Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/12/2022, 10:44

221210-mta25sab8x 10

09/12/2022, 20:12

221209-yza5waha7v 10

04/12/2022, 13:12

221204-qfsa2sbh74 10

01/12/2022, 14:04

221201-rda5esef46 10

30/11/2022, 14:19

221130-rms2lagf28 10

29/11/2022, 15:31

221129-syd79afa3z 10

29/11/2022, 09:15

221129-k73m7shf6s 10

29/11/2022, 09:08

221129-k31caahc7x 10

Analysis

  • max time kernel
    645s
  • max time network
    501s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/12/2022, 20:12

Errors

Reason
Machine shutdown

General

  • Target

    ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe

  • Size

    146KB

  • MD5

    2c6e6e290972fcd5e556efccfd51f174

  • SHA1

    ec3de0785e4ccd0282e92e35c915ddb72832fd83

  • SHA256

    ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e

  • SHA512

    a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f

  • SSDEEP

    1536:KQsw8LQ+Z9DjjSD60zzeE2G95Vz6B6yRTj9AU44YxSs2gdIuV8Vm3PkO0v0RDQBK:KjiSd/LHG9516B6cv44WdX80/VDmGp

Malware Config

Extracted

Family

djvu

C2

http://abibiall.com/lancer/get.php

Attributes
  • extension

    .mbtf

  • offline_id

    d1BN9KEra4Hetg5GUH0nQZqy14sntD2NbihzGQt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://abibiall.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-8aIWIsUQt9 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0613Jhyjd

rsa_pubkey.plain

Extracted

Family

vidar

Version

56.1

Botnet

517

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    517

Extracted

Family

raccoon

Botnet

ec7a54fb6492ff3a52d09504b8ecf082

C2

http://88.119.161.188

http://88.119.161.19

rc4.plain

Signatures

  • DcRat 4 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 1 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe
    "C:\Users\Admin\AppData\Local\Temp\ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1508
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:984
  • C:\Users\Admin\AppData\Local\Temp\B3B.exe
    C:\Users\Admin\AppData\Local\Temp\B3B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    PID:340
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      C:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe
      2⤵
      • Loads dropped DLL
      PID:4540
  • C:\Users\Admin\AppData\Local\Temp\E97.exe
    C:\Users\Admin\AppData\Local\Temp\E97.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\E97.exe
      C:\Users\Admin\AppData\Local\Temp\E97.exe
      2⤵
      • DcRat
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\065ff3c5-c26b-4e58-ac5f-a98954465532" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:3848
      • C:\Users\Admin\AppData\Local\Temp\E97.exe
        "C:\Users\Admin\AppData\Local\Temp\E97.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\Users\Admin\AppData\Local\Temp\E97.exe
          "C:\Users\Admin\AppData\Local\Temp\E97.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3204
          • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe
            "C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe
              "C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe"
              6⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:1160
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe" & exit
                7⤵
                  PID:4152
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    8⤵
                    • Delays execution with timeout.exe
                    PID:3936
            • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build3.exe
              "C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build3.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2284
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                6⤵
                • DcRat
                • Creates scheduled task(s)
                PID:4120
    • C:\Users\Admin\AppData\Local\Temp\10FA.exe
      C:\Users\Admin\AppData\Local\Temp\10FA.exe
      1⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      PID:4336
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:3380
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:3888
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        1⤵
        • Executes dropped EXE
        PID:1964
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
          2⤵
          • DcRat
          • Creates scheduled task(s)
          PID:5016
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:2836
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          PID:4376
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            2⤵
              PID:2268
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              2⤵
                PID:3180
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:1728
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
              • Enumerates system info in registry
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:648
            • C:\Users\Admin\AppData\Roaming\cwtuivu
              C:\Users\Admin\AppData\Roaming\cwtuivu
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: MapViewOfSection
              PID:2836

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\mozglue.dll

              Filesize

              133KB

              MD5

              8f73c08a9660691143661bf7332c3c27

              SHA1

              37fa65dd737c50fda710fdbde89e51374d0c204a

              SHA256

              3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

              SHA512

              0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

            • C:\ProgramData\nss3.dll

              Filesize

              1.2MB

              MD5

              bfac4e3c5908856ba17d41edcd455a51

              SHA1

              8eec7e888767aa9e4cca8ff246eb2aacb9170428

              SHA256

              e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

              SHA512

              2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

              Filesize

              2KB

              MD5

              2e8dab0111c5f3e9103cae92a9e1cdaa

              SHA1

              5d16362cf320faeacf5963532354e99e0dce3e2b

              SHA256

              858dfc9a9af2e0400a91bf3660acb1a123960c5ad53df61b7f73663035e01ba8

              SHA512

              ee28bf368690e56ada1fc8538330cc22cb57a59a1a5012e73d3e0300dc7410b82f8c2a300625560e69bc19344acc333b2138ec49ca5ddf5f24a54debce685abb

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

              Filesize

              1KB

              MD5

              822afa251dfb23c10566bc3267b07676

              SHA1

              803818f023438a8d9ad17702d841a3a9f0380ff7

              SHA256

              97c5e1b03a6775231978d8990fadd81733e7c7b0cde5795b9d7813c5f99f823a

              SHA512

              7fb782125d7e498b9dfcb5f92df01e61a74636e31cc6f593d3778ef4cb47166c7c1b87400ef44baed5aed476f128cfc1fef25eae2c00c20f7f5dfe0f38445aa1

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

              Filesize

              488B

              MD5

              ac82fc0e194b43a28f49945a18a350e2

              SHA1

              f05b17ff8e4940a2a8befa12b4d1debfaa0ab0a2

              SHA256

              feb5d600acf6088350e3913ec6835e9d7f80a64a64c9faf6f33c2c79bb0824af

              SHA512

              80b78fcd56f20420998e9adef94183fc63af1a5c6804824394d17816480f8263dd5bc994ecdb3f0f59a370ad3ffba8324043087f55e11192f3505020ccba1049

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

              Filesize

              482B

              MD5

              ba0693d19e65f9b4291c15222a95c0cd

              SHA1

              8377d32ccde8f5a7493b021b28d640fedbe6c381

              SHA256

              25edef13f5152d076b32c9c584938056afaeb54efe02a747d4dcd327c823d96d

              SHA512

              d5d060bcc7d9a3f0d65023b9eea0866abbbb702774786c6002e8b039bfa14a881df0c16d1c2bc2518efc27afcb2993dc07b652e8521e939dc3fc4c16aec8db6c

            • C:\Users\Admin\AppData\LocalLow\mozglue.dll

              Filesize

              612KB

              MD5

              f07d9977430e762b563eaadc2b94bbfa

              SHA1

              da0a05b2b8d269fb73558dfcf0ed5c167f6d3877

              SHA256

              4191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862

              SHA512

              6afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf

            • C:\Users\Admin\AppData\LocalLow\nss3.dll

              Filesize

              1.9MB

              MD5

              f67d08e8c02574cbc2f1122c53bfb976

              SHA1

              6522992957e7e4d074947cad63189f308a80fcf2

              SHA256

              c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e

              SHA512

              2e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5

            • C:\Users\Admin\AppData\LocalLow\sqlite3.dll

              Filesize

              1.0MB

              MD5

              dbf4f8dcefb8056dc6bae4b67ff810ce

              SHA1

              bbac1dd8a07c6069415c04b62747d794736d0689

              SHA256

              47b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68

              SHA512

              b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1

            • C:\Users\Admin\AppData\Local\065ff3c5-c26b-4e58-ac5f-a98954465532\E97.exe

              Filesize

              882KB

              MD5

              df1e93d78f99925e125d40ec5bd51deb

              SHA1

              e0c031c20df4efe2c5290981db5049f94739e72e

              SHA256

              3b78984fbdcef6ce5ddc24c221d0a71f0a281950c15ddce18edae93c190a04d5

              SHA512

              58a345a4515dcbc0a74091d5161c75c6e01d0d57cdcdf5a2e17b4542d1b12cd1f95e9040824d0f7be74d5b62641c515417dc5c9eabd1e8629caaec5a7dac9938

            • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe

              Filesize

              471KB

              MD5

              f56c8317f668ed043779b95bef8c849e

              SHA1

              894425839f074075f1179023547a6496ea6f2f70

              SHA256

              11b46637f618cfe5000dea3ebb0d2e0bc5bde585815b670a43f1e9259e4f9941

              SHA512

              a593e03621e5620aee91f998d27474e06cf3ea1c04b63e9c693054af5c205b75ece3f3b55b766c11c7c69767eaaacd7ec27de3b69decc066f0a301fabf759287

            • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe

              Filesize

              471KB

              MD5

              f56c8317f668ed043779b95bef8c849e

              SHA1

              894425839f074075f1179023547a6496ea6f2f70

              SHA256

              11b46637f618cfe5000dea3ebb0d2e0bc5bde585815b670a43f1e9259e4f9941

              SHA512

              a593e03621e5620aee91f998d27474e06cf3ea1c04b63e9c693054af5c205b75ece3f3b55b766c11c7c69767eaaacd7ec27de3b69decc066f0a301fabf759287

            • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build2.exe

              Filesize

              471KB

              MD5

              f56c8317f668ed043779b95bef8c849e

              SHA1

              894425839f074075f1179023547a6496ea6f2f70

              SHA256

              11b46637f618cfe5000dea3ebb0d2e0bc5bde585815b670a43f1e9259e4f9941

              SHA512

              a593e03621e5620aee91f998d27474e06cf3ea1c04b63e9c693054af5c205b75ece3f3b55b766c11c7c69767eaaacd7ec27de3b69decc066f0a301fabf759287

            • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build3.exe

              Filesize

              9KB

              MD5

              9ead10c08e72ae41921191f8db39bc16

              SHA1

              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

              SHA256

              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

              SHA512

              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

            • C:\Users\Admin\AppData\Local\68b2faa9-0ea7-4b83-bf43-e4b077e6fc74\build3.exe

              Filesize

              9KB

              MD5

              9ead10c08e72ae41921191f8db39bc16

              SHA1

              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

              SHA256

              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

              SHA512

              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

            • C:\Users\Admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat

              Filesize

              1016B

              MD5

              0e4048ae343932ec4deecd5c28d41120

              SHA1

              d8cba17ad7c4a6c0b69b6e45291bdf64d83fa724

              SHA256

              d12b37982d443bb314d593362d052eba684b200eca1454a7d149d357efe27970

              SHA512

              bd7e2eaf99267bea7be01b6c3cac74e5a0c8337fcf0215c62cea4192f9b6bc0ede3a733d282750693b0c3c7cbb96b63614e12ad5928ceda17fe9c064dec411c9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

              Filesize

              28KB

              MD5

              70e651bd958573c7978db082d64d93d2

              SHA1

              414ebca07614d0eab2968bfa33e8a5eeabe5d26f

              SHA256

              9625a8280d6e6b7ac227a65624624cd64bd73e4d19e2d524dc76f1d07311818e

              SHA512

              d343c543a09731ef0f7f702681085baed6775741a24b463665fc88b0f3493ba1e5eb40b754aef5461044c1eb66baf8f3e15cfc52b73fde783d7152c15c0cb50b

            • C:\Users\Admin\AppData\Local\Temp\10FA.exe

              Filesize

              685KB

              MD5

              5664185ebf12dd80c3d5712c545d9313

              SHA1

              7c78fdd7383a82a9f708414f798f7f05bfc8ae3c

              SHA256

              113e50b023c0851e015f6823cf953008be517c6af86612277a48b6527415cdab

              SHA512

              fe0e0c75fe002d418294f38c4b84d174a52c706043a5c71d3fcde5c0b778276e9fb784177e59313de1eccfa00bb477854902f4e9182a2b68bd8909612b8bbf71

            • C:\Users\Admin\AppData\Local\Temp\10FA.exe

              Filesize

              685KB

              MD5

              5664185ebf12dd80c3d5712c545d9313

              SHA1

              7c78fdd7383a82a9f708414f798f7f05bfc8ae3c

              SHA256

              113e50b023c0851e015f6823cf953008be517c6af86612277a48b6527415cdab

              SHA512

              fe0e0c75fe002d418294f38c4b84d174a52c706043a5c71d3fcde5c0b778276e9fb784177e59313de1eccfa00bb477854902f4e9182a2b68bd8909612b8bbf71

            • C:\Users\Admin\AppData\Local\Temp\B3B.exe

              Filesize

              1.7MB

              MD5

              43f1779b95dbac7b5cef6f36f03da6cc

              SHA1

              2476a17689c8f294c660946c3dcfecef05fb671e

              SHA256

              5c3c6078bd4e30e24a9177d413fd56267a8dd7e656b3187bc37a02e233a55f22

              SHA512

              2c4852e10311d767239ab9609df465e6fab3b47d0af9921c4a6577b7f183e734f629d76339a9a8ed285bb16cea0240671f8fcaf6c02a68a84bb0981565d0541c

            • C:\Users\Admin\AppData\Local\Temp\B3B.exe

              Filesize

              1.7MB

              MD5

              43f1779b95dbac7b5cef6f36f03da6cc

              SHA1

              2476a17689c8f294c660946c3dcfecef05fb671e

              SHA256

              5c3c6078bd4e30e24a9177d413fd56267a8dd7e656b3187bc37a02e233a55f22

              SHA512

              2c4852e10311d767239ab9609df465e6fab3b47d0af9921c4a6577b7f183e734f629d76339a9a8ed285bb16cea0240671f8fcaf6c02a68a84bb0981565d0541c

            • C:\Users\Admin\AppData\Local\Temp\E97.exe

              Filesize

              882KB

              MD5

              df1e93d78f99925e125d40ec5bd51deb

              SHA1

              e0c031c20df4efe2c5290981db5049f94739e72e

              SHA256

              3b78984fbdcef6ce5ddc24c221d0a71f0a281950c15ddce18edae93c190a04d5

              SHA512

              58a345a4515dcbc0a74091d5161c75c6e01d0d57cdcdf5a2e17b4542d1b12cd1f95e9040824d0f7be74d5b62641c515417dc5c9eabd1e8629caaec5a7dac9938

            • C:\Users\Admin\AppData\Local\Temp\E97.exe

              Filesize

              882KB

              MD5

              df1e93d78f99925e125d40ec5bd51deb

              SHA1

              e0c031c20df4efe2c5290981db5049f94739e72e

              SHA256

              3b78984fbdcef6ce5ddc24c221d0a71f0a281950c15ddce18edae93c190a04d5

              SHA512

              58a345a4515dcbc0a74091d5161c75c6e01d0d57cdcdf5a2e17b4542d1b12cd1f95e9040824d0f7be74d5b62641c515417dc5c9eabd1e8629caaec5a7dac9938

            • C:\Users\Admin\AppData\Local\Temp\E97.exe

              Filesize

              882KB

              MD5

              df1e93d78f99925e125d40ec5bd51deb

              SHA1

              e0c031c20df4efe2c5290981db5049f94739e72e

              SHA256

              3b78984fbdcef6ce5ddc24c221d0a71f0a281950c15ddce18edae93c190a04d5

              SHA512

              58a345a4515dcbc0a74091d5161c75c6e01d0d57cdcdf5a2e17b4542d1b12cd1f95e9040824d0f7be74d5b62641c515417dc5c9eabd1e8629caaec5a7dac9938

            • C:\Users\Admin\AppData\Local\Temp\E97.exe

              Filesize

              882KB

              MD5

              df1e93d78f99925e125d40ec5bd51deb

              SHA1

              e0c031c20df4efe2c5290981db5049f94739e72e

              SHA256

              3b78984fbdcef6ce5ddc24c221d0a71f0a281950c15ddce18edae93c190a04d5

              SHA512

              58a345a4515dcbc0a74091d5161c75c6e01d0d57cdcdf5a2e17b4542d1b12cd1f95e9040824d0f7be74d5b62641c515417dc5c9eabd1e8629caaec5a7dac9938

            • C:\Users\Admin\AppData\Local\Temp\E97.exe

              Filesize

              882KB

              MD5

              df1e93d78f99925e125d40ec5bd51deb

              SHA1

              e0c031c20df4efe2c5290981db5049f94739e72e

              SHA256

              3b78984fbdcef6ce5ddc24c221d0a71f0a281950c15ddce18edae93c190a04d5

              SHA512

              58a345a4515dcbc0a74091d5161c75c6e01d0d57cdcdf5a2e17b4542d1b12cd1f95e9040824d0f7be74d5b62641c515417dc5c9eabd1e8629caaec5a7dac9938

            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

              Filesize

              9KB

              MD5

              9ead10c08e72ae41921191f8db39bc16

              SHA1

              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

              SHA256

              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

              SHA512

              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

              Filesize

              9KB

              MD5

              9ead10c08e72ae41921191f8db39bc16

              SHA1

              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

              SHA256

              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

              SHA512

              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

            • C:\Users\Admin\AppData\Roaming\cwtuivu

              Filesize

              146KB

              MD5

              2c6e6e290972fcd5e556efccfd51f174

              SHA1

              ec3de0785e4ccd0282e92e35c915ddb72832fd83

              SHA256

              ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e

              SHA512

              a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f

            • C:\Users\Admin\AppData\Roaming\cwtuivu

              Filesize

              146KB

              MD5

              2c6e6e290972fcd5e556efccfd51f174

              SHA1

              ec3de0785e4ccd0282e92e35c915ddb72832fd83

              SHA256

              ee1d1018f825ffa2d507f0d58a3a2c9d14a2b4a9c351e7d3fa05d29063488b9e

              SHA512

              a7077bf87ad233413322dd55d4c1ed684d5ebd70e9451307d9f70ba1888688fa5b375a6006803da9e9cc800be7bc928230ad26a889e88c907854a8bc73ad539f

            • C:\Users\Admin\AppData\Roaming\eirtwhf

              Filesize

              243KB

              MD5

              69a5c4fa0808db82bbc10a0ae4d6aa0b

              SHA1

              bb7bc62523569af53ee950b8616c21175a8326d5

              SHA256

              2c8db3209a6c4588d898b74df715581ec9bfb99b57b55ac8c8f710e8fa2d370c

              SHA512

              0d20d2b3cd4776e80ac71c896a57d7f836bcc7abbb8515b2c0c19239f57f2ac8d0d01e6ee66db84544260d1315b91cf95a11e8cc2f2663202e7f63c0896e037d

            • memory/340-146-0x0000000000CE0000-0x0000000000EA4000-memory.dmp

              Filesize

              1.8MB

            • memory/340-151-0x0000000005BE0000-0x0000000005C72000-memory.dmp

              Filesize

              584KB

            • memory/648-261-0x0000021451700000-0x0000021451704000-memory.dmp

              Filesize

              16KB

            • memory/648-280-0x0000021451724000-0x0000021451727000-memory.dmp

              Filesize

              12KB

            • memory/648-255-0x00000214516FC000-0x00000214516FF000-memory.dmp

              Filesize

              12KB

            • memory/648-253-0x00000214516FC000-0x00000214516FF000-memory.dmp

              Filesize

              12KB

            • memory/648-256-0x00000214516FC000-0x00000214516FF000-memory.dmp

              Filesize

              12KB

            • memory/648-248-0x0000021450D40000-0x0000021450D60000-memory.dmp

              Filesize

              128KB

            • memory/648-258-0x0000021451700000-0x0000021451704000-memory.dmp

              Filesize

              16KB

            • memory/648-276-0x0000021451720000-0x0000021451724000-memory.dmp

              Filesize

              16KB

            • memory/648-259-0x0000021451700000-0x0000021451704000-memory.dmp

              Filesize

              16KB

            • memory/648-260-0x0000021451700000-0x0000021451704000-memory.dmp

              Filesize

              16KB

            • memory/648-279-0x0000021451724000-0x0000021451727000-memory.dmp

              Filesize

              12KB

            • memory/648-254-0x00000214516FC000-0x00000214516FF000-memory.dmp

              Filesize

              12KB

            • memory/648-262-0x0000021451700000-0x0000021451704000-memory.dmp

              Filesize

              16KB

            • memory/648-275-0x0000021451720000-0x0000021451724000-memory.dmp

              Filesize

              16KB

            • memory/648-274-0x0000021451720000-0x0000021451724000-memory.dmp

              Filesize

              16KB

            • memory/648-264-0x000002144FB00000-0x000002144FC00000-memory.dmp

              Filesize

              1024KB

            • memory/648-281-0x0000021451724000-0x0000021451727000-memory.dmp

              Filesize

              12KB

            • memory/648-265-0x0000021451038000-0x0000021451040000-memory.dmp

              Filesize

              32KB

            • memory/648-266-0x0000021450D80000-0x0000021450DA0000-memory.dmp

              Filesize

              128KB

            • memory/648-268-0x00000214516F0000-0x00000214516F3000-memory.dmp

              Filesize

              12KB

            • memory/648-273-0x0000021451720000-0x0000021451724000-memory.dmp

              Filesize

              16KB

            • memory/648-269-0x00000214516F0000-0x00000214516F3000-memory.dmp

              Filesize

              12KB

            • memory/648-270-0x00000214516F0000-0x00000214516F3000-memory.dmp

              Filesize

              12KB

            • memory/1160-197-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/1160-225-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/1160-202-0x0000000060900000-0x0000000060992000-memory.dmp

              Filesize

              584KB

            • memory/1160-201-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/1160-198-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/1160-195-0x0000000000400000-0x000000000045F000-memory.dmp

              Filesize

              380KB

            • memory/1508-138-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1508-135-0x000000000068D000-0x000000000069D000-memory.dmp

              Filesize

              64KB

            • memory/1508-137-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/1508-136-0x00000000005F0000-0x00000000005F9000-memory.dmp

              Filesize

              36KB

            • memory/2268-290-0x0000000000F30000-0x0000000000F9B000-memory.dmp

              Filesize

              428KB

            • memory/2672-200-0x0000000000550000-0x000000000059B000-memory.dmp

              Filesize

              300KB

            • memory/2672-199-0x0000000000782000-0x00000000007AE000-memory.dmp

              Filesize

              176KB

            • memory/2836-286-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/2836-287-0x0000000000400000-0x0000000000459000-memory.dmp

              Filesize

              356KB

            • memory/2836-285-0x00000000006DD000-0x00000000006EE000-memory.dmp

              Filesize

              68KB

            • memory/3092-165-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3092-173-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3092-162-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3092-158-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3092-160-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3180-292-0x00000000008F0000-0x00000000008FC000-memory.dmp

              Filesize

              48KB

            • memory/3204-223-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3204-179-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3204-177-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3204-184-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/3380-156-0x0000000001200000-0x000000000126B000-memory.dmp

              Filesize

              428KB

            • memory/3380-154-0x0000000001270000-0x00000000012E5000-memory.dmp

              Filesize

              468KB

            • memory/3380-155-0x0000000001200000-0x000000000126B000-memory.dmp

              Filesize

              428KB

            • memory/3588-163-0x0000000002240000-0x000000000235B000-memory.dmp

              Filesize

              1.1MB

            • memory/3588-161-0x0000000000907000-0x0000000000999000-memory.dmp

              Filesize

              584KB

            • memory/3888-153-0x00000000004E0000-0x00000000004EC000-memory.dmp

              Filesize

              48KB

            • memory/4336-167-0x00000000005B1000-0x0000000000612000-memory.dmp

              Filesize

              388KB

            • memory/4336-186-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/4336-169-0x0000000002000000-0x000000000206B000-memory.dmp

              Filesize

              428KB

            • memory/4336-170-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/4336-168-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/4336-185-0x00000000005B1000-0x0000000000612000-memory.dmp

              Filesize

              388KB

            • memory/4540-235-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/4540-231-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/4540-230-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/4540-228-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/4684-178-0x000000000083D000-0x00000000008CF000-memory.dmp

              Filesize

              584KB