Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2022 17:01

General

  • Target

    file.exe

  • Size

    225KB

  • MD5

    6a59c469713da7bb9abc4b8f2e8ac6da

  • SHA1

    e87a23b50b3f3a41c50d62e558153d3a3010a02b

  • SHA256

    3d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d

  • SHA512

    16e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65

  • SSDEEP

    3072:Lz08R/4F+88pD4EkNimqFDF6D2lhPBhQuzpw1H4Oc/1dcK4sRPID6bM0mQt0:x4QRnkgZFDFNPouzpw1H4O9NDCP0

Malware Config

Extracted

Family

amadey

Version

3.60

C2

193.42.33.28/game0ver/index.php

Extracted

Family

remcos

Botnet

12-22-22

C2

194.180.48.225:1024

Attributes
  • audio_folder

    iujhgv

  • audio_path

    %Temp%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    lkjhg.exe

  • copy_folder

    sdfghjk

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    oijkhb.dat

  • keylog_flag

    false

  • keylog_folder

    hgfds

  • keylog_path

    %WinDir%

  • mouse_option

    false

  • mutex

    yuhgfd-9Z85LD

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    lkjhg

  • screenshot_path

    %AppData%

  • screenshot_time

    5

  • startup_value

    ijhgf

  • take_screenshot_option

    true

  • take_screenshot_time

    5

  • take_screenshot_title

    bank

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect rhadamanthys stealer shellcode 1 IoCs
  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • UAC bypass 3 TTPs 3 IoCs
  • Chinese Botnet payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 17 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe
      "C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN WinComService.exe /TR "C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:956
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "WinComService.exe" /P "Admin:N"&&CACLS "WinComService.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a4e2bd6d47" /P "Admin:N"&&CACLS "..\a4e2bd6d47" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:844
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1088
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "WinComService.exe" /P "Admin:N"
            4⤵
              PID:544
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "WinComService.exe" /P "Admin:R" /E
              4⤵
                PID:1884
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:840
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\a4e2bd6d47" /P "Admin:N"
                  4⤵
                    PID:1588
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\a4e2bd6d47" /P "Admin:R" /E
                    4⤵
                      PID:1688
                  • C:\Users\Admin\AppData\Roaming\1000034050\system32.exe
                    "C:\Users\Admin\AppData\Roaming\1000034050\system32.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:1436
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c md C:\windowss64
                      4⤵
                        PID:1256
                      • C:\windowss64\computer.exe
                        "C:\windowss64\computer.exe"
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Adds Run key to start application
                        PID:1968
                        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
                          "C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"
                          5⤵
                          • Executes dropped EXE
                          PID:1404
                        • C:\ProgramData\Synaptics\Synaptics.exe
                          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                          5⤵
                          • Executes dropped EXE
                          PID:384
                    • C:\Users\Admin\AppData\Roaming\1000038050\bd.exe
                      "C:\Users\Admin\AppData\Roaming\1000038050\bd.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Checks whether UAC is enabled
                      • Writes to the Master Boot Record (MBR)
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1728
                    • C:\Users\Admin\AppData\Roaming\1000039050\agent.exe
                      "C:\Users\Admin\AppData\Roaming\1000039050\agent.exe"
                      3⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:692
                      • C:\Windows\SysWOW64\cmd.exe
                        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:780
                        • C:\Windows\SysWOW64\reg.exe
                          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                          5⤵
                          • UAC bypass
                          • Modifies registry key
                          PID:1880
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\coop.vbs"
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1356
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\sdfghjk\lkjhg.exe"
                          5⤵
                          • Loads dropped DLL
                          PID:1648
                          • C:\ProgramData\sdfghjk\lkjhg.exe
                            C:\ProgramData\sdfghjk\lkjhg.exe
                            6⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            PID:1968
                            • C:\Windows\SysWOW64\cmd.exe
                              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                              7⤵
                                PID:1172
                                • C:\Windows\SysWOW64\reg.exe
                                  C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                  8⤵
                                  • UAC bypass
                                  • Modifies registry key
                                  PID:1328
                              • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                "c:\program files (x86)\internet explorer\iexplore.exe"
                                7⤵
                                • Adds Run key to start application
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • Suspicious behavior: MapViewOfSection
                                • Suspicious use of SetWindowsHookEx
                                PID:1636
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  8⤵
                                    PID:1916
                        • C:\Users\Admin\AppData\Local\Temp\1000040001\super9.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000040001\super9.exe"
                          3⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1580
                    • C:\Windows\SysWOW64\cmd.exe
                      /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                      1⤵
                        PID:628
                        • C:\Windows\SysWOW64\reg.exe
                          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                          2⤵
                          • UAC bypass
                          • Modifies registry key
                          PID:1736
                      • C:\Windows\system32\AUDIODG.EXE
                        C:\Windows\system32\AUDIODG.EXE 0x568
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1664
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {C11F6701-F172-48EB-A08E-3511352AB2EF} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]
                        1⤵
                          PID:1628
                          • C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe
                            C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe
                            2⤵
                            • Executes dropped EXE
                            PID:1496
                          • C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe
                            C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe
                            2⤵
                            • Executes dropped EXE
                            PID:1968
                        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
                          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                          1⤵
                          • Modifies Internet Explorer settings
                          PID:1456
                        • C:\Windows\SysWOW64\system32.exe
                          C:\Windows\SysWOW64\system32.exe
                          1⤵
                          • Executes dropped EXE
                          PID:1088

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\Synaptics\Synaptics.exe

                          Filesize

                          754KB

                          MD5

                          310a7ff41f6633132e6c2bc25e51e567

                          SHA1

                          5f687df8cc3185ed68d77d0e05502c2eb308c5c8

                          SHA256

                          d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab

                          SHA512

                          ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980

                        • C:\ProgramData\Synaptics\Synaptics.exe

                          Filesize

                          754KB

                          MD5

                          310a7ff41f6633132e6c2bc25e51e567

                          SHA1

                          5f687df8cc3185ed68d77d0e05502c2eb308c5c8

                          SHA256

                          d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab

                          SHA512

                          ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980

                        • C:\ProgramData\sdfghjk\lkjhg.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • C:\ProgramData\sdfghjk\lkjhg.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe

                          Filesize

                          400KB

                          MD5

                          20beeb0a82adcce3a58372804acc46be

                          SHA1

                          c579d9017d2c8298fe075ff5c05963901330e72a

                          SHA256

                          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

                          SHA512

                          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

                        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe

                          Filesize

                          400KB

                          MD5

                          20beeb0a82adcce3a58372804acc46be

                          SHA1

                          c579d9017d2c8298fe075ff5c05963901330e72a

                          SHA256

                          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

                          SHA512

                          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

                        • C:\Users\Admin\AppData\Local\Temp\1000040001\super9.exe

                          Filesize

                          45KB

                          MD5

                          4439bff7fec557da1fb9ed754a838be7

                          SHA1

                          1aac2acba06be9d26209fe5b8b236315a0f8f387

                          SHA256

                          0283da2469f040a2aadcb65856947035f98dca525639670e658f7bdbe9d4f912

                          SHA512

                          c277587bb27d13ac18edc1eadf2ba1e1638ba027de7303d45857ece5e3104b4eb9f7f1e67043f02c0a9785893827960e40c35a0661a02d28dfd0d7674db4a243

                        • C:\Users\Admin\AppData\Local\Temp\1000040001\super9.exe

                          Filesize

                          45KB

                          MD5

                          4439bff7fec557da1fb9ed754a838be7

                          SHA1

                          1aac2acba06be9d26209fe5b8b236315a0f8f387

                          SHA256

                          0283da2469f040a2aadcb65856947035f98dca525639670e658f7bdbe9d4f912

                          SHA512

                          c277587bb27d13ac18edc1eadf2ba1e1638ba027de7303d45857ece5e3104b4eb9f7f1e67043f02c0a9785893827960e40c35a0661a02d28dfd0d7674db4a243

                        • C:\Users\Admin\AppData\Local\Temp\K7KeMB1P.xlsm

                          Filesize

                          17KB

                          MD5

                          e566fc53051035e1e6fd0ed1823de0f9

                          SHA1

                          00bc96c48b98676ecd67e81a6f1d7754e4156044

                          SHA256

                          8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

                          SHA512

                          a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

                        • C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe

                          Filesize

                          225KB

                          MD5

                          6a59c469713da7bb9abc4b8f2e8ac6da

                          SHA1

                          e87a23b50b3f3a41c50d62e558153d3a3010a02b

                          SHA256

                          3d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d

                          SHA512

                          16e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65

                        • C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe

                          Filesize

                          225KB

                          MD5

                          6a59c469713da7bb9abc4b8f2e8ac6da

                          SHA1

                          e87a23b50b3f3a41c50d62e558153d3a3010a02b

                          SHA256

                          3d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d

                          SHA512

                          16e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65

                        • C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe

                          Filesize

                          225KB

                          MD5

                          6a59c469713da7bb9abc4b8f2e8ac6da

                          SHA1

                          e87a23b50b3f3a41c50d62e558153d3a3010a02b

                          SHA256

                          3d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d

                          SHA512

                          16e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65

                        • C:\Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe

                          Filesize

                          225KB

                          MD5

                          6a59c469713da7bb9abc4b8f2e8ac6da

                          SHA1

                          e87a23b50b3f3a41c50d62e558153d3a3010a02b

                          SHA256

                          3d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d

                          SHA512

                          16e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65

                        • C:\Users\Admin\AppData\Local\Temp\coop.vbs

                          Filesize

                          524B

                          MD5

                          d28163eaa4337903de41f7bec5b33795

                          SHA1

                          4be22a60548fb9d3bc71dad30825c2dabc0ec815

                          SHA256

                          186a2649bb67e20bb349177b22e28e5206550d554bc6d58592a0ca69de3d07dd

                          SHA512

                          9ea9a163dfa7ed26b03928db75f3f9e3da77d087b221bbe640c6497a3f2ed3f15e9ea5a1fd47244afc587bdcd7ff0de153261cc11d5c4c2d6b487c195e7dcce9

                        • C:\Users\Admin\AppData\Roaming\1000034050\system32.exe

                          Filesize

                          879KB

                          MD5

                          45f6980ec4c0108bb1103cbc1906fa18

                          SHA1

                          26504d9884c97a2fab9aa128148a5b36becf9e92

                          SHA256

                          8bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927

                          SHA512

                          64fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049

                        • C:\Users\Admin\AppData\Roaming\1000034050\system32.exe

                          Filesize

                          879KB

                          MD5

                          45f6980ec4c0108bb1103cbc1906fa18

                          SHA1

                          26504d9884c97a2fab9aa128148a5b36becf9e92

                          SHA256

                          8bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927

                          SHA512

                          64fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049

                        • C:\Users\Admin\AppData\Roaming\1000038050\bd.exe

                          Filesize

                          1.4MB

                          MD5

                          afd26f223230ad20eb208dbaa0164e43

                          SHA1

                          9c92cde80d982dec72e5a2fb6553bc1cd89e8319

                          SHA256

                          fc0cb0682ccc37bdd72fab5106d45ebf7fb014b15004d65d627f6e2aed0750b4

                          SHA512

                          e0e284ffdd4ef7421a0c0ffb1cf6e2aa82707a861be84e98713a3efd385f1347d8c869709d941d19c0fb3df0d7e40aec1803fb14cc379cec98eeaf8e196aefce

                        • C:\Users\Admin\AppData\Roaming\1000039050\agent.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • C:\Users\Admin\AppData\Roaming\1000039050\agent.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • C:\Windows\SysWOW64\system32.exe

                          Filesize

                          879KB

                          MD5

                          45f6980ec4c0108bb1103cbc1906fa18

                          SHA1

                          26504d9884c97a2fab9aa128148a5b36becf9e92

                          SHA256

                          8bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927

                          SHA512

                          64fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049

                        • C:\windowss64\computer.exe

                          Filesize

                          1.1MB

                          MD5

                          be689578752179e22bf915dbcf4f7520

                          SHA1

                          e798e703bfb90707a2872b51da73f32af566aedb

                          SHA256

                          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

                          SHA512

                          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

                        • C:\windowss64\computer.exe

                          Filesize

                          1.1MB

                          MD5

                          be689578752179e22bf915dbcf4f7520

                          SHA1

                          e798e703bfb90707a2872b51da73f32af566aedb

                          SHA256

                          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

                          SHA512

                          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

                        • \ProgramData\Synaptics\Synaptics.exe

                          Filesize

                          754KB

                          MD5

                          310a7ff41f6633132e6c2bc25e51e567

                          SHA1

                          5f687df8cc3185ed68d77d0e05502c2eb308c5c8

                          SHA256

                          d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab

                          SHA512

                          ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980

                        • \ProgramData\Synaptics\Synaptics.exe

                          Filesize

                          754KB

                          MD5

                          310a7ff41f6633132e6c2bc25e51e567

                          SHA1

                          5f687df8cc3185ed68d77d0e05502c2eb308c5c8

                          SHA256

                          d1425edf482717cb64db2a36357866045b0c6306d919296591ffc9bc45d680ab

                          SHA512

                          ee9b3114cb37e52793bccdf20a27158f5def67ed9c7d8eb772e1deaf5d5f9a0030e847dea40bb320637f29508f1be2a49c3095460a6fd3afbc3bca196f642980

                        • \ProgramData\sdfghjk\lkjhg.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • \ProgramData\sdfghjk\lkjhg.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • \Users\Admin\AppData\Local\Temp\._cache_computer.exe

                          Filesize

                          400KB

                          MD5

                          20beeb0a82adcce3a58372804acc46be

                          SHA1

                          c579d9017d2c8298fe075ff5c05963901330e72a

                          SHA256

                          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

                          SHA512

                          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

                        • \Users\Admin\AppData\Local\Temp\._cache_computer.exe

                          Filesize

                          400KB

                          MD5

                          20beeb0a82adcce3a58372804acc46be

                          SHA1

                          c579d9017d2c8298fe075ff5c05963901330e72a

                          SHA256

                          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

                          SHA512

                          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

                        • \Users\Admin\AppData\Local\Temp\1000040001\super9.exe

                          Filesize

                          45KB

                          MD5

                          4439bff7fec557da1fb9ed754a838be7

                          SHA1

                          1aac2acba06be9d26209fe5b8b236315a0f8f387

                          SHA256

                          0283da2469f040a2aadcb65856947035f98dca525639670e658f7bdbe9d4f912

                          SHA512

                          c277587bb27d13ac18edc1eadf2ba1e1638ba027de7303d45857ece5e3104b4eb9f7f1e67043f02c0a9785893827960e40c35a0661a02d28dfd0d7674db4a243

                        • \Users\Admin\AppData\Local\Temp\a4e2bd6d47\WinComService.exe

                          Filesize

                          225KB

                          MD5

                          6a59c469713da7bb9abc4b8f2e8ac6da

                          SHA1

                          e87a23b50b3f3a41c50d62e558153d3a3010a02b

                          SHA256

                          3d21285ae1a22e1954c31393ce1a7238054d9a78b5ec7560235261cb99df918d

                          SHA512

                          16e7c44c8026016439f2c2eac8ae05a7f0ae6115882897d885837a6f5c37c3b19f5cba53202e691a11e632615d921adb50979077d0e50898cce49d2fbe7bca65

                        • \Users\Admin\AppData\Roaming\1000034050\system32.exe

                          Filesize

                          879KB

                          MD5

                          45f6980ec4c0108bb1103cbc1906fa18

                          SHA1

                          26504d9884c97a2fab9aa128148a5b36becf9e92

                          SHA256

                          8bc19641f9095f8c86c3836cf1f9d7b1dd14a1c62da0320ce09d5e27d0104927

                          SHA512

                          64fc21f11fc4bfbd485111695ee2ac9e1e70f4107893e259aa4d705a7ad647e7968f3c223d8d647124c8b0d8f041bae074c600a0ae168b0eb166cd62ee877049

                        • \Users\Admin\AppData\Roaming\1000038050\bd.exe

                          Filesize

                          1.4MB

                          MD5

                          afd26f223230ad20eb208dbaa0164e43

                          SHA1

                          9c92cde80d982dec72e5a2fb6553bc1cd89e8319

                          SHA256

                          fc0cb0682ccc37bdd72fab5106d45ebf7fb014b15004d65d627f6e2aed0750b4

                          SHA512

                          e0e284ffdd4ef7421a0c0ffb1cf6e2aa82707a861be84e98713a3efd385f1347d8c869709d941d19c0fb3df0d7e40aec1803fb14cc379cec98eeaf8e196aefce

                        • \Users\Admin\AppData\Roaming\1000039050\agent.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • \Users\Admin\AppData\Roaming\1000039050\agent.exe

                          Filesize

                          471KB

                          MD5

                          ac382bfcfaea86b5749f7abc571ccf12

                          SHA1

                          928454bcce909ea349a03b14c043430905a88fdb

                          SHA256

                          f7f8d1ebfed3afd13eb47392a7f502603ecb970a817c221682cd8f2a17ff2bb3

                          SHA512

                          07cacc471ac863ac12db6f0d4c7a75d968dea257f7f5f722a830e9b5239f45071e1a3fe19c17faca06aec4a48f8456d3590f8643c618a023838aca46e0c03c4d

                        • \windowss64\computer.exe

                          Filesize

                          1.1MB

                          MD5

                          be689578752179e22bf915dbcf4f7520

                          SHA1

                          e798e703bfb90707a2872b51da73f32af566aedb

                          SHA256

                          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

                          SHA512

                          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

                        • \windowss64\computer.exe

                          Filesize

                          1.1MB

                          MD5

                          be689578752179e22bf915dbcf4f7520

                          SHA1

                          e798e703bfb90707a2872b51da73f32af566aedb

                          SHA256

                          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

                          SHA512

                          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

                        • \windowss64\computer.exe

                          Filesize

                          1.1MB

                          MD5

                          be689578752179e22bf915dbcf4f7520

                          SHA1

                          e798e703bfb90707a2872b51da73f32af566aedb

                          SHA256

                          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

                          SHA512

                          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

                        • memory/1088-4933-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1088-6245-0x0000000001F50000-0x00000000020D1000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1088-6243-0x0000000001D70000-0x0000000001E70000-memory.dmp

                          Filesize

                          1024KB

                        • memory/1208-54-0x0000000075591000-0x0000000075593000-memory.dmp

                          Filesize

                          8KB

                        • memory/1428-575-0x0000000003820000-0x0000000003C82000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1428-72-0x0000000003790000-0x00000000038B9000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1428-622-0x0000000003820000-0x0000000003C82000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1436-539-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-4900-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-523-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-524-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-525-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-526-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-529-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-527-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-528-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-530-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-531-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-533-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-532-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-535-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-534-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-536-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-537-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-538-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-521-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-540-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-520-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-518-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-519-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-73-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1436-75-0x0000000077000000-0x0000000077047000-memory.dmp

                          Filesize

                          284KB

                        • memory/1436-516-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-517-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-514-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-515-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-513-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-511-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-481-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-512-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-510-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-4926-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1436-509-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-482-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-508-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-507-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-483-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-506-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-505-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-503-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-504-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-484-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-485-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-486-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-487-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-502-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-501-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-488-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-500-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-490-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-499-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-489-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-491-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-492-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-494-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-498-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-493-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-4902-0x0000000001E20000-0x0000000001F20000-memory.dmp

                          Filesize

                          1024KB

                        • memory/1436-4901-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1436-522-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-495-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-496-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1436-1463-0x0000000001F60000-0x00000000020E1000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1436-1461-0x0000000001E20000-0x0000000001F20000-memory.dmp

                          Filesize

                          1024KB

                        • memory/1436-497-0x0000000002210000-0x0000000002321000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1456-4934-0x00000000722ED000-0x00000000722F8000-memory.dmp

                          Filesize

                          44KB

                        • memory/1580-621-0x00000000001C0000-0x00000000001D2000-memory.dmp

                          Filesize

                          72KB

                        • memory/1636-615-0x0000000000080000-0x00000000000FF000-memory.dmp

                          Filesize

                          508KB

                        • memory/1636-625-0x0000000000080000-0x00000000000FF000-memory.dmp

                          Filesize

                          508KB

                        • memory/1728-634-0x00000000005A0000-0x00000000005C9000-memory.dmp

                          Filesize

                          164KB

                        • memory/1728-630-0x00000000005A0000-0x00000000005C9000-memory.dmp

                          Filesize

                          164KB

                        • memory/1728-623-0x00000000000B0000-0x0000000000512000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1728-632-0x0000000077450000-0x00000000775D0000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1728-631-0x0000000000630000-0x000000000064D000-memory.dmp

                          Filesize

                          116KB

                        • memory/1728-633-0x0000000002B80000-0x0000000003B80000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/1728-635-0x00000000000B0000-0x0000000000512000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1728-577-0x00000000000B0000-0x0000000000512000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1728-624-0x0000000077450000-0x00000000775D0000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1728-636-0x0000000077450000-0x00000000775D0000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1728-588-0x0000000077450000-0x00000000775D0000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1916-616-0x0000000000110000-0x000000000018F000-memory.dmp

                          Filesize

                          508KB