Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-10-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe
Resource
win7-20220812-en
General
-
Target
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe
-
Size
4.8MB
-
MD5
854d5dfe2d5193aa4150765c123df8ad
-
SHA1
1b21d80c4beb90b03d795cf11145619aeb3a4f37
-
SHA256
85b73b7b3c9acc6648beb77ce878ebeea26a2a949bf17c3184f2bd4544d12b45
-
SHA512
48ed604ea966a35cc16631ce5da692bb236badafdb6d3d01ef3a27ab5a9c1ea6a19d6e8209c894ab292614cfbd355c2ca96401fd4dbb9a3abbfd886cddae77cc
-
SSDEEP
98304:GiIOIQKetb5uDv/tFAOoLKSIc5EP61wNYZiu7JfQmEM9:rIbCEA1EP614g9fQm59
Malware Config
Extracted
privateloader
208.67.104.60
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeWb7aK7C4B7M8gaofcfNSOSlc.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
Wb7aK7C4B7M8gaofcfNSOSlc.exeG5yOTgYtlYWYd5b6wGq0pJbL.exe6VhzR4xiKB8K2R16S07cHEx4.exebene4kQUESOH6KlgX0upJFWw.exeER9kHAMxnPq76Hbhkk6dz2X9.exetoEkCgCGLBSvK5X_vkeYfEVG.exexngnWVzD54Xrk7YRoylwqy4u.exe06apEz8tZfTwMgGOIu7chtdH.exeunA3TEMPb1cib1Fn3tGUxt4O.exeMj2VKn7Ht1o_1_XH8FTdkEDD.exed97AseAWdjPWBTaZgFR9hsNY.exeInstall.exeTAJhlFofHc17MR0VUeJRErpo.exepid process 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1616 G5yOTgYtlYWYd5b6wGq0pJbL.exe 1784 6VhzR4xiKB8K2R16S07cHEx4.exe 1344 bene4kQUESOH6KlgX0upJFWw.exe 1248 ER9kHAMxnPq76Hbhkk6dz2X9.exe 624 toEkCgCGLBSvK5X_vkeYfEVG.exe 876 xngnWVzD54Xrk7YRoylwqy4u.exe 1780 06apEz8tZfTwMgGOIu7chtdH.exe 684 unA3TEMPb1cib1Fn3tGUxt4O.exe 1704 Mj2VKn7Ht1o_1_XH8FTdkEDD.exe 1692 d97AseAWdjPWBTaZgFR9hsNY.exe 1968 Install.exe 1652 TAJhlFofHc17MR0VUeJRErpo.exe -
Processes:
resource yara_rule \Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exe upx \Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exe upx C:\Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exe upx -
Processes:
resource yara_rule \Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exe vmprotect \Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exe vmprotect C:\Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exe vmprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeWb7aK7C4B7M8gaofcfNSOSlc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Wb7aK7C4B7M8gaofcfNSOSlc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Wb7aK7C4B7M8gaofcfNSOSlc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Loads dropped DLL 25 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeWb7aK7C4B7M8gaofcfNSOSlc.exe06apEz8tZfTwMgGOIu7chtdH.exeInstall.exepid process 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1780 06apEz8tZfTwMgGOIu7chtdH.exe 1780 06apEz8tZfTwMgGOIu7chtdH.exe 1780 06apEz8tZfTwMgGOIu7chtdH.exe 1780 06apEz8tZfTwMgGOIu7chtdH.exe 1968 Install.exe 1968 Install.exe 1968 Install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeWb7aK7C4B7M8gaofcfNSOSlc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ipinfo.io 16 ipinfo.io 21 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
Wb7aK7C4B7M8gaofcfNSOSlc.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy Wb7aK7C4B7M8gaofcfNSOSlc.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Wb7aK7C4B7M8gaofcfNSOSlc.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Wb7aK7C4B7M8gaofcfNSOSlc.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeWb7aK7C4B7M8gaofcfNSOSlc.exepid process 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Drops file in Program Files directory 2 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1844 schtasks.exe 1604 schtasks.exe -
Processes:
Wb7aK7C4B7M8gaofcfNSOSlc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 Wb7aK7C4B7M8gaofcfNSOSlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Wb7aK7C4B7M8gaofcfNSOSlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 Wb7aK7C4B7M8gaofcfNSOSlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Wb7aK7C4B7M8gaofcfNSOSlc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeWb7aK7C4B7M8gaofcfNSOSlc.exepid process 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
LJK5O5JHPKATxDD0Y366F_yp.exe.0.exeWb7aK7C4B7M8gaofcfNSOSlc.exedescription pid process target process PID 1048 wrote to memory of 1944 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Wb7aK7C4B7M8gaofcfNSOSlc.exe PID 1048 wrote to memory of 1944 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Wb7aK7C4B7M8gaofcfNSOSlc.exe PID 1048 wrote to memory of 1944 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Wb7aK7C4B7M8gaofcfNSOSlc.exe PID 1048 wrote to memory of 1944 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe Wb7aK7C4B7M8gaofcfNSOSlc.exe PID 1048 wrote to memory of 1844 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1048 wrote to memory of 1844 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1048 wrote to memory of 1844 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1048 wrote to memory of 1844 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1048 wrote to memory of 1604 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1048 wrote to memory of 1604 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1048 wrote to memory of 1604 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1048 wrote to memory of 1604 1048 LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe schtasks.exe PID 1944 wrote to memory of 1616 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe G5yOTgYtlYWYd5b6wGq0pJbL.exe PID 1944 wrote to memory of 1616 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe G5yOTgYtlYWYd5b6wGq0pJbL.exe PID 1944 wrote to memory of 1616 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe G5yOTgYtlYWYd5b6wGq0pJbL.exe PID 1944 wrote to memory of 1616 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe G5yOTgYtlYWYd5b6wGq0pJbL.exe PID 1944 wrote to memory of 1784 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 6VhzR4xiKB8K2R16S07cHEx4.exe PID 1944 wrote to memory of 1784 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 6VhzR4xiKB8K2R16S07cHEx4.exe PID 1944 wrote to memory of 1784 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 6VhzR4xiKB8K2R16S07cHEx4.exe PID 1944 wrote to memory of 1784 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 6VhzR4xiKB8K2R16S07cHEx4.exe PID 1944 wrote to memory of 1784 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 6VhzR4xiKB8K2R16S07cHEx4.exe PID 1944 wrote to memory of 1784 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 6VhzR4xiKB8K2R16S07cHEx4.exe PID 1944 wrote to memory of 1784 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 6VhzR4xiKB8K2R16S07cHEx4.exe PID 1944 wrote to memory of 1704 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe Mj2VKn7Ht1o_1_XH8FTdkEDD.exe PID 1944 wrote to memory of 1704 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe Mj2VKn7Ht1o_1_XH8FTdkEDD.exe PID 1944 wrote to memory of 1704 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe Mj2VKn7Ht1o_1_XH8FTdkEDD.exe PID 1944 wrote to memory of 1704 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe Mj2VKn7Ht1o_1_XH8FTdkEDD.exe PID 1944 wrote to memory of 612 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe XyOAOCXk4zU7NuayLX5ocUHB.exe PID 1944 wrote to memory of 612 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe XyOAOCXk4zU7NuayLX5ocUHB.exe PID 1944 wrote to memory of 612 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe XyOAOCXk4zU7NuayLX5ocUHB.exe PID 1944 wrote to memory of 612 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe XyOAOCXk4zU7NuayLX5ocUHB.exe PID 1944 wrote to memory of 876 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe xngnWVzD54Xrk7YRoylwqy4u.exe PID 1944 wrote to memory of 876 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe xngnWVzD54Xrk7YRoylwqy4u.exe PID 1944 wrote to memory of 876 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe xngnWVzD54Xrk7YRoylwqy4u.exe PID 1944 wrote to memory of 876 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe xngnWVzD54Xrk7YRoylwqy4u.exe PID 1944 wrote to memory of 1344 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe bene4kQUESOH6KlgX0upJFWw.exe PID 1944 wrote to memory of 1344 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe bene4kQUESOH6KlgX0upJFWw.exe PID 1944 wrote to memory of 1344 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe bene4kQUESOH6KlgX0upJFWw.exe PID 1944 wrote to memory of 1344 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe bene4kQUESOH6KlgX0upJFWw.exe PID 1944 wrote to memory of 624 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe toEkCgCGLBSvK5X_vkeYfEVG.exe PID 1944 wrote to memory of 624 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe toEkCgCGLBSvK5X_vkeYfEVG.exe PID 1944 wrote to memory of 624 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe toEkCgCGLBSvK5X_vkeYfEVG.exe PID 1944 wrote to memory of 624 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe toEkCgCGLBSvK5X_vkeYfEVG.exe PID 1944 wrote to memory of 1248 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe ER9kHAMxnPq76Hbhkk6dz2X9.exe PID 1944 wrote to memory of 1248 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe ER9kHAMxnPq76Hbhkk6dz2X9.exe PID 1944 wrote to memory of 1248 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe ER9kHAMxnPq76Hbhkk6dz2X9.exe PID 1944 wrote to memory of 1248 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe ER9kHAMxnPq76Hbhkk6dz2X9.exe PID 1944 wrote to memory of 1248 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe ER9kHAMxnPq76Hbhkk6dz2X9.exe PID 1944 wrote to memory of 1248 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe ER9kHAMxnPq76Hbhkk6dz2X9.exe PID 1944 wrote to memory of 1248 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe ER9kHAMxnPq76Hbhkk6dz2X9.exe PID 1944 wrote to memory of 1780 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 06apEz8tZfTwMgGOIu7chtdH.exe PID 1944 wrote to memory of 1780 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 06apEz8tZfTwMgGOIu7chtdH.exe PID 1944 wrote to memory of 1780 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 06apEz8tZfTwMgGOIu7chtdH.exe PID 1944 wrote to memory of 1780 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 06apEz8tZfTwMgGOIu7chtdH.exe PID 1944 wrote to memory of 1780 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 06apEz8tZfTwMgGOIu7chtdH.exe PID 1944 wrote to memory of 1780 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 06apEz8tZfTwMgGOIu7chtdH.exe PID 1944 wrote to memory of 1780 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe 06apEz8tZfTwMgGOIu7chtdH.exe PID 1944 wrote to memory of 684 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe unA3TEMPb1cib1Fn3tGUxt4O.exe PID 1944 wrote to memory of 684 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe unA3TEMPb1cib1Fn3tGUxt4O.exe PID 1944 wrote to memory of 684 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe unA3TEMPb1cib1Fn3tGUxt4O.exe PID 1944 wrote to memory of 684 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe unA3TEMPb1cib1Fn3tGUxt4O.exe PID 1944 wrote to memory of 1652 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe TAJhlFofHc17MR0VUeJRErpo.exe PID 1944 wrote to memory of 1652 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe TAJhlFofHc17MR0VUeJRErpo.exe PID 1944 wrote to memory of 1652 1944 Wb7aK7C4B7M8gaofcfNSOSlc.exe TAJhlFofHc17MR0VUeJRErpo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe"C:\Users\Admin\AppData\Local\Temp\LJK5O5JHPKATxDD0Y366F_yp.exe.0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\Wb7aK7C4B7M8gaofcfNSOSlc.exe"C:\Users\Admin\Documents\Wb7aK7C4B7M8gaofcfNSOSlc.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\6VhzR4xiKB8K2R16S07cHEx4.exe"C:\Users\Admin\Pictures\Minor Policy\6VhzR4xiKB8K2R16S07cHEx4.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\G5yOTgYtlYWYd5b6wGq0pJbL.exe"C:\Users\Admin\Pictures\Minor Policy\G5yOTgYtlYWYd5b6wGq0pJbL.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exe"C:\Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\XyOAOCXk4zU7NuayLX5ocUHB.exe"C:\Users\Admin\Pictures\Minor Policy\XyOAOCXk4zU7NuayLX5ocUHB.exe"3⤵
-
C:\Users\Admin\Pictures\Minor Policy\ER9kHAMxnPq76Hbhkk6dz2X9.exe"C:\Users\Admin\Pictures\Minor Policy\ER9kHAMxnPq76Hbhkk6dz2X9.exe" /SP-/VERYSILENT /SUPPRESSMSGBOXES /INSTALLERSHOWNELSEWHERE /pid=7473⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exe"C:\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\7zS8CE5.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Minor Policy\xngnWVzD54Xrk7YRoylwqy4u.exe"C:\Users\Admin\Pictures\Minor Policy\xngnWVzD54Xrk7YRoylwqy4u.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exe"C:\Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\Mj2VKn7Ht1o_1_XH8FTdkEDD.exe"C:\Users\Admin\Pictures\Minor Policy\Mj2VKn7Ht1o_1_XH8FTdkEDD.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\unA3TEMPb1cib1Fn3tGUxt4O.exe"C:\Users\Admin\Pictures\Minor Policy\unA3TEMPb1cib1Fn3tGUxt4O.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\TAJhlFofHc17MR0VUeJRErpo.exe"C:\Users\Admin\Pictures\Minor Policy\TAJhlFofHc17MR0VUeJRErpo.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\d97AseAWdjPWBTaZgFR9hsNY.exe"C:\Users\Admin\Pictures\Minor Policy\d97AseAWdjPWBTaZgFR9hsNY.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS8CE5.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
C:\Users\Admin\AppData\Local\Temp\7zS8CE5.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
C:\Users\Admin\Documents\Wb7aK7C4B7M8gaofcfNSOSlc.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
C:\Users\Admin\Documents\Wb7aK7C4B7M8gaofcfNSOSlc.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
C:\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
C:\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
C:\Users\Admin\Pictures\Minor Policy\6VhzR4xiKB8K2R16S07cHEx4.exeFilesize
521KB
MD55fe1f92b221d98a8504139a2792265f8
SHA15faf25f3ee80a45b85f4d1fb971ab9cfd1ff174d
SHA2562fcbef2bf5b78f4e5205397a80b7f393762d78331166930b682dde2da4a16858
SHA512b40a7cb1cfd119883e3ae5126b50a73641f184daa49eddc620728a1a2c8e4b5c2e6154bad5a0b6faf053c8049144208ffe4e209611df94e995489b9257ff362d
-
C:\Users\Admin\Pictures\Minor Policy\ER9kHAMxnPq76Hbhkk6dz2X9.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
C:\Users\Admin\Pictures\Minor Policy\G5yOTgYtlYWYd5b6wGq0pJbL.exeFilesize
244KB
MD5fa1cdba375b8d6483972b852d5c30c41
SHA158225e14a1478d5d1fd056c9c9337e3aedf25607
SHA256805962cb40d644af0724e7f43036116bea8c7c44697bd0ae3ff0094b5d36562c
SHA5129434618106ea405fcb31e1798191a04247d911cb883d9ad16f55f070e50b8d6d8d669da337bc61d0e2cb3bef177309b0c06c28b90c3b6a3869a758464313eaf8
-
C:\Users\Admin\Pictures\Minor Policy\Mj2VKn7Ht1o_1_XH8FTdkEDD.exeFilesize
2.3MB
MD57949952f3f677ee2b0c983ee88129c22
SHA10c0c9678c44e69d86ab2ab4dea04e6b99c0237a9
SHA2567df0752b03c785feec29e5a4aeb6e3d492a36e0bb7577c8d18d714b7a5c18965
SHA5128f36dae477f6a1c01afdc7e0e9921120f3267393c2725827504f0156028d86820fe14f483252bb8a8d3b9116f5293623454b8e819e10e213fe55f08904adbfb1
-
C:\Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exeFilesize
4.3MB
MD523e76bc79f77178796d7d9a6b4048991
SHA1f27fc1b0979cb8c93d2de4b258ce9a25817a4645
SHA25642c5acd0133e2653a0e4f9792906d42f16cf44c6ea920dca1edaf74618feb437
SHA51258fad6a58464ee8263e4998f8fe970d046566740ac4c775af23fe96ff811139bf7da8e1fe00d25fc02b920ff64a6fea09fca28c007b24c5827a046c196d5a6d1
-
C:\Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exeFilesize
3.5MB
MD58659a680d6b2705cf899df0bd6288ae6
SHA178f2a18f624263e03e593f82faac89eb57ede380
SHA25617d633b745260b6d357ae82fd314eb13bb897fbc35750c7340d8d02e97df0f74
SHA512db642d210fef11ca73b78de8cddc82c4a7830febd4c19e4db7bb8b59bf76a5b90323dddadb2392cd456dbac42077e5a21b67fb3be4d2c1bcd01c226c8c455856
-
C:\Users\Admin\Pictures\Minor Policy\unA3TEMPb1cib1Fn3tGUxt4O.exeFilesize
469KB
MD51539cd68dd1d36dd3a7aa33bfc8fe4b0
SHA1d8b14448c04ba934fa62d647e0cded3065b08c78
SHA256212033484641d51e968cecf3f8f2b7cf275f7c69e5c159093cecb73d07ddf1f3
SHA512348f78b2250d6dc43c6e702e9920f4a878cf385821d148a0fd9529177d873ff6e19645a30f32a62882834095902de9a4426f36fd6b8700c4060211b67b2be137
-
C:\Users\Admin\Pictures\Minor Policy\unA3TEMPb1cib1Fn3tGUxt4O.exeFilesize
469KB
MD51539cd68dd1d36dd3a7aa33bfc8fe4b0
SHA1d8b14448c04ba934fa62d647e0cded3065b08c78
SHA256212033484641d51e968cecf3f8f2b7cf275f7c69e5c159093cecb73d07ddf1f3
SHA512348f78b2250d6dc43c6e702e9920f4a878cf385821d148a0fd9529177d873ff6e19645a30f32a62882834095902de9a4426f36fd6b8700c4060211b67b2be137
-
C:\Users\Admin\Pictures\Minor Policy\xngnWVzD54Xrk7YRoylwqy4u.exeFilesize
1.5MB
MD570a7253c2c54cf646aaa4cec259f53cf
SHA1914c9a5d68313d8bfdabe7048fa833ef8513f5b8
SHA256112e24beda41e0277e325131e4b994eb458d3a8d34538e73d646bace3d63bace
SHA51282dfda8ce565f7f05d88b79d68949f20ab6c38b27e303d36b697a176b134d166c1ce9cd15f1c062b7e18784a50fec10798743d51682442ae924bb51192ec10a4
-
\Users\Admin\AppData\Local\Temp\7zS8CE5.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
\Users\Admin\AppData\Local\Temp\7zS8CE5.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
\Users\Admin\AppData\Local\Temp\7zS8CE5.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
\Users\Admin\AppData\Local\Temp\7zS8CE5.tmp\Install.exeFilesize
6.3MB
MD582de119ebb20f158aced3e6adb06f5dc
SHA1af33ba359ecd998d5d8d945d6baf7643ddd27815
SHA2560b923269305bd0d0d83768a1de0705d823716cc3c6fa7c16bb4da4a5b50b1b07
SHA5125b51f2f7a0f3a24b210289d98f1586ecfe619bc2264fe58462aa2c46f9c9116e811b1088f2fc02d3273c5ee5e97faecbeba0180daf23549bf840188cb543a2f7
-
\Users\Admin\Documents\Wb7aK7C4B7M8gaofcfNSOSlc.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
\Users\Admin\Pictures\Minor Policy\06apEz8tZfTwMgGOIu7chtdH.exeFilesize
7.3MB
MD55af7ec5fe91265054817fb4e447baba1
SHA1986883b0eb4c41ec0a1e069cb0494b9abb0faf91
SHA2568cc43c2127add415d2f2ab6f53e4a14417c51a180acf9312c4ab0531aa15a592
SHA51227eb4d51d994a68bff4597cfcef8934bc495ff18d1bb368c7b05ee3b96781e6bf0e0f49b121f97c37fd5581f9cf4aa5fa0ae044805886abbbb3a477993e1dad4
-
\Users\Admin\Pictures\Minor Policy\6VhzR4xiKB8K2R16S07cHEx4.exeFilesize
521KB
MD55fe1f92b221d98a8504139a2792265f8
SHA15faf25f3ee80a45b85f4d1fb971ab9cfd1ff174d
SHA2562fcbef2bf5b78f4e5205397a80b7f393762d78331166930b682dde2da4a16858
SHA512b40a7cb1cfd119883e3ae5126b50a73641f184daa49eddc620728a1a2c8e4b5c2e6154bad5a0b6faf053c8049144208ffe4e209611df94e995489b9257ff362d
-
\Users\Admin\Pictures\Minor Policy\ER9kHAMxnPq76Hbhkk6dz2X9.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
\Users\Admin\Pictures\Minor Policy\G5yOTgYtlYWYd5b6wGq0pJbL.exeFilesize
244KB
MD5fa1cdba375b8d6483972b852d5c30c41
SHA158225e14a1478d5d1fd056c9c9337e3aedf25607
SHA256805962cb40d644af0724e7f43036116bea8c7c44697bd0ae3ff0094b5d36562c
SHA5129434618106ea405fcb31e1798191a04247d911cb883d9ad16f55f070e50b8d6d8d669da337bc61d0e2cb3bef177309b0c06c28b90c3b6a3869a758464313eaf8
-
\Users\Admin\Pictures\Minor Policy\G5yOTgYtlYWYd5b6wGq0pJbL.exeFilesize
244KB
MD5fa1cdba375b8d6483972b852d5c30c41
SHA158225e14a1478d5d1fd056c9c9337e3aedf25607
SHA256805962cb40d644af0724e7f43036116bea8c7c44697bd0ae3ff0094b5d36562c
SHA5129434618106ea405fcb31e1798191a04247d911cb883d9ad16f55f070e50b8d6d8d669da337bc61d0e2cb3bef177309b0c06c28b90c3b6a3869a758464313eaf8
-
\Users\Admin\Pictures\Minor Policy\Mj2VKn7Ht1o_1_XH8FTdkEDD.exeFilesize
2.3MB
MD57949952f3f677ee2b0c983ee88129c22
SHA10c0c9678c44e69d86ab2ab4dea04e6b99c0237a9
SHA2567df0752b03c785feec29e5a4aeb6e3d492a36e0bb7577c8d18d714b7a5c18965
SHA5128f36dae477f6a1c01afdc7e0e9921120f3267393c2725827504f0156028d86820fe14f483252bb8a8d3b9116f5293623454b8e819e10e213fe55f08904adbfb1
-
\Users\Admin\Pictures\Minor Policy\TAJhlFofHc17MR0VUeJRErpo.exeFilesize
104KB
MD585270630c529e1480e3b1df60a00e020
SHA193867a17a40b5886a11018368df44e8cebe0ff86
SHA256b369c9f34e7351fc2616f2f951ea429da6e635df522710e915c14a6b78429503
SHA512a47b86b4e059ac7be8c5d42d0a15a27a479c78c1e65181fe84bb46dd689c9307bcc7d88028fac388713802efe3502a8af3f3d321a2c776b4970537c65c647be3
-
\Users\Admin\Pictures\Minor Policy\XyOAOCXk4zU7NuayLX5ocUHB.exeFilesize
354KB
MD5abab29d520104b7edd956939380a50a8
SHA130c35697246ac160da07cc33731682c0c531fe92
SHA2562dae85199cef5a4596e5bb6372a14c8dcd66f2fdbd7c02a1756736a660222e36
SHA51249be3a5e3fb31f9df4f07296ada4696d82b09021657b61e6aaa4aa0913b035f396c7e082298b2ec72b22a94c310d0ad195bb257599361b4c5729499b4f5a9487
-
\Users\Admin\Pictures\Minor Policy\XyOAOCXk4zU7NuayLX5ocUHB.exeFilesize
354KB
MD5abab29d520104b7edd956939380a50a8
SHA130c35697246ac160da07cc33731682c0c531fe92
SHA2562dae85199cef5a4596e5bb6372a14c8dcd66f2fdbd7c02a1756736a660222e36
SHA51249be3a5e3fb31f9df4f07296ada4696d82b09021657b61e6aaa4aa0913b035f396c7e082298b2ec72b22a94c310d0ad195bb257599361b4c5729499b4f5a9487
-
\Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exeFilesize
4.3MB
MD523e76bc79f77178796d7d9a6b4048991
SHA1f27fc1b0979cb8c93d2de4b258ce9a25817a4645
SHA25642c5acd0133e2653a0e4f9792906d42f16cf44c6ea920dca1edaf74618feb437
SHA51258fad6a58464ee8263e4998f8fe970d046566740ac4c775af23fe96ff811139bf7da8e1fe00d25fc02b920ff64a6fea09fca28c007b24c5827a046c196d5a6d1
-
\Users\Admin\Pictures\Minor Policy\bene4kQUESOH6KlgX0upJFWw.exeFilesize
4.3MB
MD523e76bc79f77178796d7d9a6b4048991
SHA1f27fc1b0979cb8c93d2de4b258ce9a25817a4645
SHA25642c5acd0133e2653a0e4f9792906d42f16cf44c6ea920dca1edaf74618feb437
SHA51258fad6a58464ee8263e4998f8fe970d046566740ac4c775af23fe96ff811139bf7da8e1fe00d25fc02b920ff64a6fea09fca28c007b24c5827a046c196d5a6d1
-
\Users\Admin\Pictures\Minor Policy\d97AseAWdjPWBTaZgFR9hsNY.exeFilesize
603KB
MD5cb90f4dd9eb3424268b20a1581668acd
SHA1136a226e0f56c7bf53822ab116ea4304b8a636e6
SHA25649d6552ae5c5027ce1e68edee2438564b50ddc384276fd97360c92503771d3ac
SHA51243ef96a52dfe7018d7fd9315c428fb1b368e92357585f57bd405260d5e5d9f498e423d0a3d5de1ef300983f3f7b42bd7a2f2217ca5d74b88c4533021086c19a4
-
\Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exeFilesize
3.5MB
MD58659a680d6b2705cf899df0bd6288ae6
SHA178f2a18f624263e03e593f82faac89eb57ede380
SHA25617d633b745260b6d357ae82fd314eb13bb897fbc35750c7340d8d02e97df0f74
SHA512db642d210fef11ca73b78de8cddc82c4a7830febd4c19e4db7bb8b59bf76a5b90323dddadb2392cd456dbac42077e5a21b67fb3be4d2c1bcd01c226c8c455856
-
\Users\Admin\Pictures\Minor Policy\toEkCgCGLBSvK5X_vkeYfEVG.exeFilesize
3.5MB
MD58659a680d6b2705cf899df0bd6288ae6
SHA178f2a18f624263e03e593f82faac89eb57ede380
SHA25617d633b745260b6d357ae82fd314eb13bb897fbc35750c7340d8d02e97df0f74
SHA512db642d210fef11ca73b78de8cddc82c4a7830febd4c19e4db7bb8b59bf76a5b90323dddadb2392cd456dbac42077e5a21b67fb3be4d2c1bcd01c226c8c455856
-
\Users\Admin\Pictures\Minor Policy\unA3TEMPb1cib1Fn3tGUxt4O.exeFilesize
469KB
MD51539cd68dd1d36dd3a7aa33bfc8fe4b0
SHA1d8b14448c04ba934fa62d647e0cded3065b08c78
SHA256212033484641d51e968cecf3f8f2b7cf275f7c69e5c159093cecb73d07ddf1f3
SHA512348f78b2250d6dc43c6e702e9920f4a878cf385821d148a0fd9529177d873ff6e19645a30f32a62882834095902de9a4426f36fd6b8700c4060211b67b2be137
-
\Users\Admin\Pictures\Minor Policy\unA3TEMPb1cib1Fn3tGUxt4O.exeFilesize
469KB
MD51539cd68dd1d36dd3a7aa33bfc8fe4b0
SHA1d8b14448c04ba934fa62d647e0cded3065b08c78
SHA256212033484641d51e968cecf3f8f2b7cf275f7c69e5c159093cecb73d07ddf1f3
SHA512348f78b2250d6dc43c6e702e9920f4a878cf385821d148a0fd9529177d873ff6e19645a30f32a62882834095902de9a4426f36fd6b8700c4060211b67b2be137
-
\Users\Admin\Pictures\Minor Policy\xngnWVzD54Xrk7YRoylwqy4u.exeFilesize
1.5MB
MD570a7253c2c54cf646aaa4cec259f53cf
SHA1914c9a5d68313d8bfdabe7048fa833ef8513f5b8
SHA256112e24beda41e0277e325131e4b994eb458d3a8d34538e73d646bace3d63bace
SHA51282dfda8ce565f7f05d88b79d68949f20ab6c38b27e303d36b697a176b134d166c1ce9cd15f1c062b7e18784a50fec10798743d51682442ae924bb51192ec10a4
-
memory/612-100-0x0000000000000000-mapping.dmp
-
memory/624-105-0x0000000000000000-mapping.dmp
-
memory/684-118-0x0000000000000000-mapping.dmp
-
memory/684-133-0x0000000000E30000-0x0000000000EAC000-memory.dmpFilesize
496KB
-
memory/876-103-0x0000000000000000-mapping.dmp
-
memory/1048-73-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-54-0x0000000076171000-0x0000000076173000-memory.dmpFilesize
8KB
-
memory/1048-63-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-60-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-58-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-57-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-55-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-62-0x0000000077BE0000-0x0000000077D60000-memory.dmpFilesize
1.5MB
-
memory/1048-61-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-59-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1048-76-0x0000000077BE0000-0x0000000077D60000-memory.dmpFilesize
1.5MB
-
memory/1248-106-0x0000000000000000-mapping.dmp
-
memory/1344-104-0x0000000000000000-mapping.dmp
-
memory/1604-72-0x0000000000000000-mapping.dmp
-
memory/1616-87-0x0000000000000000-mapping.dmp
-
memory/1652-123-0x0000000000000000-mapping.dmp
-
memory/1692-129-0x0000000000000000-mapping.dmp
-
memory/1704-98-0x0000000000000000-mapping.dmp
-
memory/1780-107-0x0000000000000000-mapping.dmp
-
memory/1784-88-0x0000000000000000-mapping.dmp
-
memory/1844-68-0x0000000000000000-mapping.dmp
-
memory/1944-110-0x000000000A6A0000-0x000000000B4DD000-memory.dmpFilesize
14.2MB
-
memory/1944-65-0x0000000000000000-mapping.dmp
-
memory/1944-69-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-71-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-74-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-75-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-77-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-79-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-81-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-82-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/1944-83-0x0000000077BE0000-0x0000000077D60000-memory.dmpFilesize
1.5MB
-
memory/1944-134-0x00000000066B0000-0x00000000074ED000-memory.dmpFilesize
14.2MB
-
memory/1968-138-0x0000000000000000-mapping.dmp