Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2023, 03:23

General

  • Target

    ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe

  • Size

    1.6MB

  • MD5

    5a649968a988733f48f7f7e2cc44e646

  • SHA1

    fbae2c83886e710741fd83f41ddecc1dc96656c4

  • SHA256

    ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784

  • SHA512

    e24387bed33a8b2f284fcbf08bb0b448a59211b42f633a5063760d42933122af3b1c857a07e1c1cfc1c8504c1205825414594c14ebe92afc2075ba7b0c0a06e9

  • SSDEEP

    24576:5IGUF2bjpMnhh+BZ3ohbPEWdL8Y3nBChF++2pdNKCPq1HAyaHdI:5bbjpEhGZ4hbbxhnBGFt2pdAV3aHdI

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 7 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 10 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2700
      • C:\Windows\SysWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
      • C:\Windows\SysWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:2516
      • C:\Windows\SysWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
          PID:3600
      • C:\Users\Admin\AppData\Local\Temp\ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe
        "C:\Users\Admin\AppData\Local\Temp\ad71a9b1aad64f205019daef27f45eaf6134d88204b4c939fe101752fe3f9784.exe"
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
          2⤵
            PID:1784
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
            2⤵
              PID:1264
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:5004
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C echo %userprofile% > C:\Users\Admin\AppData\Roaming\ZendeskStore\cout 2>&1
                3⤵
                  PID:948
                  • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exe
                    C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exe -s /accepteula applications
                    4⤵
                    • Executes dropped EXE
                    • Checks processor information in registry
                    PID:1804
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C cd "C:\Users\Admin\AppData\Roaming\ZendeskStore" & bohx.exe -o caxh.zip
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4600
                  • C:\Users\Admin\AppData\Roaming\ZendeskStore\bohx.exe
                    bohx.exe -o caxh.zip
                    4⤵
                    • Executes dropped EXE
                    PID:4544
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C systeminfo | findstr /C:"OS Name" > "C:\Users\Admin\AppData\Roaming\ZendeskStore\wun"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1100
                  • C:\Windows\SysWOW64\systeminfo.exe
                    systeminfo
                    4⤵
                    • Gathers system information
                    PID:448
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /C:"OS Name"
                    4⤵
                      PID:3364
                  • C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe
                    "C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe"
                    3⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:840
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                      4⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:2464
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C echo %userprofile% > C:\Users\Admin\AppData\Roaming\ZendeskStore\cout 2>&1
                        5⤵
                          PID:2120
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C cd "C:\Users\Admin\AppData\Roaming\ZendeskStore" & bohx.exe -o myec.zip
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2260
                          • C:\Users\Admin\AppData\Roaming\ZendeskStore\bohx.exe
                            bohx.exe -o myec.zip
                            6⤵
                            • Executes dropped EXE
                            PID:4656
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exe -s /accepteula applications > "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out"& "C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" -s /accepteula applications >> "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out"
                          5⤵
                            PID:948
                            • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe
                              "C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" -s /accepteula applications
                              6⤵
                              • Executes dropped EXE
                              • Checks processor information in registry
                              PID:2228
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe -d /accepteula processor > "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out" & "C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" /accepteula video >> "C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out"
                            5⤵
                              PID:4008
                              • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe
                                C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe -d /accepteula processor
                                6⤵
                                • Executes dropped EXE
                                • Checks processor information in registry
                                PID:4268
                              • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe
                                "C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe" /accepteula video
                                6⤵
                                • Executes dropped EXE
                                • Checks processor information in registry
                                PID:1148
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c ping localhost -n 6 > nul & del C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                              5⤵
                                PID:4820
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 1268
                              4⤵
                              • Program crash
                              PID:4784
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 944
                              4⤵
                              • Program crash
                              PID:5036
                          • C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe
                            "C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe"
                            3⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:4116
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
                              4⤵
                                PID:5036
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 1004
                                4⤵
                                • Program crash
                                PID:1972
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 1232
                                4⤵
                                • Program crash
                                PID:3032
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 1272
                            2⤵
                            • Program crash
                            PID:2976
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 1292
                            2⤵
                            • Program crash
                            PID:4904
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2732 -ip 2732
                          1⤵
                            PID:3292
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2732 -ip 2732
                            1⤵
                              PID:4088
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4116 -ip 4116
                              1⤵
                                PID:4840
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4116 -ip 4116
                                1⤵
                                  PID:2844
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 840 -ip 840
                                  1⤵
                                    PID:4904
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 840 -ip 840
                                    1⤵
                                      PID:2804

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\240553375.dll

                                      Filesize

                                      334KB

                                      MD5

                                      098a4aa93e275de54bbc35ae4b981301

                                      SHA1

                                      d03646dc7c63e0784393f74085405c794b8555af

                                      SHA256

                                      5e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b

                                      SHA512

                                      2e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46

                                    • C:\Users\Admin\AppData\Local\Temp\240568593.dll

                                      Filesize

                                      334KB

                                      MD5

                                      098a4aa93e275de54bbc35ae4b981301

                                      SHA1

                                      d03646dc7c63e0784393f74085405c794b8555af

                                      SHA256

                                      5e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b

                                      SHA512

                                      2e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46

                                    • C:\Users\Admin\AppData\Local\Temp\240568593.dll

                                      Filesize

                                      334KB

                                      MD5

                                      098a4aa93e275de54bbc35ae4b981301

                                      SHA1

                                      d03646dc7c63e0784393f74085405c794b8555af

                                      SHA256

                                      5e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b

                                      SHA512

                                      2e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46

                                    • C:\Users\Admin\AppData\Local\Temp\240569031.dll

                                      Filesize

                                      334KB

                                      MD5

                                      098a4aa93e275de54bbc35ae4b981301

                                      SHA1

                                      d03646dc7c63e0784393f74085405c794b8555af

                                      SHA256

                                      5e81e932ef8520dd7de22cb9e3a02af66d29dc1726b133e894cbd7d797b9af3b

                                      SHA512

                                      2e039df42a6202f4e4c61c3bef62307dfa5b7e1e9103085c4f73c4459c8cc747bec85da8f1c87f97851de896104712c71f13da396c6016fc27f60cd358e93f46

                                    • C:\Users\Admin\AppData\Local\Temp\ipRYsYYeq21I.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      2c8c5c1e491aea4b622c4f45ad6b1b17

                                      SHA1

                                      8f65a5c0627577acd421708f71731cbc1b62dad4

                                      SHA256

                                      26810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63

                                      SHA512

                                      1c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691

                                    • C:\Users\Admin\AppData\Local\Temp\ipRYsYYeq21I.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      2c8c5c1e491aea4b622c4f45ad6b1b17

                                      SHA1

                                      8f65a5c0627577acd421708f71731cbc1b62dad4

                                      SHA256

                                      26810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63

                                      SHA512

                                      1c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691

                                    • C:\Users\Admin\AppData\Local\Temp\ipRYsYYeq21I.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      2c8c5c1e491aea4b622c4f45ad6b1b17

                                      SHA1

                                      8f65a5c0627577acd421708f71731cbc1b62dad4

                                      SHA256

                                      26810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63

                                      SHA512

                                      1c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691

                                    • C:\Users\Admin\AppData\Local\temp\ipRYsYYeq21I.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      2c8c5c1e491aea4b622c4f45ad6b1b17

                                      SHA1

                                      8f65a5c0627577acd421708f71731cbc1b62dad4

                                      SHA256

                                      26810fe5b0acdb7b945c8a03f644b930159c286bd505af23e998cefd6f795f63

                                      SHA512

                                      1c19f1e874b94b9ce9a9119240c8e0c15a4c251cef83b19aa3193f466adbf086716831e1af51239b7ea197b61a536184da26e9bac0f80edf25f12628947e0691

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\70c156

                                      Filesize

                                      146B

                                      MD5

                                      9fc4181aca48cce7448e8d0da198b946

                                      SHA1

                                      e0d6a6df63b96e09a48e7079f2a09df5eb3b9110

                                      SHA256

                                      6e6b7a91ecc31620b1b48893b33de8cc9669f6dd22c8456f54c7a49ad5844953

                                      SHA512

                                      95144bb0d9a68f66e86660da964cb4c9224bf8b6d8d1e529f939930af8677f1f0b71e69a307b82b55a215564796405388cf59db70a14143570e902fb406bab40

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exe

                                      Filesize

                                      306KB

                                      MD5

                                      624adb0f45cbb9cadad83c264df98891

                                      SHA1

                                      e839ce1e0446d8da889935f411f0fb7ad54d4b3e

                                      SHA256

                                      8f401dc021e20ff3abc64a2d346ef6a792a5643ca04ffd1f297e417532acaa06

                                      SHA512

                                      b29b3a72cd32ee34ec6ce357818658b8a89c399e2f8439a7f49fb1a506ed912f41afa19bc5c142c9a4539acc5966a29c6a6637c23de0dc3e5f2d85264620bdba

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo.exe

                                      Filesize

                                      306KB

                                      MD5

                                      624adb0f45cbb9cadad83c264df98891

                                      SHA1

                                      e839ce1e0446d8da889935f411f0fb7ad54d4b3e

                                      SHA256

                                      8f401dc021e20ff3abc64a2d346ef6a792a5643ca04ffd1f297e417532acaa06

                                      SHA512

                                      b29b3a72cd32ee34ec6ce357818658b8a89c399e2f8439a7f49fb1a506ed912f41afa19bc5c142c9a4539acc5966a29c6a6637c23de0dc3e5f2d85264620bdba

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe

                                      Filesize

                                      343KB

                                      MD5

                                      efa2f8f73b3559711149dfdeb8bc288e

                                      SHA1

                                      453c70e4b12ecabe860866165ad39de6361215fd

                                      SHA256

                                      ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb

                                      SHA512

                                      63f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe

                                      Filesize

                                      343KB

                                      MD5

                                      efa2f8f73b3559711149dfdeb8bc288e

                                      SHA1

                                      453c70e4b12ecabe860866165ad39de6361215fd

                                      SHA256

                                      ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb

                                      SHA512

                                      63f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe

                                      Filesize

                                      343KB

                                      MD5

                                      efa2f8f73b3559711149dfdeb8bc288e

                                      SHA1

                                      453c70e4b12ecabe860866165ad39de6361215fd

                                      SHA256

                                      ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb

                                      SHA512

                                      63f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\PsInfo64.exe

                                      Filesize

                                      343KB

                                      MD5

                                      efa2f8f73b3559711149dfdeb8bc288e

                                      SHA1

                                      453c70e4b12ecabe860866165ad39de6361215fd

                                      SHA256

                                      ef5cf80c8448bf0907c634a3251cc348b1d36bb5ad8f31f23b11d12aa7f63bcb

                                      SHA512

                                      63f75a3d639a912e2e3966e9d410f8e1c52b75300518bb5083853ef2633c7e109c037ea2b66ced57bd5b319866a14bcd92254cb38ab9ec7b99465b0a8a8f5f3e

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\bohx.exe

                                      Filesize

                                      164KB

                                      MD5

                                      75375c22c72f1beb76bea39c22a1ed68

                                      SHA1

                                      e1652b058195db3f5f754b7ab430652ae04a50b8

                                      SHA256

                                      8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

                                      SHA512

                                      1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\bohx.exe

                                      Filesize

                                      164KB

                                      MD5

                                      75375c22c72f1beb76bea39c22a1ed68

                                      SHA1

                                      e1652b058195db3f5f754b7ab430652ae04a50b8

                                      SHA256

                                      8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

                                      SHA512

                                      1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\bohx.exe

                                      Filesize

                                      164KB

                                      MD5

                                      75375c22c72f1beb76bea39c22a1ed68

                                      SHA1

                                      e1652b058195db3f5f754b7ab430652ae04a50b8

                                      SHA256

                                      8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

                                      SHA512

                                      1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\caxh.zip

                                      Filesize

                                      996KB

                                      MD5

                                      9e73fb50d37e37ee8bd19a8e3d2b82ca

                                      SHA1

                                      3db1c548e86e4bb7457324a3097b05da15b7ffc3

                                      SHA256

                                      68ba7122ee8d9ce34ed94b6036a171ce38d6d9d9b3a609c2f4de773f4dd40d5c

                                      SHA512

                                      b41209300f018103b0f8a4de0537f348a3bdfcbc8feb19e7fec6634b06c266cc442145fd2d9230f827f273b0d07bb6bbcab7a0f0e9e1f558e6dd7a076f568094

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\cout

                                      Filesize

                                      17B

                                      MD5

                                      2fb06e7d194b236d2a1c48c9e19427b5

                                      SHA1

                                      c6bc50a41364af8cfc8b636eda62c39e8582a609

                                      SHA256

                                      d08f05765faf00c98d80ba8f9ce214d1d243bdca57e6f0257af61d876e1fc7f0

                                      SHA512

                                      ee05a6ba0a7f4838216f0c084c094c2f1d47fe8f40003ede4a80477631c100ca3171ee2e504fd69fc13482334d721f46614331dc20a6b66821d17de42879f522

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\cout

                                      Filesize

                                      17B

                                      MD5

                                      2fb06e7d194b236d2a1c48c9e19427b5

                                      SHA1

                                      c6bc50a41364af8cfc8b636eda62c39e8582a609

                                      SHA256

                                      d08f05765faf00c98d80ba8f9ce214d1d243bdca57e6f0257af61d876e1fc7f0

                                      SHA512

                                      ee05a6ba0a7f4838216f0c084c094c2f1d47fe8f40003ede4a80477631c100ca3171ee2e504fd69fc13482334d721f46614331dc20a6b66821d17de42879f522

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\mozglue.dll

                                      Filesize

                                      547KB

                                      MD5

                                      beee632711993fe38cf290a9d301df42

                                      SHA1

                                      5c4b214cf77b0e781124b8295ec55263b90d0707

                                      SHA256

                                      f7e8d6214a4ffc3188adf133fcbe9f036571a6b6c90718eadbb10339f27c9d9b

                                      SHA512

                                      c00ebcc7b12ec456046f95e128cf23636d9fa2af6877a4e994858f8f97088f569dbd720f130db243e0f6f382b60b9636a52d151435f8d65c7eaab3025b1af97f

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\mozglue.dll

                                      Filesize

                                      547KB

                                      MD5

                                      beee632711993fe38cf290a9d301df42

                                      SHA1

                                      5c4b214cf77b0e781124b8295ec55263b90d0707

                                      SHA256

                                      f7e8d6214a4ffc3188adf133fcbe9f036571a6b6c90718eadbb10339f27c9d9b

                                      SHA512

                                      c00ebcc7b12ec456046f95e128cf23636d9fa2af6877a4e994858f8f97088f569dbd720f130db243e0f6f382b60b9636a52d151435f8d65c7eaab3025b1af97f

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\myec.zip

                                      Filesize

                                      2.5MB

                                      MD5

                                      d0ccad58a5e4c21b6bce587c08df2cda

                                      SHA1

                                      572b8ced589727705e5d94bbb84e0a352cc4eec4

                                      SHA256

                                      2808f3a5fdeb645fd6fe999b7cec5ee370645060a41fe6545958b21f6d14b836

                                      SHA512

                                      7137067e405a2aa0f56b2520899718f039d4c6157ce7b27c79531d29889ae0972fc0ab25f59c9ea7cb1f67b962e03c7157e2da59b21d9b5f48fb1a423e23a79c

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\nss3.dll

                                      Filesize

                                      2.1MB

                                      MD5

                                      0cab66732ed0978c1c5d2c378613c504

                                      SHA1

                                      8d3102b25a1fd36e0f9d4a33f05da107065f0e7a

                                      SHA256

                                      101f57145ea784442b4bc267fdfcfab754ee664ca974138838ece9fc4bb4c84d

                                      SHA512

                                      cc49bf303158788023295fb406eec9886b44297e3be5d06a1f14d793d09bf66609025731b2c6c97ade17e9c8d4da480d4ba53ac427dcc459fcae9678b8f767da

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\nss3.dll

                                      Filesize

                                      2.1MB

                                      MD5

                                      0cab66732ed0978c1c5d2c378613c504

                                      SHA1

                                      8d3102b25a1fd36e0f9d4a33f05da107065f0e7a

                                      SHA256

                                      101f57145ea784442b4bc267fdfcfab754ee664ca974138838ece9fc4bb4c84d

                                      SHA512

                                      cc49bf303158788023295fb406eec9886b44297e3be5d06a1f14d793d09bf66609025731b2c6c97ade17e9c8d4da480d4ba53ac427dcc459fcae9678b8f767da

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out

                                      Filesize

                                      2KB

                                      MD5

                                      0decbf282d068a4c3885bfd2b5001fbf

                                      SHA1

                                      72aafcefc52f9fd43855f5f6ac20561fcd857fc6

                                      SHA256

                                      4299bbb35e9748a7961ef13ce67f8b01350b9626e8b0c3df415f6f1f0ad91dd0

                                      SHA512

                                      62f15a8d6f1596c43c74685922a3c4bc9965a3b484d36d367f4c3322076fab9ee17c35f8a17153704e480267c72883be32854ebbe2c877d748b5826e1c895de3

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\recon_out

                                      Filesize

                                      501B

                                      MD5

                                      45187f9eecb863f8e4f5a105bbda9dd7

                                      SHA1

                                      8a9095c123c8c29f22b7f08179b7fc920d5a49de

                                      SHA256

                                      18b71077751332514bd2d129fdbfe326d87d9ee361cbc09be021d468c794f10d

                                      SHA512

                                      330ef2e864e518bb4f25a253ec73244b1076d4e39af1ca126bd51b20df4ff3aab371a35be4f16cd5f7288f376a089dae50960c225752a7c8516f36901faa7a2d

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\sqlite3.dll

                                      Filesize

                                      936KB

                                      MD5

                                      9502f3ae1cc9398671edfd461275d78d

                                      SHA1

                                      61e7dbbc8b44db32fa9d3841275718dbd163cd45

                                      SHA256

                                      badca203e5d4d79d2107b9ec2c64547157288a43932bb973719375e9ed8d5d12

                                      SHA512

                                      79d5e5875218bbc6288500c29b72845fb6427b9cefe9916c13c3301c0c7e02c21a576a597e74532b41932ec4343a21599c252ad5b34c547650f9c5f817ab09eb

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\sqlite3.dll

                                      Filesize

                                      936KB

                                      MD5

                                      9502f3ae1cc9398671edfd461275d78d

                                      SHA1

                                      61e7dbbc8b44db32fa9d3841275718dbd163cd45

                                      SHA256

                                      badca203e5d4d79d2107b9ec2c64547157288a43932bb973719375e9ed8d5d12

                                      SHA512

                                      79d5e5875218bbc6288500c29b72845fb6427b9cefe9916c13c3301c0c7e02c21a576a597e74532b41932ec4343a21599c252ad5b34c547650f9c5f817ab09eb

                                    • C:\Users\Admin\AppData\Roaming\ZendeskStore\wun

                                      Filesize

                                      53B

                                      MD5

                                      c16330b5345b80ba27af8bfd4299904e

                                      SHA1

                                      9f573e303431e956395dc09c510c445ae55ef7d7

                                      SHA256

                                      d6306f25b6b4cf4d6a82a4bbb691932ad74730ec3d9a4c2d5ec90b1574d4bafe

                                      SHA512

                                      173f20932faf91348ae1b26bc99dffd4b438b6868921e5b5352fb1b513382203e49643dd2129b7365d570159dadf108440141d4d77193c1c6108a2140b9ce3f6

                                    • memory/840-195-0x000000000E620000-0x000000000EAA3000-memory.dmp

                                      Filesize

                                      4.5MB

                                    • memory/840-194-0x00000000031A0000-0x0000000003314000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/2464-202-0x0000000000400000-0x000000000046C000-memory.dmp

                                      Filesize

                                      432KB

                                    • memory/2464-199-0x0000000000400000-0x000000000046C000-memory.dmp

                                      Filesize

                                      432KB

                                    • memory/2464-201-0x0000000000400000-0x000000000046C000-memory.dmp

                                      Filesize

                                      432KB

                                    • memory/2516-289-0x0000000000BD0000-0x0000000000BEC000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/2516-295-0x0000000000BD0000-0x0000000000BEC000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/2516-291-0x0000000000BD0000-0x0000000000BEC000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/2516-296-0x0000000000520000-0x0000000000553000-memory.dmp

                                      Filesize

                                      204KB

                                    • memory/2732-133-0x0000000002C00000-0x0000000002D5C000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/2732-134-0x000000000D6A0000-0x000000000D9AC000-memory.dmp

                                      Filesize

                                      3.0MB

                                    • memory/3600-293-0x00000000023A0000-0x00000000023BC000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/3600-292-0x00000000005D0000-0x0000000000603000-memory.dmp

                                      Filesize

                                      204KB

                                    • memory/4116-197-0x000000000FA10000-0x000000000FE93000-memory.dmp

                                      Filesize

                                      4.5MB

                                    • memory/5004-135-0x0000000000400000-0x0000000000448000-memory.dmp

                                      Filesize

                                      288KB

                                    • memory/5004-137-0x0000000000400000-0x0000000000448000-memory.dmp

                                      Filesize

                                      288KB

                                    • memory/5004-138-0x0000000000400000-0x0000000000448000-memory.dmp

                                      Filesize

                                      288KB

                                    • memory/5004-175-0x0000000000400000-0x0000000000448000-memory.dmp

                                      Filesize

                                      288KB

                                    • memory/5004-193-0x0000000000400000-0x0000000000448000-memory.dmp

                                      Filesize

                                      288KB

                                    • memory/5004-191-0x0000000000400000-0x0000000000448000-memory.dmp

                                      Filesize

                                      288KB

                                    • memory/5036-215-0x0000000000400000-0x000000000046C000-memory.dmp

                                      Filesize

                                      432KB

                                    • memory/5068-277-0x0000000002950000-0x0000000002953000-memory.dmp

                                      Filesize

                                      12KB

                                    • memory/5068-284-0x0000000002970000-0x000000000298C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/5068-285-0x0000000000E00000-0x0000000000E33000-memory.dmp

                                      Filesize

                                      204KB

                                    • memory/5068-276-0x0000000002950000-0x0000000002952000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/5068-275-0x0000000002970000-0x000000000298C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/5068-273-0x0000000002970000-0x000000000298C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/5068-143-0x0000000000E00000-0x0000000000E33000-memory.dmp

                                      Filesize

                                      204KB