Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2023 10:49

General

  • Target

    Private_Key_17GbKcfZiM6EFW86fhgTAoN7TfBcdmW4d6.scr.exe

  • Size

    1.7MB

  • MD5

    0af5c337082f7f3d9249ca5cdfd2d4ce

  • SHA1

    aeb90df77e8fc06b9a42287cb277710e5305c9bc

  • SHA256

    069da9838ffd1b21d13c0a1952608e29e64e7b40847ab3fb67e16cfd797ab834

  • SHA512

    12e07a9e86bbad4b34b0a603f62396fae24746a7d349a7506a83d625da08fd0dd8fc6dea2d6828f62ccc8e13a3f885831cd65f0b4ed3e97368298f809270ee73

  • SSDEEP

    49152:eafU0nviMsLVdf2Hc5HxK0Es0WLw2ifBJ6Qu:VfHKzLzf2QAJrfc

Malware Config

Extracted

Family

darkcomet

Botnet

New-July-July4-01

C2

dgorijan20785.hopto.org:35800

Mutex

DC_MUTEX-N3AV3EU

Attributes
  • gencode

    sGSTFQ1pY1TB

  • install

    false

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

Extracted

Family

warzonerat

C2

dgorijan20785.hopto.org:5199

45.74.4.244:5199

Extracted

Family

darkcomet

Botnet

New-July-July4-0

C2

45.74.4.244:35800

Mutex

DC_MUTEX-RT27KF0

Attributes
  • gencode

    cKUHbX2GsGhs

  • install

    false

  • offline_keylogger

    true

  • password

    hhhhhh

  • persistence

    false

Extracted

Family

asyncrat

Version

0.5.6A

C2

45.74.4.244:6606

45.74.4.244:7707

45.74.4.244:8808

Mutex

servtle284

Attributes
  • delay

    5

  • install

    true

  • install_file

    wintskl.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Async RAT payload 4 IoCs
  • Warzone RAT payload 24 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 25 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 23 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Private_Key_17GbKcfZiM6EFW86fhgTAoN7TfBcdmW4d6.scr.exe
    "C:\Users\Admin\AppData\Local\Temp\Private_Key_17GbKcfZiM6EFW86fhgTAoN7TfBcdmW4d6.scr.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:568
    • C:\Users\Admin\AppData\Local\Temp\Private_Key_17GbKcfZiM6EFW86fhgTAoN7TfBcdmW4d6.scr.exe
      C:\Users\Admin\AppData\Local\Temp\Private_Key_17GbKcfZiM6EFW86fhgTAoN7TfBcdmW4d6.scr.exe
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE
        "C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1176
        • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE
          C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2756
      • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE
        "C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1776
        • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE
          C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2628
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe"
            5⤵
              PID:2752
        • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE
          "C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:928
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1720
          • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE
            C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE
            4⤵
            • Executes dropped EXE
            • Drops startup file
            • Loads dropped DLL
            • Adds Run key to start application
            • NTFS ADS
            PID:2904
            • C:\Users\Admin\Documents\wintsklt.exe
              "C:\Users\Admin\Documents\wintsklt.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              PID:2364
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2340
              • C:\Users\Admin\Documents\wintsklt.exe
                C:\Users\Admin\Documents\wintsklt.exe
                6⤵
                • Executes dropped EXE
                PID:2332
        • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE
          "C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1964
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:980
          • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE
            C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE
            4⤵
            • Executes dropped EXE
            PID:2820
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe"
              5⤵
                PID:2356
          • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE
            "C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1508
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:936
            • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE
              C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2788
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'wintskl"' /tr "'C:\Users\Admin\AppData\Roaming\wintskl.exe"'
                5⤵
                • Creates scheduled task(s)
                PID:2488
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp4AA8.tmp.bat""
                5⤵
                • Loads dropped DLL
                PID:2800
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 3
                  6⤵
                  • Delays execution with timeout.exe
                  PID:1784
                • C:\Users\Admin\AppData\Roaming\wintskl.exe
                  "C:\Users\Admin\AppData\Roaming\wintskl.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1196
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2764
                  • C:\Users\Admin\AppData\Roaming\wintskl.exe
                    C:\Users\Admin\AppData\Roaming\wintskl.exe
                    7⤵
                    • Executes dropped EXE
                    PID:2876
          • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE
            "C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            PID:1808
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2252
            • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE
              C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:568
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'wintskl"' /tr "'C:\Users\Admin\AppData\Roaming\wintskl.exe"'
                5⤵
                • Creates scheduled task(s)
                PID:2640
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp17D5.tmp.bat""
                5⤵
                • Loads dropped DLL
                PID:1752
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 3
                  6⤵
                  • Delays execution with timeout.exe
                  PID:928
                • C:\Users\Admin\AppData\Roaming\wintskl.exe
                  "C:\Users\Admin\AppData\Roaming\wintskl.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:2748
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1004
          • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE
            "C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            PID:1528
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:588
            • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE
              C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE
              4⤵
              • Executes dropped EXE
              PID:2056
          • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE
            "C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1916
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:916
            • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE
              C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE
              4⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              PID:2880
          • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE
            "C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            PID:1292
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2144
            • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE
              C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE
              4⤵
              • Executes dropped EXE
              PID:1744
          • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE
            "C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1368
            • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE
              C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE
              4⤵
              • Executes dropped EXE
              PID:2980
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2208

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • C:\Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • C:\Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE

        Filesize

        397KB

        MD5

        52195e2a7f97c64cae5e8a29526e331b

        SHA1

        8b9ba509ab3708ca6c3ddc9e6b2159b6c8b3a757

        SHA256

        a43109ea48654a6991a1b53ac29b54cec0dcf75cf0228ea661a40d8b976c1c2b

        SHA512

        44178e0ea91eb402fce4b4d496f550c3ec1483130af840e867d0086a564695f41a32789882caf5b25bd908b46668330dc7b266599f04a5f451e113fcf881889b

      • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE

        Filesize

        397KB

        MD5

        52195e2a7f97c64cae5e8a29526e331b

        SHA1

        8b9ba509ab3708ca6c3ddc9e6b2159b6c8b3a757

        SHA256

        a43109ea48654a6991a1b53ac29b54cec0dcf75cf0228ea661a40d8b976c1c2b

        SHA512

        44178e0ea91eb402fce4b4d496f550c3ec1483130af840e867d0086a564695f41a32789882caf5b25bd908b46668330dc7b266599f04a5f451e113fcf881889b

      • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE

        Filesize

        397KB

        MD5

        52195e2a7f97c64cae5e8a29526e331b

        SHA1

        8b9ba509ab3708ca6c3ddc9e6b2159b6c8b3a757

        SHA256

        a43109ea48654a6991a1b53ac29b54cec0dcf75cf0228ea661a40d8b976c1c2b

        SHA512

        44178e0ea91eb402fce4b4d496f550c3ec1483130af840e867d0086a564695f41a32789882caf5b25bd908b46668330dc7b266599f04a5f451e113fcf881889b

      • C:\Users\Admin\AppData\Local\Temp\WINCPU.EXE

        Filesize

        397KB

        MD5

        52195e2a7f97c64cae5e8a29526e331b

        SHA1

        8b9ba509ab3708ca6c3ddc9e6b2159b6c8b3a757

        SHA256

        a43109ea48654a6991a1b53ac29b54cec0dcf75cf0228ea661a40d8b976c1c2b

        SHA512

        44178e0ea91eb402fce4b4d496f550c3ec1483130af840e867d0086a564695f41a32789882caf5b25bd908b46668330dc7b266599f04a5f451e113fcf881889b

      • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • C:\Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • C:\Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • C:\Users\Admin\AppData\Local\Temp\tmp4AA8.tmp.bat

        Filesize

        151B

        MD5

        b24eea85bc3bd9620a718b26791558a0

        SHA1

        e1750f4ed0155bead6cca28df5ee062066a38a4a

        SHA256

        e7e0973828c02acbf07060a34612ae33acea5260ee2400d2c056a54dabb85f19

        SHA512

        69d9267e3158a1eb7fdb1b9c58ecf8c6617289186afd2dd782846d17a9c27166b311682f907a25735b71688f6d3a85d90c6c16316c6243d1847ad457c95e6a6d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        4b0d1c8dc8da49619e004c772848d45a

        SHA1

        0216c73d741a45652252fbc38f31b3d3d33c3e04

        SHA256

        54112ccce9b758faa6897cd6cd0bbf9d88c36fe818be3c6a03d22dd315bfa28c

        SHA512

        6165a8e73ffee398221aab486222c562a045acd70a211edb1bbd43b6957bd212a842edfd04006bfb2e377a1733a6f1b4447718eec5ef077751880f31b1c53a5a

      • C:\Users\Admin\AppData\Roaming\wintskl.exe

        Filesize

        41.0MB

        MD5

        4c17f3595c0271a50fc7efec8540663a

        SHA1

        9f1b5691cd3d48a4b09759f07907a6ef29d8f5bb

        SHA256

        d931a946d895f118c88badaa728daed8461b8986036763bc642a76b38b3f0817

        SHA512

        3967a861738c2ef21e7296a29ebe0afe5495a55a71cc0ec61ec93c54829c4d0c05f3ca540b2a23551fd484de863cad97d9b321ef20a5f0f0c1dbecf61a72cb2d

      • C:\Users\Admin\AppData\Roaming\wintskl.exe

        Filesize

        41.0MB

        MD5

        4c17f3595c0271a50fc7efec8540663a

        SHA1

        9f1b5691cd3d48a4b09759f07907a6ef29d8f5bb

        SHA256

        d931a946d895f118c88badaa728daed8461b8986036763bc642a76b38b3f0817

        SHA512

        3967a861738c2ef21e7296a29ebe0afe5495a55a71cc0ec61ec93c54829c4d0c05f3ca540b2a23551fd484de863cad97d9b321ef20a5f0f0c1dbecf61a72cb2d

      • C:\Users\Admin\Documents\wintsklt.exe

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • C:\Windows\system32\drivers\etc\hosts

        Filesize

        21B

        MD5

        2ddca716eff6ab2f8d96dc3d39527386

        SHA1

        4c1c65fa4d6bffe17dc9e04e193adf6db9d0994f

        SHA256

        e0802313e50e2b94580ac045356ea9cbd88106bede5525634964412a7811f52a

        SHA512

        5b2a2f43e431d9637a87726b387819f00c9b3fa4ea7371e844dcdaeb424c32d5ab0106663d0d3f0e17a06d5890303cced8a625d06d04cbf657b6e3de207eb8e3

      • C:\Windows\system32\drivers\etc\hosts

        Filesize

        21B

        MD5

        2ddca716eff6ab2f8d96dc3d39527386

        SHA1

        4c1c65fa4d6bffe17dc9e04e193adf6db9d0994f

        SHA256

        e0802313e50e2b94580ac045356ea9cbd88106bede5525634964412a7811f52a

        SHA512

        5b2a2f43e431d9637a87726b387819f00c9b3fa4ea7371e844dcdaeb424c32d5ab0106663d0d3f0e17a06d5890303cced8a625d06d04cbf657b6e3de207eb8e3

      • \??\PIPE\srvsvc

        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • \Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • \Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • \Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • \Users\Admin\AppData\Local\Temp\DRVHDD.EXE

        Filesize

        621KB

        MD5

        ca7c02df3ed08ea9cab8da59f1e5bd8d

        SHA1

        97eb40ea42e9c3b531a70bc298fece3885f59e3f

        SHA256

        4ad0cac19bc9ebbdfc08c8440d4d5a7da007ddc252b15fc0c536476917bb6532

        SHA512

        dd65d2213a8229d8ff475194235f5662278e235eda7aedd141d524ce94d6206ed14ed5ff78b251ea2abab5f04d8751f0301c5a011cf868bed1aa812b4c28e8e5

      • \Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • \Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • \Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • \Users\Admin\AppData\Local\Temp\USBDRVI.EXE

        Filesize

        444KB

        MD5

        080b40ab05695bbb8dc38e4918b0dc7e

        SHA1

        8203bcc0834811a1c29bfa719ca88259c982c803

        SHA256

        220d67d648cbeae3a1c75ba1208a6646990f50772ba0a92a7c0bab7911665310

        SHA512

        8b69db6ec47d50c17eab378c4f8fc4e46f8007c90d639e7ef5961a1ff088165b791398ec3d8a953ca35d88d7fd4a69e5ab5450f6dcd4124c664a185d19623f71

      • \Users\Admin\AppData\Local\Temp\WINCPU.EXE

        Filesize

        397KB

        MD5

        52195e2a7f97c64cae5e8a29526e331b

        SHA1

        8b9ba509ab3708ca6c3ddc9e6b2159b6c8b3a757

        SHA256

        a43109ea48654a6991a1b53ac29b54cec0dcf75cf0228ea661a40d8b976c1c2b

        SHA512

        44178e0ea91eb402fce4b4d496f550c3ec1483130af840e867d0086a564695f41a32789882caf5b25bd908b46668330dc7b266599f04a5f451e113fcf881889b

      • \Users\Admin\AppData\Local\Temp\WINCPU.EXE

        Filesize

        397KB

        MD5

        52195e2a7f97c64cae5e8a29526e331b

        SHA1

        8b9ba509ab3708ca6c3ddc9e6b2159b6c8b3a757

        SHA256

        a43109ea48654a6991a1b53ac29b54cec0dcf75cf0228ea661a40d8b976c1c2b

        SHA512

        44178e0ea91eb402fce4b4d496f550c3ec1483130af840e867d0086a564695f41a32789882caf5b25bd908b46668330dc7b266599f04a5f451e113fcf881889b

      • \Users\Admin\AppData\Local\Temp\WINCPU.EXE

        Filesize

        397KB

        MD5

        52195e2a7f97c64cae5e8a29526e331b

        SHA1

        8b9ba509ab3708ca6c3ddc9e6b2159b6c8b3a757

        SHA256

        a43109ea48654a6991a1b53ac29b54cec0dcf75cf0228ea661a40d8b976c1c2b

        SHA512

        44178e0ea91eb402fce4b4d496f550c3ec1483130af840e867d0086a564695f41a32789882caf5b25bd908b46668330dc7b266599f04a5f451e113fcf881889b

      • \Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • \Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • \Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • \Users\Admin\AppData\Local\Temp\WINLOGONW.EXE

        Filesize

        435KB

        MD5

        f2f861cc0985546a748142eaca913cfb

        SHA1

        f26db0c99c531261780a9f2fc3584d50328ad9af

        SHA256

        63ffad17f29cec99a45b9fe2c2ac410ef658da920f681beabaa0e4a347cc22df

        SHA512

        875761c5369c293c351b0cdd3fedaf6b5048ab481b1dd29bd2c61df577063fd6f8b996398aef31e77ec11a49aa0e9578f6933c2f105e60e9af3de0233119371a

      • \Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • \Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • \Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • \Users\Admin\AppData\Local\Temp\WINPLAYEER.EXE

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • \Users\Admin\AppData\Roaming\wintskl.exe

        Filesize

        41.0MB

        MD5

        4c17f3595c0271a50fc7efec8540663a

        SHA1

        9f1b5691cd3d48a4b09759f07907a6ef29d8f5bb

        SHA256

        d931a946d895f118c88badaa728daed8461b8986036763bc642a76b38b3f0817

        SHA512

        3967a861738c2ef21e7296a29ebe0afe5495a55a71cc0ec61ec93c54829c4d0c05f3ca540b2a23551fd484de863cad97d9b321ef20a5f0f0c1dbecf61a72cb2d

      • \Users\Admin\Documents\wintsklt.exe

        Filesize

        445KB

        MD5

        91bb5739afce122ddea99a91758bde4a

        SHA1

        f61823897e81e3cc806de9a3dd9d949418bcad44

        SHA256

        ec197f82688c7181d0c185f7dfd2a60cd74187380247ebaacec7cbc9c7c3585b

        SHA512

        bf2c8b038949f3c030ef184f2eb6cf783c2f547d326464114c47ec3fec3cde8b864b290002eb034b08a80b990c69df1a51d71dd2c5eaf40bece8da895ce4f06b

      • memory/568-61-0x000000006F550000-0x000000006FAFB000-memory.dmp

        Filesize

        5.7MB

      • memory/568-63-0x000000006F550000-0x000000006FAFB000-memory.dmp

        Filesize

        5.7MB

      • memory/568-386-0x000000000040C38E-mapping.dmp

      • memory/568-59-0x0000000000000000-mapping.dmp

      • memory/568-62-0x000000006F550000-0x000000006FAFB000-memory.dmp

        Filesize

        5.7MB

      • memory/588-233-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/588-175-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/588-165-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/588-141-0x0000000000000000-mapping.dmp

      • memory/804-80-0x0000000000000000-mapping.dmp

      • memory/804-96-0x0000000001F90000-0x0000000001FEC000-memory.dmp

        Filesize

        368KB

      • memory/804-86-0x0000000000890000-0x0000000000904000-memory.dmp

        Filesize

        464KB

      • memory/916-205-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/916-174-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/916-164-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/916-146-0x0000000000000000-mapping.dmp

      • memory/928-108-0x0000000001110000-0x0000000001186000-memory.dmp

        Filesize

        472KB

      • memory/928-112-0x0000000000BA0000-0x0000000000BFC000-memory.dmp

        Filesize

        368KB

      • memory/928-427-0x0000000000000000-mapping.dmp

      • memory/928-95-0x0000000000000000-mapping.dmp

      • memory/936-196-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/936-153-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/936-121-0x0000000000000000-mapping.dmp

      • memory/936-172-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/980-171-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/980-117-0x0000000000000000-mapping.dmp

      • memory/980-151-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/980-197-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1004-431-0x0000000000000000-mapping.dmp

      • memory/1176-195-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1176-169-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1176-114-0x0000000000000000-mapping.dmp

      • memory/1176-149-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1196-349-0x0000000000000000-mapping.dmp

      • memory/1196-351-0x0000000000BA0000-0x0000000000C08000-memory.dmp

        Filesize

        416KB

      • memory/1292-137-0x0000000000000000-mapping.dmp

      • memory/1368-130-0x0000000000000000-mapping.dmp

      • memory/1508-111-0x0000000000430000-0x0000000000480000-memory.dmp

        Filesize

        320KB

      • memory/1508-99-0x0000000000C90000-0x0000000000CF8000-memory.dmp

        Filesize

        416KB

      • memory/1508-84-0x0000000000000000-mapping.dmp

      • memory/1528-119-0x0000000000000000-mapping.dmp

      • memory/1552-64-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1552-70-0x00000000006FED40-mapping.dmp

      • memory/1552-67-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1552-168-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1552-73-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1552-65-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1552-69-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1552-74-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1552-75-0x0000000000400000-0x0000000000701000-memory.dmp

        Filesize

        3.0MB

      • memory/1656-113-0x0000000004280000-0x0000000004308000-memory.dmp

        Filesize

        544KB

      • memory/1656-98-0x0000000000A30000-0x0000000000AD0000-memory.dmp

        Filesize

        640KB

      • memory/1656-77-0x0000000000000000-mapping.dmp

      • memory/1720-203-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1720-125-0x0000000000000000-mapping.dmp

      • memory/1720-56-0x00000000752B1000-0x00000000752B3000-memory.dmp

        Filesize

        8KB

      • memory/1720-55-0x0000000000220000-0x0000000000226000-memory.dmp

        Filesize

        24KB

      • memory/1720-173-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1720-57-0x00000000057D0000-0x0000000005970000-memory.dmp

        Filesize

        1.6MB

      • memory/1720-58-0x0000000000510000-0x000000000055C000-memory.dmp

        Filesize

        304KB

      • memory/1720-163-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1720-54-0x00000000008D0000-0x0000000000A80000-memory.dmp

        Filesize

        1.7MB

      • memory/1744-340-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/1744-365-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/1744-330-0x0000000000406DE6-mapping.dmp

      • memory/1752-426-0x0000000000000000-mapping.dmp

      • memory/1776-102-0x0000000000000000-mapping.dmp

      • memory/1776-170-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1776-178-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1776-148-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-346-0x0000000000000000-mapping.dmp

      • memory/1808-127-0x0000000000000000-mapping.dmp

      • memory/1916-116-0x0000000000000000-mapping.dmp

      • memory/1964-110-0x00000000009E0000-0x0000000000A3A000-memory.dmp

        Filesize

        360KB

      • memory/1964-88-0x0000000000000000-mapping.dmp

      • memory/1964-97-0x0000000001120000-0x0000000001192000-memory.dmp

        Filesize

        456KB

      • memory/2056-322-0x0000000000406DE6-mapping.dmp

      • memory/2056-362-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2056-339-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2144-177-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/2144-152-0x0000000000000000-mapping.dmp

      • memory/2144-242-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/2144-167-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/2208-216-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/2208-176-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/2208-155-0x0000000000000000-mapping.dmp

      • memory/2208-166-0x000000006F160000-0x000000006F70B000-memory.dmp

        Filesize

        5.7MB

      • memory/2252-352-0x0000000000000000-mapping.dmp

      • memory/2252-357-0x000000006F110000-0x000000006F6BB000-memory.dmp

        Filesize

        5.7MB

      • memory/2332-419-0x0000000000406DE6-mapping.dmp

      • memory/2340-374-0x0000000000000000-mapping.dmp

      • memory/2356-360-0x0000000000000000-mapping.dmp

      • memory/2364-367-0x0000000000000000-mapping.dmp

      • memory/2364-370-0x0000000001300000-0x0000000001376000-memory.dmp

        Filesize

        472KB

      • memory/2488-343-0x0000000000000000-mapping.dmp

      • memory/2628-185-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-191-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-314-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-188-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-180-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-181-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-183-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-190-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2628-192-0x0000000000406DE6-mapping.dmp

      • memory/2628-186-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2640-425-0x0000000000000000-mapping.dmp

      • memory/2748-428-0x0000000000000000-mapping.dmp

      • memory/2752-361-0x0000000000000000-mapping.dmp

      • memory/2756-199-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2756-250-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2756-342-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2756-204-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2756-200-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2756-224-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2756-214-0x00000000004B56A0-mapping.dmp

      • memory/2756-209-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2764-364-0x000000006F110000-0x000000006F6BB000-memory.dmp

        Filesize

        5.7MB

      • memory/2764-355-0x0000000000000000-mapping.dmp

      • memory/2788-212-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2788-206-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2788-287-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2788-249-0x000000000040C38E-mapping.dmp

      • memory/2800-344-0x0000000000000000-mapping.dmp

      • memory/2820-213-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2820-217-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2820-219-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2820-248-0x0000000000405CE2-mapping.dmp

      • memory/2820-208-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2820-310-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2820-210-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2876-400-0x000000000040C38E-mapping.dmp

      • memory/2880-251-0x00000000004B56A0-mapping.dmp

      • memory/2880-297-0x0000000000400000-0x00000000004B7000-memory.dmp

        Filesize

        732KB

      • memory/2904-337-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2904-369-0x0000000000400000-0x0000000000559000-memory.dmp

        Filesize

        1.3MB

      • memory/2904-303-0x0000000000406DE6-mapping.dmp

      • memory/2980-363-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/2980-320-0x0000000000405CE2-mapping.dmp

      • memory/2980-338-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB