd202e6fce88f1f482fd3f818593d766547b6da750576444b84c

                                                  • C:\Users\Admin\AppData\Local\Temp\Glitch.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    b36c78f38d93bc656f2bed0a42e23abf

                                                    SHA1

                                                    25622233b69ec6319d7ae9fa69874503f6c6a561

                                                    SHA256

                                                    4aa85f00bce73794e4190bf29cd3cd09959f2ade6bb4e0b56f6c733fcc6008c7

                                                    SHA512

                                                    f723c96a3a4800c935a584ce5f8a0c26118c96331649ed8ce439c826f03caecbb4c75be25645cd202e6fce88f1f482fd3f818593d766547b6da750576444b84c

                                                  • C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    7cfd733ea3aedb94f04013881f8a9f14

                                                    SHA1

                                                    94642432fd416ec32f1cd17dfd9b23922432dcea

                                                    SHA256

                                                    fceb50190c036057c6386387ed115b83a9fec153332b80be4d891cb9ef8f624a

                                                    SHA512

                                                    8c2b83a6aa96bed630e950cb66cd3a50e4789f303b9f2f3f2f6043f16a3a26d7dc9a56aa43cb3af0e548b207d5a228b88eaacb0b1872fc8abd4e1191f465e323

                                                  • C:\Users\Admin\AppData\Local\Temp\Inversion_and_oil.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    7cfd733ea3aedb94f04013881f8a9f14

                                                    SHA1

                                                    94642432fd416ec32f1cd17dfd9b23922432dcea

                                                    SHA256

                                                    fceb50190c036057c6386387ed115b83a9fec153332b80be4d891cb9ef8f624a

                                                    SHA512

                                                    8c2b83a6aa96bed630e950cb66cd3a50e4789f303b9f2f3f2f6043f16a3a26d7dc9a56aa43cb3af0e548b207d5a228b88eaacb0b1872fc8abd4e1191f465e323

                                                  • C:\Users\Admin\AppData\Local\Temp\Killer.exe
                                                    Filesize

                                                    186KB

                                                    MD5

                                                    32c1a77891071523637345563fcda855

                                                    SHA1

                                                    d582fa0290b7c04c99ded56c8ebc6e45df981300

                                                    SHA256

                                                    c8cb8941b2ebe27ba69600b8cb5725b9630fb631bd7c7e88dea9eebd8bd3bef3

                                                    SHA512

                                                    61c6e7eddb5d8e880952c0fec6382082cbd33d0463ac556527598aaa6cf9bdb3755f395639d28be1a0cf4efa9f699cfdae06ecb5068b5f43b08b65354580704a

                                                  • C:\Users\Admin\AppData\Local\Temp\Killer.exe
                                                    Filesize

                                                    186KB

                                                    MD5

                                                    32c1a77891071523637345563fcda855

                                                    SHA1

                                                    d582fa0290b7c04c99ded56c8ebc6e45df981300

                                                    SHA256

                                                    c8cb8941b2ebe27ba69600b8cb5725b9630fb631bd7c7e88dea9eebd8bd3bef3

                                                    SHA512

                                                    61c6e7eddb5d8e880952c0fec6382082cbd33d0463ac556527598aaa6cf9bdb3755f395639d28be1a0cf4efa9f699cfdae06ecb5068b5f43b08b65354580704a

                                                  • C:\Users\Admin\AppData\Local\Temp\MSVCR100D.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\New_Names.exe
                                                    Filesize

                                                    389KB

                                                    MD5

                                                    dd799cfa99ea38299f32a744b4a9864c

                                                    SHA1

                                                    850457eea90f64bb760d078008f17799f8eb4843

                                                    SHA256

                                                    f9f469026252b2c7084755430c9b0d8939a8547b23a5bb32371102d7a3578ed1

                                                    SHA512

                                                    9c74976ea217276bf5b291d629aa21ace989a45697748cb449eeba8d8c846e77e7ab66c1b701243ceb207db364d1abc376950c6b5f4cb92db068922ae41dcef3

                                                  • C:\Users\Admin\AppData\Local\Temp\New_Names.exe
                                                    Filesize

                                                    389KB

                                                    MD5

                                                    dd799cfa99ea38299f32a744b4a9864c

                                                    SHA1

                                                    850457eea90f64bb760d078008f17799f8eb4843

                                                    SHA256

                                                    f9f469026252b2c7084755430c9b0d8939a8547b23a5bb32371102d7a3578ed1

                                                    SHA512

                                                    9c74976ea217276bf5b291d629aa21ace989a45697748cb449eeba8d8c846e77e7ab66c1b701243ceb207db364d1abc376950c6b5f4cb92db068922ae41dcef3

                                                  • C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    7c3647e86215919ec06437d9a5fce95d

                                                    SHA1

                                                    7bc1a0582e03bd9d7ee5ba1d66268d800d66c596

                                                    SHA256

                                                    39e30df6628702de8a548ff031383c360dfc63a9399169bb93838f7eef57a6ed

                                                    SHA512

                                                    d0a4991ad1cff73dbd0425e9f7190101f27811daa622c0fa5ba620566a9f95caae4430b0386a6ea9a7575a56931a45ca821f5274f8d2798c73d5154c8fe7e33d

                                                  • C:\Users\Admin\AppData\Local\Temp\R_O_13-27.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    7c3647e86215919ec06437d9a5fce95d

                                                    SHA1

                                                    7bc1a0582e03bd9d7ee5ba1d66268d800d66c596

                                                    SHA256

                                                    39e30df6628702de8a548ff031383c360dfc63a9399169bb93838f7eef57a6ed

                                                    SHA512

                                                    d0a4991ad1cff73dbd0425e9f7190101f27811daa622c0fa5ba620566a9f95caae4430b0386a6ea9a7575a56931a45ca821f5274f8d2798c73d5154c8fe7e33d

                                                  • C:\Users\Admin\AppData\Local\Temp\SHK.bat
                                                    Filesize

                                                    94B

                                                    MD5

                                                    ab921b5b6a2b7232c8d2fd2f0dc78790

                                                    SHA1

                                                    fe0c9c4e5255f903bf9b006f27a913f39a115a54

                                                    SHA256

                                                    dfd827c3e9bb39c84ca90001a7718c55458145fcf035b4dba1001b201422a8da

                                                    SHA512

                                                    47d8ded63fd55f4490d0cd64c8f688fc5bb5814018a09e46f1eae0e36228589f4097f88f2f42e92d02cc068fd3e807aae219a4c4162474a561b3767331e8f98e

                                                  • C:\Users\Admin\AppData\Local\Temp\SHK.vbs
                                                    Filesize

                                                    115B

                                                    MD5

                                                    2643272752b857cbc69d843d92ff4879

                                                    SHA1

                                                    10f1f87652b5747dd37ed141734e5af39af19ef2

                                                    SHA256

                                                    53c3cd2ed0f6184b2cf0304acfbef726c3415528c903c69a86f3f9405b52179c

                                                    SHA512

                                                    3e7d2548ccbe96599b94a585c6a02e2ee2820ac6a8aec1ede270c8089623c3c41fd779fdf5a93b2cd1b9fca3ef2d2b915703f3438c7abd6e27f5a59626f01282

                                                  • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                    Filesize

                                                    565KB

                                                    MD5

                                                    8b7abf004b09373f29c365315db3477c

                                                    SHA1

                                                    2512819f1e484c2905cc9d942cb775d27338a26b

                                                    SHA256

                                                    8d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde

                                                    SHA512

                                                    7815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b

                                                  • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                    Filesize

                                                    565KB

                                                    MD5

                                                    8b7abf004b09373f29c365315db3477c

                                                    SHA1

                                                    2512819f1e484c2905cc9d942cb775d27338a26b

                                                    SHA256

                                                    8d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde

                                                    SHA512

                                                    7815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b

                                                  • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                    Filesize

                                                    565KB

                                                    MD5

                                                    8b7abf004b09373f29c365315db3477c

                                                    SHA1

                                                    2512819f1e484c2905cc9d942cb775d27338a26b

                                                    SHA256

                                                    8d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde

                                                    SHA512

                                                    7815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b

                                                  • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                    Filesize

                                                    565KB

                                                    MD5

                                                    8b7abf004b09373f29c365315db3477c

                                                    SHA1

                                                    2512819f1e484c2905cc9d942cb775d27338a26b

                                                    SHA256

                                                    8d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde

                                                    SHA512

                                                    7815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b

                                                  • C:\Users\Admin\AppData\Local\Temp\SPAM.exe
                                                    Filesize

                                                    565KB

                                                    MD5

                                                    8b7abf004b09373f29c365315db3477c

                                                    SHA1

                                                    2512819f1e484c2905cc9d942cb775d27338a26b

                                                    SHA256

                                                    8d274444be0243541cfbd9963072fccfea6f0f62282360f1ad21ddf43b9b3cde

                                                    SHA512

                                                    7815e21468c265e35300a9e7b7fdd2d5596361977d0710f4dacc50b519e8d172854307993f573b9a287d859b15c8d6a0eb18a9622f8cda7f54be2a8f11a2d80b

                                                  • C:\Users\Admin\AppData\Local\Temp\SPZ.bat
                                                    Filesize

                                                    90B

                                                    MD5

                                                    72fdcbc57acce1d733feebde846ce457

                                                    SHA1

                                                    1a818906359777c17444293be5e2123265d1bff0

                                                    SHA256

                                                    7335bb83ba8494862d059321b889a54cfee91d3caa74381fb860c0c1ed13359e

                                                    SHA512

                                                    731ca25a5e2fce23232c9b1ca09206114d1ea072b754b35179059533bf81fa2e39e989cc6a7247b3e064dd4554933add38c00a820f2a47599f8b7336bb6de67b

                                                  • C:\Users\Admin\AppData\Local\Temp\SPZ.vbs
                                                    Filesize

                                                    115B

                                                    MD5

                                                    25c44f1d280cb45e218d5490a8dffe5a

                                                    SHA1

                                                    3f9244d0c5a4b235fceadd88be739987548f1e1a

                                                    SHA256

                                                    161c7668eef47e1d319a8d9fde6b7796a59ff3901f64960cdc038044914b339d

                                                    SHA512

                                                    29e23925a8df5e7cc48f61741dac696a8fa114985794cf9ec413af1b25e3bb20d74f7d2eb5d3253cf1f46470ab0de1dad7f34209f90072c122dc3533f6b9626d

                                                  • C:\Users\Admin\AppData\Local\Temp\START.exe
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    b9e9b7fbd019b7e09e77bdec78ade264

                                                    SHA1

                                                    0cdeda0e10d1f754d2171596d82e97e347089e01

                                                    SHA256

                                                    227e8953a11d22ea948fe3b2426753a435993336ae1f49a6fe3c1dd0b70bf3b7

                                                    SHA512

                                                    d2e5dadb63d0ff75e48504720186483877ecde0354fe56d88255a079c116eef5b5c59eaef6ccc99217acce5d5755fd0a50fcf93b115f9408962535a572960a85

                                                  • C:\Users\Admin\AppData\Local\Temp\START.exe
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    b9e9b7fbd019b7e09e77bdec78ade264

                                                    SHA1

                                                    0cdeda0e10d1f754d2171596d82e97e347089e01

                                                    SHA256

                                                    227e8953a11d22ea948fe3b2426753a435993336ae1f49a6fe3c1dd0b70bf3b7

                                                    SHA512

                                                    d2e5dadb63d0ff75e48504720186483877ecde0354fe56d88255a079c116eef5b5c59eaef6ccc99217acce5d5755fd0a50fcf93b115f9408962535a572960a85

                                                  • C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    d2404ad25ee623edb58a175d4bb0c7a1

                                                    SHA1

                                                    4ca3589e630abebffe46782f5941f6253001bea9

                                                    SHA256

                                                    35ee2069ddde1c079b1890eafd7041f59eb5170063f3f308b0b808dcc24623ce

                                                    SHA512

                                                    26758e01881ccbfa5f124fb8fa15e1712d228ea1aa9e552dd5020436f55e4e83d450128e799aff829e6215eacfcb284133fdf3ca952696cadfe061477b8d0b8c

                                                  • C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    d2404ad25ee623edb58a175d4bb0c7a1

                                                    SHA1

                                                    4ca3589e630abebffe46782f5941f6253001bea9

                                                    SHA256

                                                    35ee2069ddde1c079b1890eafd7041f59eb5170063f3f308b0b808dcc24623ce

                                                    SHA512

                                                    26758e01881ccbfa5f124fb8fa15e1712d228ea1aa9e552dd5020436f55e4e83d450128e799aff829e6215eacfcb284133fdf3ca952696cadfe061477b8d0b8c

                                                  • C:\Users\Admin\AppData\Local\Temp\Shaking_horizontally.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    d2404ad25ee623edb58a175d4bb0c7a1

                                                    SHA1

                                                    4ca3589e630abebffe46782f5941f6253001bea9

                                                    SHA256

                                                    35ee2069ddde1c079b1890eafd7041f59eb5170063f3f308b0b808dcc24623ce

                                                    SHA512

                                                    26758e01881ccbfa5f124fb8fa15e1712d228ea1aa9e552dd5020436f55e4e83d450128e799aff829e6215eacfcb284133fdf3ca952696cadfe061477b8d0b8c

                                                  • C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    a6514b796f59e3441e8f803855a008ff

                                                    SHA1

                                                    1653dcd267cecc5b502cec702bed045d5929e8f8

                                                    SHA256

                                                    37f603c8f75ce68ab6dd0b182ee98e32e6c0815a7e168c6d76493c6eb4c67818

                                                    SHA512

                                                    181341ae81033256eb9738a0f7b909652da7a5126c4d90349c5feb1d05ff0d8cb77f721d5fe4f3be0877b899fddf2a6b58ac7b400d05af02d261f77286dffbc7

                                                  • C:\Users\Admin\AppData\Local\Temp\Shaking_vertically.exe
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    a6514b796f59e3441e8f803855a008ff

                                                    SHA1

                                                    1653dcd267cecc5b502cec702bed045d5929e8f8

                                                    SHA256

                                                    37f603c8f75ce68ab6dd0b182ee98e32e6c0815a7e168c6d76493c6eb4c67818

                                                    SHA512

                                                    181341ae81033256eb9738a0f7b909652da7a5126c4d90349c5feb1d05ff0d8cb77f721d5fe4f3be0877b899fddf2a6b58ac7b400d05af02d261f77286dffbc7

                                                  • C:\Users\Admin\AppData\Local\Temp\ZbDz.bat
                                                    Filesize

                                                    375B

                                                    MD5

                                                    90716ec6d805a3e478c0a26477138efd

                                                    SHA1

                                                    ceae2264e1c3c6a0bf715cf54237c3f763cd5799

                                                    SHA256

                                                    f185b92c729b011a051d2d8775eee998da9e71ba6156a8da81b0fc1b25c90a77

                                                    SHA512

                                                    fbda3613b691e83299077b1378aa845ab59befd61bc177e54b950f55c857c8e2b208012c026c24489f354c88404172ba25d7584f1b825ccd6880598bcc65cc56

                                                  • C:\Users\Admin\AppData\Local\Temp\ZbDz.vbs
                                                    Filesize

                                                    116B

                                                    MD5

                                                    8a25126b21c1f849b719999cb5d85e11

                                                    SHA1

                                                    714fb5a246721c3117868c2229e7598ef7dfb2eb

                                                    SHA256

                                                    8ee9f21dd968d66fb71be502c6f2b96f3e0ee1954a4bcf2e7fffa45477fb7f38

                                                    SHA512

                                                    8ea3d56e58410e369c42f6e16381ee802c8df58ee7f60ab937a19417e9a86f6877241ee7472df898bb85765d0bd3a5df2a58f97c717f5da8d32e7c8acf638c84

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • C:\Users\Admin\AppData\Local\Temp\msvcr100d.dll
                                                    Filesize

                                                    1.4MB

                                                    MD5

                                                    440e9fd9824b8e97d3ca2f34bd1bfbd1

                                                    SHA1

                                                    6852b2c592b3794da114d6ac5ea9d083317bf5af

                                                    SHA256

                                                    eddaa890ac6470692f76eee9586c06d727a1caf7a242170ab1a3947523927396

                                                    SHA512

                                                    b458a0838159367727a63e417bba7c12b196f4d4af56703fe77ddcb2c28c3b6aab1d62335c513398f92c225f204e32b437fb49316b7c2b537c1cf877653c2ef8

                                                  • \??\pipe\LOCAL\crashpad_4024_VYQMLXOLNBUQEOMY
                                                    MD5

                                                    d41d8cd98f00b204e9800998ecf8427e

                                                    SHA1

                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                    SHA256

                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                    SHA512

                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                  • memory/400-151-0x0000000000000000-mapping.dmp
                                                  • memory/516-245-0x0000000000000000-mapping.dmp
                                                  • memory/644-222-0x0000000000000000-mapping.dmp
                                                  • memory/684-215-0x0000000000000000-mapping.dmp
                                                  • memory/684-249-0x0000000000000000-mapping.dmp
                                                  • memory/744-231-0x0000000000000000-mapping.dmp
                                                  • memory/760-157-0x0000000000000000-mapping.dmp
                                                  • memory/772-152-0x0000000000000000-mapping.dmp
                                                  • memory/908-253-0x0000000000000000-mapping.dmp
                                                  • memory/960-256-0x0000000000000000-mapping.dmp
                                                  • memory/1060-243-0x0000000000000000-mapping.dmp
                                                  • memory/1100-153-0x0000000000000000-mapping.dmp
                                                  • memory/1104-149-0x0000000000000000-mapping.dmp
                                                  • memory/1112-251-0x0000000000000000-mapping.dmp
                                                  • memory/1184-247-0x0000000000000000-mapping.dmp
                                                  • memory/1264-238-0x0000000000000000-mapping.dmp
                                                  • memory/1280-219-0x0000000000000000-mapping.dmp
                                                  • memory/1444-166-0x0000000000000000-mapping.dmp
                                                  • memory/1452-162-0x0000000000000000-mapping.dmp
                                                  • memory/1500-148-0x0000000000370000-0x00000000003B2000-memory.dmp
                                                    Filesize

                                                    264KB

                                                  • memory/1500-141-0x0000000000000000-mapping.dmp
                                                  • memory/1508-257-0x0000000000000000-mapping.dmp
                                                  • memory/1520-196-0x0000000000000000-mapping.dmp
                                                  • memory/1644-223-0x0000000000000000-mapping.dmp
                                                  • memory/1828-159-0x0000000000000000-mapping.dmp
                                                  • memory/1880-217-0x0000000000000000-mapping.dmp
                                                  • memory/1960-146-0x0000000000000000-mapping.dmp
                                                  • memory/2036-185-0x0000000000960000-0x000000000097B000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/2036-182-0x0000000000000000-mapping.dmp
                                                  • memory/2060-173-0x0000000000000000-mapping.dmp
                                                  • memory/2068-218-0x0000000000000000-mapping.dmp
                                                  • memory/2116-150-0x0000000000000000-mapping.dmp
                                                  • memory/2232-220-0x0000000000000000-mapping.dmp
                                                  • memory/2320-177-0x0000000000EB0000-0x0000000000ECB000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/2320-175-0x0000000000000000-mapping.dmp
                                                  • memory/2320-179-0x0000000000EB0000-0x0000000000ECB000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/2328-212-0x0000000000000000-mapping.dmp
                                                  • memory/2372-206-0x0000000000DB0000-0x0000000000DCB000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/2372-203-0x0000000000000000-mapping.dmp
                                                  • memory/2440-227-0x0000000000000000-mapping.dmp
                                                  • memory/2440-230-0x0000000000710000-0x000000000072B000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/2456-180-0x0000000000000000-mapping.dmp
                                                  • memory/2532-255-0x0000000000000000-mapping.dmp
                                                  • memory/2616-191-0x0000000000F20000-0x0000000000F3B000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/2616-188-0x0000000000000000-mapping.dmp
                                                  • memory/2692-165-0x0000000000CD0000-0x0000000000CEB000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/2692-160-0x0000000000000000-mapping.dmp
                                                  • memory/2716-145-0x0000000000000000-mapping.dmp
                                                  • memory/2824-171-0x0000000000000000-mapping.dmp
                                                  • memory/3016-207-0x0000000000000000-mapping.dmp
                                                  • memory/3100-258-0x0000000000000000-mapping.dmp
                                                  • memory/3180-233-0x0000000000000000-mapping.dmp
                                                  • memory/3192-213-0x0000000000000000-mapping.dmp
                                                  • memory/3608-201-0x0000000000000000-mapping.dmp
                                                  • memory/3832-210-0x0000000000000000-mapping.dmp
                                                  • memory/3912-208-0x0000000000000000-mapping.dmp
                                                  • memory/3916-235-0x0000000000000000-mapping.dmp
                                                  • memory/3924-155-0x0000000000000000-mapping.dmp
                                                  • memory/3972-172-0x00000000009C0000-0x00000000009DB000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/3972-168-0x0000000000000000-mapping.dmp
                                                  • memory/3976-225-0x0000000000000000-mapping.dmp
                                                  • memory/4000-224-0x0000000000000000-mapping.dmp
                                                  • memory/4024-234-0x0000000000000000-mapping.dmp
                                                  • memory/4024-192-0x0000000000000000-mapping.dmp
                                                  • memory/4076-237-0x0000000000000000-mapping.dmp
                                                  • memory/4112-147-0x0000000000000000-mapping.dmp
                                                  • memory/4148-241-0x0000000000000000-mapping.dmp
                                                  • memory/4608-259-0x0000000000000000-mapping.dmp
                                                  • memory/4716-186-0x0000000000000000-mapping.dmp
                                                  • memory/4764-197-0x0000000000000000-mapping.dmp
                                                  • memory/4764-200-0x0000000000CD0000-0x0000000000CEB000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/4872-132-0x0000000000000000-mapping.dmp
                                                  • memory/4872-137-0x0000000000110000-0x000000000012B000-memory.dmp
                                                    Filesize

                                                    108KB

                                                  • memory/4924-194-0x0000000000000000-mapping.dmp
                                                  • memory/5012-139-0x0000000000000000-mapping.dmp