Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2022 05:05

General

  • Target

    tmp.exe

  • Size

    260KB

  • MD5

    2c7eeef34a1b35c0b025c43c7233f453

  • SHA1

    82e361e77aaf426fcc8d18a46391ce2bf064f493

  • SHA256

    cc7dc07df5e85f948998b1d711b7ea362e529799b2f47d35f256ccd901ab3af9

  • SHA512

    50178b34dadedcd370d031b668906ed3016fd79706b87fd665cfdab942a487625d552629d7ec97a300b63b012a412226b0c128a88e96a17f6189896cb2473010

  • SSDEEP

    6144:8ea7tvhFs3Huy3Pu2eAHNabHtqY+dpEnPM43:67FPeOy3Pu8hNdpEk4

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

SKYNET

C2

173.225.115.99:7702

Mutex

938cda17-a814-4925-8420-83a35a350164

Attributes
  • encryption_key

    F04A75E6507173FAEEC2BB82C564030A5E8413FF

  • install_name

    FileHistory.exe

  • log_directory

    Logs

  • reconnect_delay

    4000

  • startup_key

    FileHistory

  • subdirectory

    FileHistory

Extracted

Family

orcus

C2

146.70.143.176:81

Mutex

712d31c7a3f54904a08d968a15b836e9

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\orc\orc.exe

  • reconnect_delay

    10000

  • registry_keyname

    orc

  • taskscheduler_taskname

    orc

  • watchdog_path

    AppData\Watchdog.exe

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 2 IoCs
  • PlagueBot

    PlagueBot is an open source Bot written in Pascal.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Orcurs Rat Executable 3 IoCs
  • PlagueBot Executable 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 19 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:740
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4320
        • C:\Users\Admin\AppData\Local\Temp\joined.exe
          "C:\Users\Admin\AppData\Local\Temp\joined.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Users\Admin\AppData\Local\Temp\sqls328.exe
            "C:\Users\Admin\AppData\Local\Temp\sqls328.exe"
            4⤵
            • Modifies Windows Defender Real-time Protection settings
            • Modifies security service
            • Executes dropped EXE
            • Windows security modification
            • Suspicious use of WriteProcessMemory
            PID:760
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" Get-MpPreference -verbose
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1836
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\sqls328.exe" /rl HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:444
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4424
        • C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe
          "C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1060
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "nitro64" /tr "C:\Users\Admin\AppData\Local\nitrsso64.exe"
            4⤵
            • Creates scheduled task(s)
            PID:344
        • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
          "C:\Users\Admin\AppData\Local\Temp\FileHistory.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2384
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "FileHistory" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\FileHistory.exe" /rl HIGHEST /f
            4⤵
            • Creates scheduled task(s)
            PID:4704
          • C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe
            "C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1268
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "FileHistory" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe" /rl HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:4496
        • C:\Users\Admin\AppData\Local\Temp\orc.exe
          "C:\Users\Admin\AppData\Local\Temp\orc.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Drops desktop.ini file(s)
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:4648
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rtbp-9by.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4044
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8795.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8794.tmp"
              5⤵
                PID:4100
            • C:\Windows\SysWOW64\WindowsInput.exe
              "C:\Windows\SysWOW64\WindowsInput.exe" --install
              4⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              PID:224
            • C:\Program Files\orc\orc.exe
              "C:\Program Files\orc\orc.exe"
              4⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4816
              • C:\Users\Admin\AppData\Roaming\Watchdog.exe
                "C:\Users\Admin\AppData\Roaming\Watchdog.exe" /launchSelfAndExit "C:\Program Files\orc\orc.exe" 4816 /protectFile
                5⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Suspicious use of AdjustPrivilegeToken
                PID:3664
                • C:\Users\Admin\AppData\Roaming\Watchdog.exe
                  "C:\Users\Admin\AppData\Roaming\Watchdog.exe" /watchProcess "C:\Program Files\orc\orc.exe" 4816 "/protectFile"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4360
          • C:\Users\Admin\Downloads\plage.exe
            "C:\Users\Admin\Downloads\plage.exe"
            3⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:1692
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"
              4⤵
              • Creates scheduled task(s)
              PID:1980
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Query /FO "LIST" /TN "WinManager"
              4⤵
                PID:392
              • C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
                "C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe" /wait
                4⤵
                • Executes dropped EXE
                PID:2324
            • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
              "C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4412
              • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
                "C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:484
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "net session"
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3116
                  • C:\Windows\system32\net.exe
                    net session
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2556
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 session
                      7⤵
                        PID:4052
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableRealtimeMonitoring $true && netsh Advfirewall set allprofiles state off"
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3436
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell Set-MpPreference -DisableRealtimeMonitoring $true
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3336
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1564
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4216
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4820
          • C:\Windows\SysWOW64\WindowsInput.exe
            "C:\Windows\SysWOW64\WindowsInput.exe"
            1⤵
            • Executes dropped EXE
            PID:2240
          • C:\Program Files\orc\orc.exe
            "C:\Program Files\orc\orc.exe"
            1⤵
            • Executes dropped EXE
            PID:1656
          • C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
            C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
            1⤵
            • Executes dropped EXE
            PID:4512
          • C:\Users\Admin\AppData\Local\nitrsso64.exe
            C:\Users\Admin\AppData\Local\nitrsso64.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3628
          • C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
            C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
            1⤵
            • Executes dropped EXE
            PID:2152
          • C:\Users\Admin\AppData\Local\nitrsso64.exe
            C:\Users\Admin\AppData\Local\nitrsso64.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:480

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Modify Existing Service

          2
          T1031

          Registry Run Keys / Startup Folder

          1
          T1060

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Defense Evasion

          Modify Registry

          4
          T1112

          Disabling Security Tools

          2
          T1089

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          2
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S58XVZL8\nitro64[1].exe
            Filesize

            54KB

            MD5

            ebd7887003feaad033856253c14de51c

            SHA1

            1ef092f6c79df2e57c8a49469e4b44815d384948

            SHA256

            faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

            SHA512

            969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

          • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
            Filesize

            2.8MB

            MD5

            a73e083297e46d8e23f012d66a08f3a3

            SHA1

            83527df5a484494894ad2c71908a170a115751af

            SHA256

            0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

            SHA512

            78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

          • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
            Filesize

            2.8MB

            MD5

            a73e083297e46d8e23f012d66a08f3a3

            SHA1

            83527df5a484494894ad2c71908a170a115751af

            SHA256

            0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

            SHA512

            78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

          • C:\Users\Admin\AppData\Local\Temp\NewTask.xml
            Filesize

            1KB

            MD5

            d1df1022fb1b354d681f70c136d33a93

            SHA1

            1addd335dbf12bfddb7df9fdc7624b1509e7c5d2

            SHA256

            e483fde09c56754565696735c85771bbc5a8ff85dbbc70a74c7c5a1dafdf98a5

            SHA512

            34ad097cf429724ae7e3c84362de5d918ac353ac4f31a8072812e00955748f233c5f2ff9382cc6952fdf46498a628535d5ab0fc3b33029cfd7c59c82c6123c0b

          • C:\Users\Admin\AppData\Local\Temp\RES8795.tmp
            Filesize

            1KB

            MD5

            cc9f19d685d4e3142a515baa7519b74b

            SHA1

            6cbdf8d0b18c5ccc3060b9aa534271c423924cb7

            SHA256

            5540f8e61eb313e863ff5657914c3110fa17e07a72b7547b1b607c7be43f354a

            SHA512

            9b28640c7a5b56ae795cad77d56887da9381d31feed2681843d6c4d09a80b049a73289e93f55518c52f0a8e34dcb15529dec86e83685b675b39653e580a0dc96

          • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
            Filesize

            7.6MB

            MD5

            cb565c1afd8469f43dd6917af55b733f

            SHA1

            e71a56a7b13536d686ab9f4f2492d60c02a7790e

            SHA256

            4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

            SHA512

            d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

          • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
            Filesize

            7.6MB

            MD5

            cb565c1afd8469f43dd6917af55b733f

            SHA1

            e71a56a7b13536d686ab9f4f2492d60c02a7790e

            SHA256

            4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

            SHA512

            d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

          • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
            Filesize

            7.6MB

            MD5

            cb565c1afd8469f43dd6917af55b733f

            SHA1

            e71a56a7b13536d686ab9f4f2492d60c02a7790e

            SHA256

            4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

            SHA512

            d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\MSVCP140.dll
            Filesize

            553KB

            MD5

            6da7f4530edb350cf9d967d969ccecf8

            SHA1

            3e2681ea91f60a7a9ef2407399d13c1ca6aa71e9

            SHA256

            9fee6f36547d6f6ea7ca0338655555dba6bb0f798bc60334d29b94d1547da4da

            SHA512

            1f77f900215a4966f7f4e5d23b4aaad203136cb8561f4e36f03f13659fe1ff4b81caa75fef557c890e108f28f0484ad2baa825559114c0daa588cf1de6c1afab

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\MSVCP140.dll
            Filesize

            553KB

            MD5

            6da7f4530edb350cf9d967d969ccecf8

            SHA1

            3e2681ea91f60a7a9ef2407399d13c1ca6aa71e9

            SHA256

            9fee6f36547d6f6ea7ca0338655555dba6bb0f798bc60334d29b94d1547da4da

            SHA512

            1f77f900215a4966f7f4e5d23b4aaad203136cb8561f4e36f03f13659fe1ff4b81caa75fef557c890e108f28f0484ad2baa825559114c0daa588cf1de6c1afab

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\PIL\_imaging.cp310-win_amd64.pyd
            Filesize

            955KB

            MD5

            f4f2116ea9397fecf3c02a43706ee6e7

            SHA1

            f31b77b893f1bce048e48b93f493b1eb729b6ad0

            SHA256

            4a0af9cf2265ec7799e02870f8eec6a01bc796a45d786b34c8b980014c4a1c69

            SHA512

            04d96cac6c2d2c03d83d3e5513850b08151387303708373c22faa2410404c2145dac1118539145bb1f2f2ad90e458c7af257ef89d1ec683bca91b4575814f365

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\PIL\_imaging.cp310-win_amd64.pyd
            Filesize

            955KB

            MD5

            f4f2116ea9397fecf3c02a43706ee6e7

            SHA1

            f31b77b893f1bce048e48b93f493b1eb729b6ad0

            SHA256

            4a0af9cf2265ec7799e02870f8eec6a01bc796a45d786b34c8b980014c4a1c69

            SHA512

            04d96cac6c2d2c03d83d3e5513850b08151387303708373c22faa2410404c2145dac1118539145bb1f2f2ad90e458c7af257ef89d1ec683bca91b4575814f365

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\VCRUNTIME140.dll
            Filesize

            96KB

            MD5

            f12681a472b9dd04a812e16096514974

            SHA1

            6fd102eb3e0b0e6eef08118d71f28702d1a9067c

            SHA256

            d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

            SHA512

            7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\VCRUNTIME140.dll
            Filesize

            96KB

            MD5

            f12681a472b9dd04a812e16096514974

            SHA1

            6fd102eb3e0b0e6eef08118d71f28702d1a9067c

            SHA256

            d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

            SHA512

            7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\VCRUNTIME140_1.dll
            Filesize

            36KB

            MD5

            135359d350f72ad4bf716b764d39e749

            SHA1

            2e59d9bbcce356f0fece56c9c4917a5cacec63d7

            SHA256

            34048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32

            SHA512

            cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\VCRUNTIME140_1.dll
            Filesize

            36KB

            MD5

            135359d350f72ad4bf716b764d39e749

            SHA1

            2e59d9bbcce356f0fece56c9c4917a5cacec63d7

            SHA256

            34048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32

            SHA512

            cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_bz2.pyd
            Filesize

            47KB

            MD5

            bf3679866df99540937628081af5537d

            SHA1

            bdbbd56b0fe20d3746aed33d89b4caeb08fc0a1f

            SHA256

            d0dd970620243dd87ae77db8a631a389b2cbeee216c7bee2b3425469a315618b

            SHA512

            34955168113c87750b91f4b794bed257b2215485b3abafb8b459b58599a3fc5381487a7f5157358336e7626501762765443b91ec117b949e7da91a3f9e56f682

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_bz2.pyd
            Filesize

            47KB

            MD5

            bf3679866df99540937628081af5537d

            SHA1

            bdbbd56b0fe20d3746aed33d89b4caeb08fc0a1f

            SHA256

            d0dd970620243dd87ae77db8a631a389b2cbeee216c7bee2b3425469a315618b

            SHA512

            34955168113c87750b91f4b794bed257b2215485b3abafb8b459b58599a3fc5381487a7f5157358336e7626501762765443b91ec117b949e7da91a3f9e56f682

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_hashlib.pyd
            Filesize

            33KB

            MD5

            05b06b9fdcf074e10f67e105588d713c

            SHA1

            0993bc372eb6b517bde9919d5f5a0bb9891945c5

            SHA256

            0d9d24dc4886321d68491db93921415c06871dc34de2ed91031de6fa369a1d93

            SHA512

            617752b8420e87b5ce3070238e18b24c9d4a2a7144a0070efbb068efc1ef98e0d8df15776fb644de57b554f89f887f96b6e7b09dda9278d3d32a0e81d5f1fa24

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_hashlib.pyd
            Filesize

            33KB

            MD5

            05b06b9fdcf074e10f67e105588d713c

            SHA1

            0993bc372eb6b517bde9919d5f5a0bb9891945c5

            SHA256

            0d9d24dc4886321d68491db93921415c06871dc34de2ed91031de6fa369a1d93

            SHA512

            617752b8420e87b5ce3070238e18b24c9d4a2a7144a0070efbb068efc1ef98e0d8df15776fb644de57b554f89f887f96b6e7b09dda9278d3d32a0e81d5f1fa24

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_lzma.pyd
            Filesize

            84KB

            MD5

            89c7f76c784854d62a8e516137d43607

            SHA1

            1dad4da521cd2ad1470aaa3a51aa4c004e77181e

            SHA256

            4612008b686994ab7bd4f384f6566a3a853d9a1c8935bfaa07eb595fdebd01a1

            SHA512

            bb83ac17a114665101446188279e7689e9661e18c5596c3a2e9625b72aeb748149db36bf96423c85f7ee448fd3ffeeeab6102ca7522ed1c4e3318d9c3bfc46e0

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_lzma.pyd
            Filesize

            84KB

            MD5

            89c7f76c784854d62a8e516137d43607

            SHA1

            1dad4da521cd2ad1470aaa3a51aa4c004e77181e

            SHA256

            4612008b686994ab7bd4f384f6566a3a853d9a1c8935bfaa07eb595fdebd01a1

            SHA512

            bb83ac17a114665101446188279e7689e9661e18c5596c3a2e9625b72aeb748149db36bf96423c85f7ee448fd3ffeeeab6102ca7522ed1c4e3318d9c3bfc46e0

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_queue.pyd
            Filesize

            24KB

            MD5

            5aafc702d526cd407a1c806a9e84f84a

            SHA1

            96ace17b3355dbfb9e81a913e058b2c815279e3f

            SHA256

            16b07e2496bd084845a2b41b6d98786a16c796a9eaba2f90046ec44be9338d78

            SHA512

            b610dd56d05b534ee1de45e1a0af66aba3076f5f9977622548ecbdd87d7c95fa562c4ad37cbf1e6ccae0e8dec2d0ea9f9b9c725f6d053ea388fe65e1c038c4d9

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_queue.pyd
            Filesize

            24KB

            MD5

            5aafc702d526cd407a1c806a9e84f84a

            SHA1

            96ace17b3355dbfb9e81a913e058b2c815279e3f

            SHA256

            16b07e2496bd084845a2b41b6d98786a16c796a9eaba2f90046ec44be9338d78

            SHA512

            b610dd56d05b534ee1de45e1a0af66aba3076f5f9977622548ecbdd87d7c95fa562c4ad37cbf1e6ccae0e8dec2d0ea9f9b9c725f6d053ea388fe65e1c038c4d9

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_socket.pyd
            Filesize

            41KB

            MD5

            10bddaab060fe231dd96b1c3859367a6

            SHA1

            44ae0c7f505158a044e9dfbd2283d8bb54d9a8ac

            SHA256

            d1eaea0b871e2b97a30a7ef7aefbe30c6d658598a994d707aedd7d59ee880e02

            SHA512

            acb03d9e2729b8643b4e14fb29c5e044ad55f342688b4203beb27420abd454ed4534eba14300b3db624e56921b787a76b787e91888a5257e133962878968d65d

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_socket.pyd
            Filesize

            41KB

            MD5

            10bddaab060fe231dd96b1c3859367a6

            SHA1

            44ae0c7f505158a044e9dfbd2283d8bb54d9a8ac

            SHA256

            d1eaea0b871e2b97a30a7ef7aefbe30c6d658598a994d707aedd7d59ee880e02

            SHA512

            acb03d9e2729b8643b4e14fb29c5e044ad55f342688b4203beb27420abd454ed4534eba14300b3db624e56921b787a76b787e91888a5257e133962878968d65d

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_ssl.pyd
            Filesize

            60KB

            MD5

            b1e9214217b06262bfc0e55247b5adc7

            SHA1

            4070a35c41e0e59216931bc06e94a8f2b5fd84fd

            SHA256

            34fd7be67093600009c73e010eef81dac32f1c560708a34b8cca382d94f759b2

            SHA512

            73463229ca3c3d137d24a7edff1601faf9a39ee15a5abb0b214dca2fb04ba9f9847b4e99ce19d9431feab0748fcc5671a5558ebaa4f4d950c17d7a9784c02ffc

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\_ssl.pyd
            Filesize

            60KB

            MD5

            b1e9214217b06262bfc0e55247b5adc7

            SHA1

            4070a35c41e0e59216931bc06e94a8f2b5fd84fd

            SHA256

            34fd7be67093600009c73e010eef81dac32f1c560708a34b8cca382d94f759b2

            SHA512

            73463229ca3c3d137d24a7edff1601faf9a39ee15a5abb0b214dca2fb04ba9f9847b4e99ce19d9431feab0748fcc5671a5558ebaa4f4d950c17d7a9784c02ffc

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\base_library.zip
            Filesize

            812KB

            MD5

            22ae93d5665578cdbed09bfa02c63648

            SHA1

            fa32b9dcfad5cacee03582e18762e6fc0f949875

            SHA256

            53afa83b6c48e7d641839c0967c5123dd2702d57c5c1dca9cf2850a94b12dd71

            SHA512

            8276c5f9d78bcd6be6f294279ab8d7dbe74407b7e13b9eb6076e54fa9619ad8057bf924c73fbb7b85f26a0faea532b239978d8f697cc3299aa0c881b31964415

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\libcrypto-1_1.dll
            Filesize

            1.1MB

            MD5

            730ffd5fc87b96950c61d6f16c1d888a

            SHA1

            596802d785321bd9af39b083c10fc94ef18eef4e

            SHA256

            d3357cc31e9fda8afe230f49a35d61791c9e420b417e9929aac16d79c2a02b41

            SHA512

            5ca793e38e7023269deea9c54b15afca689fa85bd5e8e12903e36108b385270cde2f0c4801c2a360b88c7ce4a63234a3927f2e27d369e7c5cc5cc351184f191b

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\libcrypto-1_1.dll
            Filesize

            1.1MB

            MD5

            730ffd5fc87b96950c61d6f16c1d888a

            SHA1

            596802d785321bd9af39b083c10fc94ef18eef4e

            SHA256

            d3357cc31e9fda8afe230f49a35d61791c9e420b417e9929aac16d79c2a02b41

            SHA512

            5ca793e38e7023269deea9c54b15afca689fa85bd5e8e12903e36108b385270cde2f0c4801c2a360b88c7ce4a63234a3927f2e27d369e7c5cc5cc351184f191b

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\libcrypto-1_1.dll
            Filesize

            1.1MB

            MD5

            730ffd5fc87b96950c61d6f16c1d888a

            SHA1

            596802d785321bd9af39b083c10fc94ef18eef4e

            SHA256

            d3357cc31e9fda8afe230f49a35d61791c9e420b417e9929aac16d79c2a02b41

            SHA512

            5ca793e38e7023269deea9c54b15afca689fa85bd5e8e12903e36108b385270cde2f0c4801c2a360b88c7ce4a63234a3927f2e27d369e7c5cc5cc351184f191b

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\libssl-1_1.dll
            Filesize

            203KB

            MD5

            c222c1d04c4ccac9fe48408000b2a86e

            SHA1

            e71344c9f1f8c0441c8757df4f72af9354c122a1

            SHA256

            4f64cebd3d99810518e8f6fe2762bb11f1ea54c8128dd77d99f2a3fbcdc5d253

            SHA512

            a57333303c759be965d7c4b3fcd8f76f569eec5bb8d46071f122be28e21c8f302ad52c563f6260e671dc69eb7478b7817f0f08a3b2986fdff645f1dba55a402d

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\libssl-1_1.dll
            Filesize

            203KB

            MD5

            c222c1d04c4ccac9fe48408000b2a86e

            SHA1

            e71344c9f1f8c0441c8757df4f72af9354c122a1

            SHA256

            4f64cebd3d99810518e8f6fe2762bb11f1ea54c8128dd77d99f2a3fbcdc5d253

            SHA512

            a57333303c759be965d7c4b3fcd8f76f569eec5bb8d46071f122be28e21c8f302ad52c563f6260e671dc69eb7478b7817f0f08a3b2986fdff645f1dba55a402d

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\python310.dll
            Filesize

            1.5MB

            MD5

            e06ce8146da66871aa8aeedc950fd12b

            SHA1

            6ee749bdd0bc857a41ac8018c5553e895784b961

            SHA256

            aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4

            SHA512

            0d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\python310.dll
            Filesize

            1.5MB

            MD5

            e06ce8146da66871aa8aeedc950fd12b

            SHA1

            6ee749bdd0bc857a41ac8018c5553e895784b961

            SHA256

            aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4

            SHA512

            0d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\pywintypes310.dll
            Filesize

            64KB

            MD5

            097c852260ef0b780ddb498eab0671cd

            SHA1

            01b79721c9fd445f637fe0736d7806b19694b742

            SHA256

            4b3b80853ee96075eb10694efbbbe364273ec555e80c3b83d6791b06aa27598f

            SHA512

            6b0c5a35a16ad29b224ac25105b9c65bcba0a17fd558b6a552e33e2810fb7fda1eff6c99a0627e43adde164f7f45c714658c8ea82aa78fc17592782ad73b98bd

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\select.pyd
            Filesize

            24KB

            MD5

            7bb6ccfeb77e3b3c812271f3c57c7139

            SHA1

            d60ff5c903ef276823ab294f38295b24c4886e38

            SHA256

            1c035581c147204882a2ebeb2fee46f95c0cf738b889081bca8250b1739d7aa3

            SHA512

            b5bf030e08d3ddb1c90b8d236d0c40b485f5a26e34bddcbd23b96b08b142992712584645e9bf621263f6a75979c6bbf90aa7ec14d08248a285caa420f44d9c9b

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\select.pyd
            Filesize

            24KB

            MD5

            7bb6ccfeb77e3b3c812271f3c57c7139

            SHA1

            d60ff5c903ef276823ab294f38295b24c4886e38

            SHA256

            1c035581c147204882a2ebeb2fee46f95c0cf738b889081bca8250b1739d7aa3

            SHA512

            b5bf030e08d3ddb1c90b8d236d0c40b485f5a26e34bddcbd23b96b08b142992712584645e9bf621263f6a75979c6bbf90aa7ec14d08248a285caa420f44d9c9b

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\tinyaes.cp310-win_amd64.pyd
            Filesize

            21KB

            MD5

            5e29122bad14fb002d9e34c7659a8af9

            SHA1

            c2ac4019339856735f64421debd83d4beaf383e5

            SHA256

            87869f86ca6696e0daca8dbed3e5e738e79a519f695b058212a0e00567130f75

            SHA512

            c2c9b2fefeb9d910f1524b7c574000b02e596667a4b69834b962779cf7ff8778e2d3171ca9269cf85c7c4d1c83c14b6db7049041bf85f968da696731e8d5ff1c

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\tinyaes.cp310-win_amd64.pyd
            Filesize

            21KB

            MD5

            5e29122bad14fb002d9e34c7659a8af9

            SHA1

            c2ac4019339856735f64421debd83d4beaf383e5

            SHA256

            87869f86ca6696e0daca8dbed3e5e738e79a519f695b058212a0e00567130f75

            SHA512

            c2c9b2fefeb9d910f1524b7c574000b02e596667a4b69834b962779cf7ff8778e2d3171ca9269cf85c7c4d1c83c14b6db7049041bf85f968da696731e8d5ff1c

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\win32crypt.pyd
            Filesize

            51KB

            MD5

            82ba334401d02bd9df1cdb8609c4554c

            SHA1

            aa78f72338b0c1577ecda3f5b433b545cdd14d0e

            SHA256

            a2a705b40dfab7c679e5742ea022d354833824476f08fa9fd7c6db8cab00df66

            SHA512

            9cedf778e6855fdcb353276f61431e06cc27717e9299c2419f29d4d338866e25170e04b316e215b6397f79e7ef484e3e8704e5990db77be89bbf2803c0e1dce9

          • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_44122\win32crypt.pyd
            Filesize

            51KB

            MD5

            82ba334401d02bd9df1cdb8609c4554c

            SHA1

            aa78f72338b0c1577ecda3f5b433b545cdd14d0e

            SHA256

            a2a705b40dfab7c679e5742ea022d354833824476f08fa9fd7c6db8cab00df66

            SHA512

            9cedf778e6855fdcb353276f61431e06cc27717e9299c2419f29d4d338866e25170e04b316e215b6397f79e7ef484e3e8704e5990db77be89bbf2803c0e1dce9

          • C:\Users\Admin\AppData\Local\Temp\joined.exe
            Filesize

            56KB

            MD5

            cf96dc2c8aa103b404761701c0e9e38e

            SHA1

            84c300ec07b1182ee095e9550395e1d5669934ca

            SHA256

            6dc79af279e0324e3afb2621d812510d47fe29226cf3af1b37beee37fe2cada8

            SHA512

            2e66127e212f014da3cb2f2e0fd2b969639d3e7ffb18d343e107e0449d889ebc262d96ac7b47ca8b95909790d7175afd509b9e3a1d7f34d5cb0bcb49058a9ca5

          • C:\Users\Admin\AppData\Local\Temp\joined.exe
            Filesize

            56KB

            MD5

            cf96dc2c8aa103b404761701c0e9e38e

            SHA1

            84c300ec07b1182ee095e9550395e1d5669934ca

            SHA256

            6dc79af279e0324e3afb2621d812510d47fe29226cf3af1b37beee37fe2cada8

            SHA512

            2e66127e212f014da3cb2f2e0fd2b969639d3e7ffb18d343e107e0449d889ebc262d96ac7b47ca8b95909790d7175afd509b9e3a1d7f34d5cb0bcb49058a9ca5

          • C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe
            Filesize

            54KB

            MD5

            ebd7887003feaad033856253c14de51c

            SHA1

            1ef092f6c79df2e57c8a49469e4b44815d384948

            SHA256

            faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

            SHA512

            969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

          • C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe
            Filesize

            54KB

            MD5

            ebd7887003feaad033856253c14de51c

            SHA1

            1ef092f6c79df2e57c8a49469e4b44815d384948

            SHA256

            faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

            SHA512

            969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

          • C:\Users\Admin\AppData\Local\Temp\orc.exe
            Filesize

            916KB

            MD5

            ac0431f34683bcbbb2cf23aaf29ea8cf

            SHA1

            275ec0e362cb074d5f080aaa41c25a8ecebe3205

            SHA256

            1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

            SHA512

            156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

          • C:\Users\Admin\AppData\Local\Temp\orc.exe
            Filesize

            916KB

            MD5

            ac0431f34683bcbbb2cf23aaf29ea8cf

            SHA1

            275ec0e362cb074d5f080aaa41c25a8ecebe3205

            SHA256

            1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

            SHA512

            156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

          • C:\Users\Admin\AppData\Local\Temp\rtbp-9by.dll
            Filesize

            76KB

            MD5

            5f33e7f377b59183e8bdc2b8bef95b81

            SHA1

            57d8749f92d946d7d72bb0d347608ec1a99d5ff5

            SHA256

            388096283ebd59679660ab28b34b46d13d6157dc57fb4e11ad529cac8d60dde5

            SHA512

            aebea2df1307dff0634fb1c9c28fece3e84b91146e03d6e8ec6e8b2cb081d31c3b7ef9c03499f06a2e79f591f6fc08a4a4d67299c1e243e6fda63f60f7f56d22

          • C:\Users\Admin\AppData\Local\Temp\sqls328.exe
            Filesize

            16KB

            MD5

            d7f2c50640108c104286ef71923c70d7

            SHA1

            7ccd84daed8ca9572ae3a8c98c38adf753fb8f33

            SHA256

            53aef6261df3f802393d9196a5c87e69d1e07e2aaff45a606344b91f5801255a

            SHA512

            eeb34a038920d0ff833f3140afd256dd6a0ea589052223d9bf61135d4557e8302e582782893348a7d40ef07af0c68a3068a052822d244ad65b7365cd0aeea0f0

          • C:\Users\Admin\AppData\Local\Temp\sqls328.exe
            Filesize

            16KB

            MD5

            d7f2c50640108c104286ef71923c70d7

            SHA1

            7ccd84daed8ca9572ae3a8c98c38adf753fb8f33

            SHA256

            53aef6261df3f802393d9196a5c87e69d1e07e2aaff45a606344b91f5801255a

            SHA512

            eeb34a038920d0ff833f3140afd256dd6a0ea589052223d9bf61135d4557e8302e582782893348a7d40ef07af0c68a3068a052822d244ad65b7365cd0aeea0f0

          • C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe
            Filesize

            2.8MB

            MD5

            a73e083297e46d8e23f012d66a08f3a3

            SHA1

            83527df5a484494894ad2c71908a170a115751af

            SHA256

            0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

            SHA512

            78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

          • C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe
            Filesize

            2.8MB

            MD5

            a73e083297e46d8e23f012d66a08f3a3

            SHA1

            83527df5a484494894ad2c71908a170a115751af

            SHA256

            0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

            SHA512

            78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

          • C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
            Filesize

            967KB

            MD5

            b63bb68654e7be72058398809d6c4754

            SHA1

            4a7b43488029a2d4c960c9ee4431b99c8640a4b0

            SHA256

            8db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe

            SHA512

            c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a

          • C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
            Filesize

            967KB

            MD5

            b63bb68654e7be72058398809d6c4754

            SHA1

            4a7b43488029a2d4c960c9ee4431b99c8640a4b0

            SHA256

            8db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe

            SHA512

            c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a

          • C:\Users\Admin\Downloads\plage.exe
            Filesize

            967KB

            MD5

            b03ccade490854df220914c4430967e2

            SHA1

            1911a59e8c4b427d3fbc8fc9c794886bd2d81305

            SHA256

            81cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961

            SHA512

            0c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36

          • C:\Users\Admin\Downloads\plage.exe
            Filesize

            967KB

            MD5

            b03ccade490854df220914c4430967e2

            SHA1

            1911a59e8c4b427d3fbc8fc9c794886bd2d81305

            SHA256

            81cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961

            SHA512

            0c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36

          • C:\Windows\SysWOW64\WindowsInput.exe
            Filesize

            21KB

            MD5

            e6fcf516d8ed8d0d4427f86e08d0d435

            SHA1

            c7691731583ab7890086635cb7f3e4c22ca5e409

            SHA256

            8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

            SHA512

            c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

          • C:\Windows\SysWOW64\WindowsInput.exe
            Filesize

            21KB

            MD5

            e6fcf516d8ed8d0d4427f86e08d0d435

            SHA1

            c7691731583ab7890086635cb7f3e4c22ca5e409

            SHA256

            8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

            SHA512

            c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

          • C:\Windows\SysWOW64\WindowsInput.exe.config
            Filesize

            357B

            MD5

            a2b76cea3a59fa9af5ea21ff68139c98

            SHA1

            35d76475e6a54c168f536e30206578babff58274

            SHA256

            f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

            SHA512

            b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

          • \??\c:\Users\Admin\AppData\Local\Temp\CSC8794.tmp
            Filesize

            676B

            MD5

            2b990e365afa0dcae6e7419da03fcc03

            SHA1

            1d48eb49df0054c326b770569ae8b5c6570fc16d

            SHA256

            1cfa8c6e27a6d1474904ea6cf934f491e39f2dca67d079081ed58d73681d34ee

            SHA512

            9e8f7aa5fbb855268c11ab51361d379e0fd2ad08fe62c176aceb791adef8be894aa1b13ecb2f2bdd4b6f42fe62485883eab17150d2b8bff1b30538259d4afc55

          • \??\c:\Users\Admin\AppData\Local\Temp\rtbp-9by.0.cs
            Filesize

            208KB

            MD5

            0df92d3cf2e204178ffb0f406bade7e6

            SHA1

            094ed909078d703eee216ffff978a61f864b132a

            SHA256

            d149a6cf60b6686e0fbff0f18ebb33f318e92ce053e4fb8bd535b382885076e0

            SHA512

            6ab74387dd232fa12f3b6da745a9df74e382f21ef4c184d3b45b8836d5f32b87f3306c1b4c83f280c11debbaa019ba509d9b33ae5cf5ecb11140a24ee2a10ca6

          • \??\c:\Users\Admin\AppData\Local\Temp\rtbp-9by.cmdline
            Filesize

            349B

            MD5

            a71c40bdb1c29fb5314a4b175a7fcb75

            SHA1

            eb312a00152ac3fed3c8a30e01905d433665d2a1

            SHA256

            03344e1b6d35cd47ec3e6130066f00f0b6367612f29a2e2549dff506f1788fc7

            SHA512

            21ca7ce900b0b7276abab5f3d8c8f5e4af9d0e86fb84ce1b3ac789959c8ecfc4e35b6ab348d1e4815c7187c29b4a708753d2494ead76adc3234a78bf28c504b2

          • memory/224-241-0x0000000000000000-mapping.dmp
          • memory/224-263-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/224-255-0x0000000001000000-0x0000000001012000-memory.dmp
            Filesize

            72KB

          • memory/224-256-0x0000000001280000-0x00000000012BC000-memory.dmp
            Filesize

            240KB

          • memory/224-245-0x0000000000AC0000-0x0000000000ACC000-memory.dmp
            Filesize

            48KB

          • memory/344-153-0x0000000000000000-mapping.dmp
          • memory/392-175-0x0000000000000000-mapping.dmp
          • memory/444-274-0x0000000000000000-mapping.dmp
          • memory/484-264-0x00007FFFC7D60000-0x00007FFFC7D8B000-memory.dmp
            Filesize

            172KB

          • memory/484-292-0x00007FFFC2130000-0x00007FFFC24A5000-memory.dmp
            Filesize

            3.5MB

          • memory/484-262-0x00007FFFC1E00000-0x00007FFFC2124000-memory.dmp
            Filesize

            3.1MB

          • memory/484-293-0x00007FFFC8790000-0x00007FFFC8848000-memory.dmp
            Filesize

            736KB

          • memory/484-290-0x00007FFFC8850000-0x00007FFFC887E000-memory.dmp
            Filesize

            184KB

          • memory/484-261-0x00007FFFC8740000-0x00007FFFC876D000-memory.dmp
            Filesize

            180KB

          • memory/484-259-0x00007FFFD67D0000-0x00007FFFD67DD000-memory.dmp
            Filesize

            52KB

          • memory/484-257-0x00007FFFC8790000-0x00007FFFC8848000-memory.dmp
            Filesize

            736KB

          • memory/484-202-0x0000000000000000-mapping.dmp
          • memory/484-291-0x0000020622970000-0x0000020622CE5000-memory.dmp
            Filesize

            3.5MB

          • memory/484-226-0x00007FFFCC7E0000-0x00007FFFCC7F3000-memory.dmp
            Filesize

            76KB

          • memory/484-223-0x00007FFFC7E70000-0x00007FFFC82DF000-memory.dmp
            Filesize

            4.4MB

          • memory/484-289-0x00007FFFC7E70000-0x00007FFFC82DF000-memory.dmp
            Filesize

            4.4MB

          • memory/484-228-0x00007FFFCA0D0000-0x00007FFFCA0E9000-memory.dmp
            Filesize

            100KB

          • memory/484-229-0x00007FFFC9C70000-0x00007FFFC9C89000-memory.dmp
            Filesize

            100KB

          • memory/484-231-0x00007FFFE81C0000-0x00007FFFE81CD000-memory.dmp
            Filesize

            52KB

          • memory/484-232-0x00007FFFC8850000-0x00007FFFC887E000-memory.dmp
            Filesize

            184KB

          • memory/484-277-0x00007FFFCF260000-0x00007FFFCF378000-memory.dmp
            Filesize

            1.1MB

          • memory/484-233-0x0000020622970000-0x0000020622CE5000-memory.dmp
            Filesize

            3.5MB

          • memory/484-265-0x00007FFFC7D20000-0x00007FFFC7D51000-memory.dmp
            Filesize

            196KB

          • memory/484-258-0x00007FFFC8770000-0x00007FFFC8784000-memory.dmp
            Filesize

            80KB

          • memory/484-234-0x00007FFFC2130000-0x00007FFFC24A5000-memory.dmp
            Filesize

            3.5MB

          • memory/760-142-0x0000000000000000-mapping.dmp
          • memory/760-145-0x0000000000260000-0x000000000026A000-memory.dmp
            Filesize

            40KB

          • memory/816-141-0x00007FFFCC8A0000-0x00007FFFCD2D6000-memory.dmp
            Filesize

            10.2MB

          • memory/816-133-0x0000000000000000-mapping.dmp
          • memory/1060-150-0x000001F412350000-0x000001F412362000-memory.dmp
            Filesize

            72KB

          • memory/1060-154-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/1060-146-0x0000000000000000-mapping.dmp
          • memory/1060-284-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/1268-227-0x000000001D150000-0x000000001D202000-memory.dmp
            Filesize

            712KB

          • memory/1268-287-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/1268-222-0x0000000001810000-0x0000000001860000-memory.dmp
            Filesize

            320KB

          • memory/1268-176-0x0000000000000000-mapping.dmp
          • memory/1268-180-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/1656-286-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/1656-288-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/1692-169-0x0000000000000000-mapping.dmp
          • memory/1836-268-0x0000000007B90000-0x0000000007BAA000-memory.dmp
            Filesize

            104KB

          • memory/1836-195-0x0000000007850000-0x000000000786A000-memory.dmp
            Filesize

            104KB

          • memory/1836-151-0x0000000002C70000-0x0000000002CA6000-memory.dmp
            Filesize

            216KB

          • memory/1836-267-0x0000000007A90000-0x0000000007A9E000-memory.dmp
            Filesize

            56KB

          • memory/1836-182-0x0000000006B10000-0x0000000006B42000-memory.dmp
            Filesize

            200KB

          • memory/1836-183-0x000000006F7B0000-0x000000006F7FC000-memory.dmp
            Filesize

            304KB

          • memory/1836-185-0x0000000006AF0000-0x0000000006B0E000-memory.dmp
            Filesize

            120KB

          • memory/1836-152-0x00000000057C0000-0x0000000005DE8000-memory.dmp
            Filesize

            6.2MB

          • memory/1836-156-0x00000000055A0000-0x00000000055C2000-memory.dmp
            Filesize

            136KB

          • memory/1836-157-0x0000000005EA0000-0x0000000005F06000-memory.dmp
            Filesize

            408KB

          • memory/1836-191-0x0000000007ED0000-0x000000000854A000-memory.dmp
            Filesize

            6.5MB

          • memory/1836-270-0x0000000007B80000-0x0000000007B88000-memory.dmp
            Filesize

            32KB

          • memory/1836-158-0x0000000005F10000-0x0000000005F76000-memory.dmp
            Filesize

            408KB

          • memory/1836-147-0x0000000000000000-mapping.dmp
          • memory/1836-197-0x0000000007AD0000-0x0000000007B66000-memory.dmp
            Filesize

            600KB

          • memory/1836-163-0x00000000065D0000-0x00000000065EE000-memory.dmp
            Filesize

            120KB

          • memory/1836-196-0x00000000078D0000-0x00000000078DA000-memory.dmp
            Filesize

            40KB

          • memory/1980-172-0x0000000000000000-mapping.dmp
          • memory/2240-276-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/2240-294-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/2240-272-0x000000001B600000-0x000000001B70A000-memory.dmp
            Filesize

            1.0MB

          • memory/2324-190-0x0000000000000000-mapping.dmp
          • memory/2384-159-0x0000000000000000-mapping.dmp
          • memory/2384-168-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/2384-181-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/2384-162-0x0000000000160000-0x000000000042A000-memory.dmp
            Filesize

            2.8MB

          • memory/2556-260-0x0000000000000000-mapping.dmp
          • memory/3116-254-0x0000000000000000-mapping.dmp
          • memory/3336-280-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/3336-273-0x0000020474E80000-0x0000020474EA2000-memory.dmp
            Filesize

            136KB

          • memory/3336-279-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/3336-271-0x0000000000000000-mapping.dmp
          • memory/3436-269-0x0000000000000000-mapping.dmp
          • memory/3664-281-0x0000000000000000-mapping.dmp
          • memory/3664-282-0x0000000000B80000-0x0000000000B88000-memory.dmp
            Filesize

            32KB

          • memory/4044-179-0x0000000000000000-mapping.dmp
          • memory/4052-266-0x0000000000000000-mapping.dmp
          • memory/4100-187-0x0000000000000000-mapping.dmp
          • memory/4320-132-0x0000000000400000-0x0000000000444000-memory.dmp
            Filesize

            272KB

          • memory/4360-283-0x0000000000000000-mapping.dmp
          • memory/4412-198-0x0000000000000000-mapping.dmp
          • memory/4424-137-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/4424-136-0x0000000000000000-mapping.dmp
          • memory/4424-139-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/4424-140-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/4496-199-0x0000000000000000-mapping.dmp
          • memory/4648-164-0x0000000000000000-mapping.dmp
          • memory/4648-167-0x00007FFFC3D20000-0x00007FFFC4756000-memory.dmp
            Filesize

            10.2MB

          • memory/4704-174-0x0000000000000000-mapping.dmp
          • memory/4816-285-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB

          • memory/4816-275-0x0000000000000000-mapping.dmp
          • memory/4816-278-0x0000000000B20000-0x0000000000C0A000-memory.dmp
            Filesize

            936KB

          • memory/4816-295-0x00007FFFCE240000-0x00007FFFCED01000-memory.dmp
            Filesize

            10.8MB