Analysis

  • max time kernel
    137s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2023, 23:40

General

  • Target

    a747ce455e6ea8ecaf0f76dfcf8a37db8048b7bf5627a9b13bf450573ff6affe.exe

  • Size

    5.2MB

  • MD5

    05a8019bdf62516860fd5396cfdf9039

  • SHA1

    ec32c6865859cb524ebe7e467a9debf009df070e

  • SHA256

    a747ce455e6ea8ecaf0f76dfcf8a37db8048b7bf5627a9b13bf450573ff6affe

  • SHA512

    81eba3b9f175dabf1c3f8c6fa1d1c624ab85071c37c5c632956546e620c4bfdefd9718af58f2e77855918af37da91012ed038a12bd639d07912d86c925dcde78

  • SSDEEP

    98304:ukRbqulaXDtAsK9lYyImLZmB/EXVefg/+RjgN0irZRblngETx:uqTkqs0fImLIBclf/IQ0iVnngwx

Malware Config

Extracted

Family

raccoon

Botnet

03c14357f4c11f70315c3388c896998d

C2

http://46.151.31.129

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a747ce455e6ea8ecaf0f76dfcf8a37db8048b7bf5627a9b13bf450573ff6affe.exe
    "C:\Users\Admin\AppData\Local\Temp\a747ce455e6ea8ecaf0f76dfcf8a37db8048b7bf5627a9b13bf450573ff6affe.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4180
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe" -h
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3824
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GbNUDZt.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\GbNUDZt.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3404
        • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\Engine.exe
          C:\Users\Admin\AppData\Local\Temp\SETUP_33345\Engine.exe /TH_ID=_708 /OriginExe="C:\Users\Admin\AppData\Local\Temp\RarSFX0\GbNUDZt.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4500
          • C:\Windows\SysWOW64\CmD.exe
            C:\Windows\system32\CmD.exe /c cmd < Occupied
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4108
            • C:\Windows\SysWOW64\cmd.exe
              cmd
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1920
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell get-process avastui
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4368
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell get-process avgui
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3208
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V /R "^UnderwearEyesScaryFields$" Transexual
                7⤵
                  PID:1484
                • C:\Users\Admin\AppData\Local\Temp\5l3uknh3.01k\4237\Grain.exe.pif
                  4237\\Grain.exe.pif 4237\\W
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:4564
                  • C:\Windows\SysWOW64\wscript.exe
                    C:\Windows\SysWOW64\wscript.exe
                    8⤵
                    • Blocklisted process makes network request
                    PID:5116
                • C:\Windows\SysWOW64\PING.EXE
                  ping localhost -n 8
                  7⤵
                  • Runs ping.exe
                  PID:2880
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pb1119.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\pb1119.exe"
          3⤵
          • Executes dropped EXE
          PID:628
      • C:\Users\Admin\AppData\Local\Temp\L.exe
        "C:\Users\Admin\AppData\Local\Temp\L.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1376
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1376 -s 2220
          3⤵
          • Program crash
          PID:3096
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 456 -p 1376 -ip 1376
      1⤵
        PID:4480
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1344
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
        1⤵
        • Drops desktop.ini file(s)
        • Checks processor information in registry
        • Modifies registry class
        PID:484
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
        1⤵
        • Checks processor information in registry
        • Modifies registry class
        PID:4448

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              1KB

              MD5

              def65711d78669d7f8e69313be4acf2e

              SHA1

              6522ebf1de09eeb981e270bd95114bc69a49cda6

              SHA256

              aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

              SHA512

              05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              18KB

              MD5

              9a15abeecf92c7db6b336bae48b1dea9

              SHA1

              c691112942a5761b9a53cc6a3046612c285c9788

              SHA256

              3da3085d94e7e340cf88e902d50ec7c5241906bbd1c6e0b85530204fdbe73ec7

              SHA512

              0b8278efc3e8b88aac8ac2b4b796ec32328a6534bdf4df391b13837649f45315799d4a411530db7cc8f6baebfe49b1889732167f4fdb8ff37da0277969687520

            • C:\Users\Admin\AppData\Local\Temp\5l3uknh3.01k\4237\Grain.exe.pif

              Filesize

              925KB

              MD5

              0162a97ed477353bc35776a7addffd5c

              SHA1

              10db8fe20bbce0f10517c510ec73532cf6feb227

              SHA256

              15600ccdef5a64b40d206d89234a51be1e11bd878dcefc5986590bcf40d9d571

              SHA512

              9638cab1aabe78c22a3d3528a391544f697d792640d831516b63fa52c393ee96bb588223e70163d059208cc5a14481c5ff7ef6ba9ac572322798a823d67f01f5

            • C:\Users\Admin\AppData\Local\Temp\5l3uknh3.01k\Transexual

              Filesize

              925KB

              MD5

              375056f44c0ede3036308d6207b370c0

              SHA1

              96ac5b94fd0504d20b381fb24a09a627e4bada3d

              SHA256

              c7631d6300f09402f3c37a0156658a21d282427716d04deb86305446edc7708f

              SHA512

              39a78437ab7b6936e4fa0534420e8016091b9e5533f86a5ce1000fb911cc8f99990b9bcd3693f3ea74c9319faa7b3f9ee9f6927b50272a8e7a9ce306fcc5d8d4

            • C:\Users\Admin\AppData\Local\Temp\File.exe

              Filesize

              5.2MB

              MD5

              3fe4f197e42f506da5c44cc328ad510c

              SHA1

              56171f4dc5ff2cc4fc24dd4ee4880374b23fb66b

              SHA256

              3782d02480d373b32486ed7186f8143ba6a538f3c6995db34425c5def5287225

              SHA512

              6491c4dd70314d8501d124c8f3af4f9aa34e5d3db6c61820ac27bc5d74b0b670b45cdb4a5b3426745a454839461d6d6f07e7a5b07a447c91d934fc83789b7c22

            • C:\Users\Admin\AppData\Local\Temp\File.exe

              Filesize

              5.2MB

              MD5

              3fe4f197e42f506da5c44cc328ad510c

              SHA1

              56171f4dc5ff2cc4fc24dd4ee4880374b23fb66b

              SHA256

              3782d02480d373b32486ed7186f8143ba6a538f3c6995db34425c5def5287225

              SHA512

              6491c4dd70314d8501d124c8f3af4f9aa34e5d3db6c61820ac27bc5d74b0b670b45cdb4a5b3426745a454839461d6d6f07e7a5b07a447c91d934fc83789b7c22

            • C:\Users\Admin\AppData\Local\Temp\File.exe

              Filesize

              5.2MB

              MD5

              3fe4f197e42f506da5c44cc328ad510c

              SHA1

              56171f4dc5ff2cc4fc24dd4ee4880374b23fb66b

              SHA256

              3782d02480d373b32486ed7186f8143ba6a538f3c6995db34425c5def5287225

              SHA512

              6491c4dd70314d8501d124c8f3af4f9aa34e5d3db6c61820ac27bc5d74b0b670b45cdb4a5b3426745a454839461d6d6f07e7a5b07a447c91d934fc83789b7c22

            • C:\Users\Admin\AppData\Local\Temp\L.exe

              Filesize

              8KB

              MD5

              14f22c47d4214a059d24811d02a5301b

              SHA1

              b86da97b566048ba5d855c024584c0d5985fe4ef

              SHA256

              22cb2ae130c391d07fd1115d16d7b76a43f041a8250287490855252062e0faf8

              SHA512

              77566dac1643a555ce7ebd211f9b086192a4362bb1371f608127e0102da3b3ff930bebb289dda00a6657c127b208f85117521bdc85e647ebf89fe412f4ea29c5

            • C:\Users\Admin\AppData\Local\Temp\L.exe

              Filesize

              8KB

              MD5

              14f22c47d4214a059d24811d02a5301b

              SHA1

              b86da97b566048ba5d855c024584c0d5985fe4ef

              SHA256

              22cb2ae130c391d07fd1115d16d7b76a43f041a8250287490855252062e0faf8

              SHA512

              77566dac1643a555ce7ebd211f9b086192a4362bb1371f608127e0102da3b3ff930bebb289dda00a6657c127b208f85117521bdc85e647ebf89fe412f4ea29c5

            • C:\Users\Admin\AppData\Local\Temp\L.exe

              Filesize

              8KB

              MD5

              14f22c47d4214a059d24811d02a5301b

              SHA1

              b86da97b566048ba5d855c024584c0d5985fe4ef

              SHA256

              22cb2ae130c391d07fd1115d16d7b76a43f041a8250287490855252062e0faf8

              SHA512

              77566dac1643a555ce7ebd211f9b086192a4362bb1371f608127e0102da3b3ff930bebb289dda00a6657c127b208f85117521bdc85e647ebf89fe412f4ea29c5

            • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe

              Filesize

              53KB

              MD5

              aa90b2f88c2ea6fb34057064eec85cda

              SHA1

              b790430a0b47c9f38d715423e0a03cebee217007

              SHA256

              3c2616f1423e59df12e2af1843690af97d7562faf80a7af433f4052334497aa1

              SHA512

              d4cf8e40898355b923faf49730f902ff77f5e5b5b66b80ed0966f068384bdd314823cc399e25bb40452b2578e6fdf22553848961f2ff61dac10a15e94e7e1e71

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GbNUDZt.exe

              Filesize

              1.4MB

              MD5

              6412305505fdd694d6e58c06bd886f3a

              SHA1

              83b3a47e991763c8b05fead5899186b9d65ea03f

              SHA256

              a3d519f2d07931b69a0d77d3f384c8ab2cd5d807dd1e3c969db44188fd42d2b8

              SHA512

              6b6afd298f5d80e0f5e5be0986e5dd4d5cc82c87b4db7f9dc93369ad8e0b724386d962e5732c67e92477788f8704ea13eb55080c0df0eb9a832c87f645938e9f

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GbNUDZt.exe

              Filesize

              1.4MB

              MD5

              6412305505fdd694d6e58c06bd886f3a

              SHA1

              83b3a47e991763c8b05fead5899186b9d65ea03f

              SHA256

              a3d519f2d07931b69a0d77d3f384c8ab2cd5d807dd1e3c969db44188fd42d2b8

              SHA512

              6b6afd298f5d80e0f5e5be0986e5dd4d5cc82c87b4db7f9dc93369ad8e0b724386d962e5732c67e92477788f8704ea13eb55080c0df0eb9a832c87f645938e9f

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GbNUDZt.exe

              Filesize

              1.4MB

              MD5

              6412305505fdd694d6e58c06bd886f3a

              SHA1

              83b3a47e991763c8b05fead5899186b9d65ea03f

              SHA256

              a3d519f2d07931b69a0d77d3f384c8ab2cd5d807dd1e3c969db44188fd42d2b8

              SHA512

              6b6afd298f5d80e0f5e5be0986e5dd4d5cc82c87b4db7f9dc93369ad8e0b724386d962e5732c67e92477788f8704ea13eb55080c0df0eb9a832c87f645938e9f

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pb1119.exe

              Filesize

              3.5MB

              MD5

              942108639dd6138887ea5e06d6a71703

              SHA1

              086aa5cac15091a362dfd1fe1f30538102decb5b

              SHA256

              fc6636a724e686fe96f9876744d67083581e3788ca63e05750deeeb109cd246e

              SHA512

              9aa5f849439af19ff5b810160797c787bfd268b0109a7db32b18ad54df4014d52f0b2896f82f3709ea96f66d45b24917e5a4d4dd82858a4c35cf129854c505b8

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pb1119.exe

              Filesize

              3.5MB

              MD5

              942108639dd6138887ea5e06d6a71703

              SHA1

              086aa5cac15091a362dfd1fe1f30538102decb5b

              SHA256

              fc6636a724e686fe96f9876744d67083581e3788ca63e05750deeeb109cd246e

              SHA512

              9aa5f849439af19ff5b810160797c787bfd268b0109a7db32b18ad54df4014d52f0b2896f82f3709ea96f66d45b24917e5a4d4dd82858a4c35cf129854c505b8

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pb1119.exe

              Filesize

              3.5MB

              MD5

              942108639dd6138887ea5e06d6a71703

              SHA1

              086aa5cac15091a362dfd1fe1f30538102decb5b

              SHA256

              fc6636a724e686fe96f9876744d67083581e3788ca63e05750deeeb109cd246e

              SHA512

              9aa5f849439af19ff5b810160797c787bfd268b0109a7db32b18ad54df4014d52f0b2896f82f3709ea96f66d45b24917e5a4d4dd82858a4c35cf129854c505b8

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe

              Filesize

              312KB

              MD5

              682c776cb8378d64cf7bd7d99bc70a74

              SHA1

              8eb31ba99292296b4d202732975424f83c579735

              SHA256

              78a8fd6b7c531a9125348ab867d72475d73e99e13955a6b45fc5070b58ebdc6c

              SHA512

              bb53dd532d4ea426439627f765815d2d4134f6467431a83ca6a49637cd0673929dbdc703078225e88f2bf2e996c6a1be9959e20ddfccf4111351238919cce514

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe

              Filesize

              312KB

              MD5

              682c776cb8378d64cf7bd7d99bc70a74

              SHA1

              8eb31ba99292296b4d202732975424f83c579735

              SHA256

              78a8fd6b7c531a9125348ab867d72475d73e99e13955a6b45fc5070b58ebdc6c

              SHA512

              bb53dd532d4ea426439627f765815d2d4134f6467431a83ca6a49637cd0673929dbdc703078225e88f2bf2e996c6a1be9959e20ddfccf4111351238919cce514

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe

              Filesize

              312KB

              MD5

              682c776cb8378d64cf7bd7d99bc70a74

              SHA1

              8eb31ba99292296b4d202732975424f83c579735

              SHA256

              78a8fd6b7c531a9125348ab867d72475d73e99e13955a6b45fc5070b58ebdc6c

              SHA512

              bb53dd532d4ea426439627f765815d2d4134f6467431a83ca6a49637cd0673929dbdc703078225e88f2bf2e996c6a1be9959e20ddfccf4111351238919cce514

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wanglei.exe

              Filesize

              312KB

              MD5

              682c776cb8378d64cf7bd7d99bc70a74

              SHA1

              8eb31ba99292296b4d202732975424f83c579735

              SHA256

              78a8fd6b7c531a9125348ab867d72475d73e99e13955a6b45fc5070b58ebdc6c

              SHA512

              bb53dd532d4ea426439627f765815d2d4134f6467431a83ca6a49637cd0673929dbdc703078225e88f2bf2e996c6a1be9959e20ddfccf4111351238919cce514

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00000#Ad

              Filesize

              194KB

              MD5

              3ed9b1a61fcc77a7b83c1504d2f9af00

              SHA1

              054825d10ebecc3030684aa4895d1a9cadbf6da2

              SHA256

              9344a0322834bd3694f5061abcb64dc31476882e4235a990f5cdfc2905194be6

              SHA512

              454e77a373d92c6f8328aeec462c2e2d5516b2e1937132781644aadc9993f1a6edafe8ff90ea77139c5fc3ced4ec194ee9c62e15d45fae49135d081310a227ad

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00001#Annotation

              Filesize

              17KB

              MD5

              a147f19a6921f8ed9c1a1f19c7441db7

              SHA1

              497ffbc252a5fefc10d8e434e072dc65050cca4b

              SHA256

              9289d7ccbe172880df789433151f20dabe30e39e8ad22daa7c26807540fd01a0

              SHA512

              74debdf588b5e37790c6a443e89abf651c233a480359efd4d93e20ca2c1d8b0c3a178bb1088e77296d68c280beea9bc55a2bc826a238cd3b64035fda8194050a

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00002#Arrangements

              Filesize

              125KB

              MD5

              4ff934b60baf0b192ba61f906557363f

              SHA1

              dfc3d58d90d3097cf05ac7ae748d53ce893125be

              SHA256

              bc9764942f624b6e5442105f2caed05100296bb9e7619a46d0c4862ebc3ac7be

              SHA512

              6496bd06f2d3e6641a6def538bf3893a6c4c45fb43a11f87b4f3e0c0f8f129990e1731a33f6e637e9dd5ec7c67311d51502d7868bb491430c9265622af05d52e

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00003#Charge

              Filesize

              165KB

              MD5

              e2f921dec925fca6a475164649409122

              SHA1

              d74f1511026ce66969ded8b114cf9f8f30411eaf

              SHA256

              68cbca3fc06c0077bd3265247c5211a43fe4b1dfc38b07cfc14fe870841affde

              SHA512

              f32d497eeb8e889c01a093ad968d5cb39a9e9014f19f9d837c6ba07c731286009da594689df9891b3994b962733f4187c29b50a1028424ae553675c9c385d688

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00004#Cyprus

              Filesize

              20KB

              MD5

              6b6e836873c6a4c5235afe164abbbbc5

              SHA1

              8337435705d317445b3ba9f0e9aca4f4af0c7912

              SHA256

              34498e21da9f02af76d2e197df914ebc76b78f03a7d17ffda653a6fe7b4f48fd

              SHA512

              552d70112c2e5b8cd515556505ec83b285bb2119c820f907e3bd819f8b55cab9a9d54385c7f04dbf6b4e1280947562af6b3b65e12239c43e14999142da8bec37

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00005#Damages

              Filesize

              77KB

              MD5

              803929b08b1390406072e6c23a2825a1

              SHA1

              2bd1ef4e748a1fae0bcbca1d6119329b54cbb181

              SHA256

              f127768fff18fbb57cea39e7df51db63f525270a0be51a58a1d6b51d8124b129

              SHA512

              f64080907269177b7cb5ba7dc6f1f54d57c7c9c42a3b8991a2e9d5653c8c7a8aa47f2ef0c03ea2aa2ed9ef8bc5350d35d481dec46155226b0cd96ef4652c5ec2

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00006#Looked

              Filesize

              51KB

              MD5

              76cc1649c6142537616fd2aa163a547c

              SHA1

              64af218cd5aa55ae3afeeca8efb373e1181f7987

              SHA256

              03e2e6c3113c4f1a8f2b9472eb030d37973f191718ab48d0491744c0bce23d9a

              SHA512

              3e0e15fd917d8bbb17fd84e2a718c77c671c3aeeb545ad2be67daaed5a9024139924db69afc3d4f3d052483d494301a4a752f6cfcdc66b2ecc6339efe9963b0d

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00007#Occupied

              Filesize

              13KB

              MD5

              2103199aa9b1e5d71168707d15a64f4f

              SHA1

              cda0db83c74639b85b2498f21ca1389eb6ae85c3

              SHA256

              5e183746a9392ab042f73ef00e883151237a9e7a6c5bf3ff653d27c53c5c0a66

              SHA512

              7af70a42cc178be0cded79f17346d481b3de9c3db76356cf95ab40dff50571f2ee3f1026c6095a02c3d1c39a015e480c7f7558a9a5cd8717fde4f27efbc6dfc2

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00008#Oklahoma

              Filesize

              1.0MB

              MD5

              973ee95c6c80409906242e10b3f496a5

              SHA1

              1263b02e0bc2acb35cf006a70f6b2096158f31e0

              SHA256

              c021e734546b5ffe901c2069687964695e077fd1d4401aec381b550ae8f6d558

              SHA512

              abb6b1b6b83f8882fda49075df3ff36b8132dd04b41cd710eea5d4302afcad6fed474f2c33f0e4e07de415920209e6425de18bc42ce32af7c039c89f26e30b75

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00009#Oriental

              Filesize

              152KB

              MD5

              6ea4d5fa1f0da055f33c91312d9384e6

              SHA1

              ec9d01d56414f612bc2086164d9beade09f0ee68

              SHA256

              57a3c130cac7ca263804e49e1be1b8db8aa4069f0f92039b666a509faa594418

              SHA512

              5331550d8556d915c84d079def504f0ed381453490a42e3603069cbad6c5ec7c3d231ac6b4faff04e28a20584c44c8479f57d6f1b25449f2fa5e6c4f37e98f7c

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00010#Sen

              Filesize

              82KB

              MD5

              3449b18810ed8e0bd4a954ee9abf3f72

              SHA1

              b35b117d376c25d0a0d7fe6d72b8372d247e9595

              SHA256

              3a43c768fc7a761bd8911d0c0abda712d2945b3f6c346c2a81e46e1bd9ab4724

              SHA512

              ca02f4fcc4fe9802948d9b443765570d441561cc8489d228d687755b7a9c5d77f21f292c3a15c398df1ec53445c42dc8feab30f026466a15fab31b42f50f8738

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\00011#Wayne

              Filesize

              42KB

              MD5

              3f6b69df7a7ab60ce6375f9b45f4f2dc

              SHA1

              aab4d8dc228aa1688566a162b4bbb4b46035b4e4

              SHA256

              b977d364832c35df7ee99f3d96c6cc895d728e5a39b82ba4a3f5db92da00f23a

              SHA512

              8313a8bdf75b8e0dc3773e90751a262e9e2dc1a0dc444bca652296783168fe06d44488cdb89548cd63b043eb3d9b31d5034c3c0e12a69bc6f9f978776bb3fbb5

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\Engine.exe

              Filesize

              392KB

              MD5

              015e6a521be57db8b0e599125fe90250

              SHA1

              fdb129f0af48b3a271ef12b3ca4865905d3d3359

              SHA256

              02cf0b3b479ca913d0cc44124db2d7e0f46daf36bb67bc7af072d492f214fa1e

              SHA512

              7237433c6184f930c62c438c93e1e19906ee3b1e6fbeb233273b16fb81a784010525decf705166190443aebf11f4730280c131fc11007972e7333fd10afd92e1

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\Engine.exe

              Filesize

              392KB

              MD5

              015e6a521be57db8b0e599125fe90250

              SHA1

              fdb129f0af48b3a271ef12b3ca4865905d3d3359

              SHA256

              02cf0b3b479ca913d0cc44124db2d7e0f46daf36bb67bc7af072d492f214fa1e

              SHA512

              7237433c6184f930c62c438c93e1e19906ee3b1e6fbeb233273b16fb81a784010525decf705166190443aebf11f4730280c131fc11007972e7333fd10afd92e1

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\Modern_Icon.bmp

              Filesize

              7KB

              MD5

              1dd88f67f029710d5c5858a6293a93f1

              SHA1

              3e5ef66613415fe9467b2a24ccc27d8f997e7df6

              SHA256

              b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532

              SHA512

              7071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94

            • C:\Users\Admin\AppData\Local\Temp\SETUP_33345\Setup.txt

              Filesize

              2KB

              MD5

              62de4c903ff1e8d7e26893a26f86e8ec

              SHA1

              018024e4f10c8388338fbdbead6f713aea5e53c6

              SHA256

              c87a163caca09355a313609869886730ab0d0ec59f5001fd4e168481d8ea2a75

              SHA512

              7e9f01d418c8107ba6b4865ed17e55e313f43eafcdc0fbc2cec6294c07a21fb430ed996d850c3bf3a4403d68a71ea76d14d1f221bdb6bf0e7ada6381c7cb075c

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rpw03rhp.0bh.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\Videos\Captures\desktop.ini

              Filesize

              190B

              MD5

              b0d27eaec71f1cd73b015f5ceeb15f9d

              SHA1

              62264f8b5c2f5034a1e4143df6e8c787165fbc2f

              SHA256

              86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

              SHA512

              7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

            • memory/628-304-0x0000000140000000-0x0000000140624000-memory.dmp

              Filesize

              6.1MB

            • memory/1376-153-0x00000000007A0000-0x00000000007A8000-memory.dmp

              Filesize

              32KB

            • memory/1376-155-0x000000001B2A0000-0x000000001B2B0000-memory.dmp

              Filesize

              64KB

            • memory/1644-133-0x0000000000FD0000-0x0000000001504000-memory.dmp

              Filesize

              5.2MB

            • memory/3208-282-0x00000000021C0000-0x00000000021D0000-memory.dmp

              Filesize

              64KB

            • memory/3208-281-0x00000000021C0000-0x00000000021D0000-memory.dmp

              Filesize

              64KB

            • memory/3404-296-0x0000000000400000-0x000000000043B000-memory.dmp

              Filesize

              236KB

            • memory/3404-263-0x0000000000400000-0x000000000043B000-memory.dmp

              Filesize

              236KB

            • memory/4368-265-0x0000000006240000-0x000000000625A000-memory.dmp

              Filesize

              104KB

            • memory/4368-249-0x00000000048E0000-0x00000000048F0000-memory.dmp

              Filesize

              64KB

            • memory/4368-267-0x00000000072F0000-0x0000000007894000-memory.dmp

              Filesize

              5.6MB

            • memory/4368-246-0x00000000047B0000-0x00000000047E6000-memory.dmp

              Filesize

              216KB

            • memory/4368-247-0x0000000004F20000-0x0000000005548000-memory.dmp

              Filesize

              6.2MB

            • memory/4368-264-0x00000000062C0000-0x0000000006356000-memory.dmp

              Filesize

              600KB

            • memory/4368-262-0x0000000005D70000-0x0000000005D8E000-memory.dmp

              Filesize

              120KB

            • memory/4368-257-0x0000000005730000-0x0000000005796000-memory.dmp

              Filesize

              408KB

            • memory/4368-248-0x00000000048E0000-0x00000000048F0000-memory.dmp

              Filesize

              64KB

            • memory/4368-266-0x0000000006290000-0x00000000062B2000-memory.dmp

              Filesize

              136KB

            • memory/4368-251-0x00000000056C0000-0x0000000005726000-memory.dmp

              Filesize

              408KB

            • memory/4368-250-0x0000000004D90000-0x0000000004DB2000-memory.dmp

              Filesize

              136KB

            • memory/4500-293-0x0000000000400000-0x0000000000558000-memory.dmp

              Filesize

              1.3MB

            • memory/4500-288-0x0000000000A10000-0x0000000000A11000-memory.dmp

              Filesize

              4KB

            • memory/4500-286-0x0000000000400000-0x0000000000558000-memory.dmp

              Filesize

              1.3MB

            • memory/4500-217-0x0000000000400000-0x0000000000558000-memory.dmp

              Filesize

              1.3MB

            • memory/4500-218-0x0000000000A10000-0x0000000000A11000-memory.dmp

              Filesize

              4KB

            • memory/4564-308-0x0000000003BC0000-0x0000000003BC1000-memory.dmp

              Filesize

              4KB

            • memory/5116-309-0x0000000000400000-0x000000000041E000-memory.dmp

              Filesize

              120KB

            • memory/5116-311-0x0000000000400000-0x000000000041E000-memory.dmp

              Filesize

              120KB