Analysis

  • max time kernel
    142s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2023 14:29

General

  • Target

    e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641.exe

  • Size

    320KB

  • MD5

    1359c6354ca6f617b36c738abdb993bb

  • SHA1

    b0c6aff2a1725520bf76755375c2900ccfb2f742

  • SHA256

    e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

  • SHA512

    d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

  • SSDEEP

    3072:0OXQ2G+IpQZQne73qe8UzT+nWwXjDRJWwXjDRgjDRbL7oZC:7vGlpQE4qNUzCr

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Discovers systems in the same network 1 TTPs 4 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641.exe
    "C:\Users\Admin\AppData\Local\Temp\e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641.exe
      C:\Users\Admin\AppData\Local\Temp\e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\ProgramData\Application Data\wmimgmt.exe
        "C:\ProgramData\Application Data\wmimgmt.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\ProgramData\Application Data\wmimgmt.exe
          "C:\ProgramData\Application Data\wmimgmt.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:552
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /v:on /c "C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\ghi.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:624
            • C:\Windows\SysWOW64\findstr.exe
              findstr /s "YM.CGP_" "C:\Users\Admin"\..\*.txt
              6⤵
                PID:1768
              • C:\Windows\SysWOW64\chcp.com
                chcp
                6⤵
                  PID:868
                • C:\Windows\SysWOW64\net.exe
                  net user
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1508
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 user
                    7⤵
                      PID:1488
                  • C:\Windows\SysWOW64\net.exe
                    net localgroup administrators
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1728
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 localgroup administrators
                      7⤵
                        PID:1660
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      6⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1360
                    • C:\Windows\SysWOW64\systeminfo.exe
                      systeminfo
                      6⤵
                      • Gathers system information
                      PID:1860
                    • C:\Windows\SysWOW64\reg.exe
                      reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer"
                      6⤵
                        PID:268
                      • C:\Windows\SysWOW64\find.exe
                        find "REG_"
                        6⤵
                          PID:1644
                        • C:\Windows\SysWOW64\reg.exe
                          reg query HKEY_CURRENT_USER\Software\Microsoft\Office
                          6⤵
                            PID:1148
                          • C:\Windows\SysWOW64\reg.exe
                            reg query HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Common\UserInfo
                            6⤵
                              PID:1384
                            • C:\Windows\SysWOW64\reg.exe
                              reg query HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Common\UserInfo
                              6⤵
                                PID:1088
                              • C:\Windows\SysWOW64\reg.exe
                                reg query HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Common\UserInfo
                                6⤵
                                  PID:1848
                                • C:\Windows\SysWOW64\reg.exe
                                  reg query HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Common\UserInfo
                                  6⤵
                                    PID:1432
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg query HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Common\UserInfo
                                    6⤵
                                      PID:1376
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg query HKEY_CURRENT_USER\Software\Microsoft\Office\13.0\Common\UserInfo
                                      6⤵
                                        PID:1828
                                      • C:\Windows\SysWOW64\ipconfig.exe
                                        ipconfig /all
                                        6⤵
                                        • Gathers network information
                                        PID:292
                                      • C:\Windows\SysWOW64\NETSTAT.EXE
                                        netstat -ano
                                        6⤵
                                        • Gathers network information
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:880
                                      • C:\Windows\SysWOW64\ARP.EXE
                                        arp -a
                                        6⤵
                                          PID:108
                                        • C:\Windows\SysWOW64\NETSTAT.EXE
                                          netstat -r
                                          6⤵
                                          • Gathers network information
                                          PID:1992
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print
                                            7⤵
                                              PID:1556
                                              • C:\Windows\SysWOW64\ROUTE.EXE
                                                C:\Windows\system32\route.exe print
                                                8⤵
                                                  PID:1940
                                            • C:\Windows\SysWOW64\net.exe
                                              net start
                                              6⤵
                                                PID:836
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 start
                                                  7⤵
                                                    PID:1400
                                                • C:\Windows\SysWOW64\net.exe
                                                  net use
                                                  6⤵
                                                    PID:328
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo n"
                                                    6⤵
                                                      PID:1520
                                                    • C:\Windows\SysWOW64\net.exe
                                                      net share
                                                      6⤵
                                                        PID:1680
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 share
                                                          7⤵
                                                            PID:952
                                                        • C:\Windows\SysWOW64\net.exe
                                                          net view /domain
                                                          6⤵
                                                          • Discovers systems in the same network
                                                          PID:1308
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\\s.log "
                                                          6⤵
                                                            PID:768
                                                          • C:\Windows\SysWOW64\find.exe
                                                            find /i /v "------"
                                                            6⤵
                                                              PID:1496
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\\t.log "
                                                              6⤵
                                                                PID:1748
                                                              • C:\Windows\SysWOW64\find.exe
                                                                find /i /v "domain"
                                                                6⤵
                                                                  PID:664
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\\s.log "
                                                                  6⤵
                                                                    PID:1144
                                                                  • C:\Windows\SysWOW64\find.exe
                                                                    find /i /v "¬A╛╣"
                                                                    6⤵
                                                                      PID:912
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\\t.log "
                                                                      6⤵
                                                                        PID:1148
                                                                      • C:\Windows\SysWOW64\find.exe
                                                                        find /i /v "░⌡ªµª¿"
                                                                        6⤵
                                                                          PID:908
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\\s.log "
                                                                          6⤵
                                                                            PID:2036
                                                                          • C:\Windows\SysWOW64\find.exe
                                                                            find /i /v "├ⁿ┴ε"
                                                                            6⤵
                                                                              PID:1996
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\\t.log "
                                                                              6⤵
                                                                                PID:1820
                                                                              • C:\Windows\SysWOW64\find.exe
                                                                                find /i /v "completed successfully"
                                                                                6⤵
                                                                                  PID:1432
                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                  net view /domain:"WORKGROUP"
                                                                                  6⤵
                                                                                  • Discovers systems in the same network
                                                                                  PID:1828
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\\workgrp.tmp "
                                                                                  6⤵
                                                                                    PID:692
                                                                                  • C:\Windows\SysWOW64\find.exe
                                                                                    find "\\"
                                                                                    6⤵
                                                                                      PID:752
                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                      net view \\THEQWNRW
                                                                                      6⤵
                                                                                      • Discovers systems in the same network
                                                                                      PID:1744
                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                      net view \\THEQWNRW
                                                                                      6⤵
                                                                                      • Discovers systems in the same network
                                                                                      PID:1768
                                                                                    • C:\Windows\SysWOW64\find.exe
                                                                                      find "Disk"
                                                                                      6⤵
                                                                                        PID:1400
                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                        ping -n 1 THEQWNRW
                                                                                        6⤵
                                                                                        • Runs ping.exe
                                                                                        PID:328
                                                                                      • C:\Windows\SysWOW64\findstr.exe
                                                                                        findstr /i "Pinging Reply Request Unknown"
                                                                                        6⤵
                                                                                          PID:1092

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v6

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\ProgramData\Application Data\wmimgmt.exe

                                                                                Filesize

                                                                                320KB

                                                                                MD5

                                                                                1359c6354ca6f617b36c738abdb993bb

                                                                                SHA1

                                                                                b0c6aff2a1725520bf76755375c2900ccfb2f742

                                                                                SHA256

                                                                                e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

                                                                                SHA512

                                                                                d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

                                                                              • C:\ProgramData\wmimgmt.exe

                                                                                Filesize

                                                                                320KB

                                                                                MD5

                                                                                1359c6354ca6f617b36c738abdb993bb

                                                                                SHA1

                                                                                b0c6aff2a1725520bf76755375c2900ccfb2f742

                                                                                SHA256

                                                                                e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

                                                                                SHA512

                                                                                d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

                                                                              • C:\ProgramData\wmimgmt.exe

                                                                                Filesize

                                                                                320KB

                                                                                MD5

                                                                                1359c6354ca6f617b36c738abdb993bb

                                                                                SHA1

                                                                                b0c6aff2a1725520bf76755375c2900ccfb2f742

                                                                                SHA256

                                                                                e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

                                                                                SHA512

                                                                                d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

                                                                              • C:\ProgramData\wmimgmt.exe

                                                                                Filesize

                                                                                320KB

                                                                                MD5

                                                                                1359c6354ca6f617b36c738abdb993bb

                                                                                SHA1

                                                                                b0c6aff2a1725520bf76755375c2900ccfb2f742

                                                                                SHA256

                                                                                e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

                                                                                SHA512

                                                                                d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\INFO.TXT

                                                                                Filesize

                                                                                24.8MB

                                                                                MD5

                                                                                dd4a7a40c21d747321fe8d52a0322aa6

                                                                                SHA1

                                                                                0ceb63a4f0d006a5b2c440de2c3d98e078f741d8

                                                                                SHA256

                                                                                a130eb9486413d5e560f7c902a18afa5da55e946db13882cad35e026ba89720e

                                                                                SHA512

                                                                                97b86978f899d71d2e22b76a390888b9b9a1ca415afcc942ffe2692cc82df67bcbd760663fd0973a6493f02a34c136dfb6b0b864c1d32210e2b302c76216c1b1

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\INFO.TXT

                                                                                Filesize

                                                                                7KB

                                                                                MD5

                                                                                ac753810b6ca3b5ad8780fcc13ccae84

                                                                                SHA1

                                                                                1de7e96c8d56f7c54f677f40adf64776b0cfda1a

                                                                                SHA256

                                                                                9470b1c06238b955f13459c3df551ef772d6300ca57701518e4e481499575aba

                                                                                SHA512

                                                                                60b9548452b7eff45a9670ebe231a16aea3211434569e3ff8fee3389228185a7aa3b28352c286a5d3a7f8b53c409d6b9ee249c70ecb273fee624ca266ada8d31

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\drivers.p

                                                                                Filesize

                                                                                10B

                                                                                MD5

                                                                                3594ed70083b6e10efbfbcd4142b6454

                                                                                SHA1

                                                                                59b91832fc3778d2dba62642935c61fb768c760c

                                                                                SHA256

                                                                                c1aead592e2eb892263a7b1a7ca36484c73013be81dda18ccbe6a35138799823

                                                                                SHA512

                                                                                418466d5b10ba557bdb229cfcf7e190e7cedd9fd52a72e2591f78fc1c5c983b04c60c9307e8919c3d7e366d71c54a325d4f20e4ad4850677b115ca9c562d0586

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\ghi.bat

                                                                                Filesize

                                                                                3KB

                                                                                MD5

                                                                                8c6085bd713786647b4b4d9d14a14f0f

                                                                                SHA1

                                                                                6f6d5ce899e8ce5ea36662793ad768f7daf466e5

                                                                                SHA256

                                                                                a805b09be4a2503d73876264fa7a489e1efee619bbf7197c4ee8b084fbb1afbc

                                                                                SHA512

                                                                                c5e1a18fb945015746dcff969ea5dfe91497cdc756e3d8193518645ce7cb51de816338ba6a514f285bc1794d84e416b76485222e49409e5554a416ca29c5de10

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\s.log

                                                                                Filesize

                                                                                153B

                                                                                MD5

                                                                                b256c8a481b065860c2812e742f50250

                                                                                SHA1

                                                                                51ddf02764fb12d88822450e8a27f9deac85fe54

                                                                                SHA256

                                                                                b167a692a2ff54cc5625797ddc367ba8736797130b93961d68b9150aef2f0e12

                                                                                SHA512

                                                                                f425ae70449d16bdb05fcc7913744fb0a81ab81278735d77ce316007b8298ad3c3991a29af67b336420f7dca94702271e59186174b5b78b5cdab1f8ce0163360

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\s.log

                                                                                Filesize

                                                                                64B

                                                                                MD5

                                                                                e29f80bf6f6a756e0bc6d7f5189a9bb2

                                                                                SHA1

                                                                                acdd1032b7dc189f8e68b390fe6fd964618acd72

                                                                                SHA256

                                                                                8bfe9f81e5c82cbfe69203c993009c22f940f20727fa8cb43773958bf0eba7c7

                                                                                SHA512

                                                                                f390fc82bdeb43721aa08f3666a4ed7d9ad4a5c1ff91be6967336417a5a5b7968b945773f68effcbe961072b801c3681455cf98b956cd802eba24190bd54268e

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\s.log

                                                                                Filesize

                                                                                64B

                                                                                MD5

                                                                                e29f80bf6f6a756e0bc6d7f5189a9bb2

                                                                                SHA1

                                                                                acdd1032b7dc189f8e68b390fe6fd964618acd72

                                                                                SHA256

                                                                                8bfe9f81e5c82cbfe69203c993009c22f940f20727fa8cb43773958bf0eba7c7

                                                                                SHA512

                                                                                f390fc82bdeb43721aa08f3666a4ed7d9ad4a5c1ff91be6967336417a5a5b7968b945773f68effcbe961072b801c3681455cf98b956cd802eba24190bd54268e

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\t.log

                                                                                Filesize

                                                                                72B

                                                                                MD5

                                                                                59f2768506355d8bc50979f6d64ded26

                                                                                SHA1

                                                                                b2d315b3857bec8335c526a08d08d6a1b5f5c151

                                                                                SHA256

                                                                                7f9f3cbab32b3a5022bed245092835cb12502fa2e79d85c8c45d478918ee6569

                                                                                SHA512

                                                                                e9aa231d19cb5f93711cd3ffee4a6bd8764b21249ed7eb06ff34bcb457cd075384a0858ea35a99280bff16c01875a4ed79598a6503fcf5262da6f0849b5b1028

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\t.log

                                                                                Filesize

                                                                                64B

                                                                                MD5

                                                                                e29f80bf6f6a756e0bc6d7f5189a9bb2

                                                                                SHA1

                                                                                acdd1032b7dc189f8e68b390fe6fd964618acd72

                                                                                SHA256

                                                                                8bfe9f81e5c82cbfe69203c993009c22f940f20727fa8cb43773958bf0eba7c7

                                                                                SHA512

                                                                                f390fc82bdeb43721aa08f3666a4ed7d9ad4a5c1ff91be6967336417a5a5b7968b945773f68effcbe961072b801c3681455cf98b956cd802eba24190bd54268e

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\t.log

                                                                                Filesize

                                                                                64B

                                                                                MD5

                                                                                e29f80bf6f6a756e0bc6d7f5189a9bb2

                                                                                SHA1

                                                                                acdd1032b7dc189f8e68b390fe6fd964618acd72

                                                                                SHA256

                                                                                8bfe9f81e5c82cbfe69203c993009c22f940f20727fa8cb43773958bf0eba7c7

                                                                                SHA512

                                                                                f390fc82bdeb43721aa08f3666a4ed7d9ad4a5c1ff91be6967336417a5a5b7968b945773f68effcbe961072b801c3681455cf98b956cd802eba24190bd54268e

                                                                              • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\workgrp.tmp

                                                                                Filesize

                                                                                234B

                                                                                MD5

                                                                                6008c4c4316d22b5405bcf96b466f55b

                                                                                SHA1

                                                                                1cc8d2c4e41c6f397efa99ae66f2a8ec8629fc8c

                                                                                SHA256

                                                                                7e7a6d8ba9f82726a5bee20ff795d2722fff086ace9ef7ff7f5a4507d12621c2

                                                                                SHA512

                                                                                4970d83af26f5be65e7ac08543c7b4e7dd0c812383d74097dacb3a4335876422272d880a3eac5e9fc486c18013a622a02638a03326de4160aca5f857d05d70b2

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\INFO.TXT

                                                                                Filesize

                                                                                43B

                                                                                MD5

                                                                                ac38cac520b6c72ec515c284c11d96ec

                                                                                SHA1

                                                                                11c8c679c26f472c61c2a2851e949de57f203326

                                                                                SHA256

                                                                                8f1f1996fa297ffe91579a3b17e8ac81ed4f7964702f94e7a6246b600354242f

                                                                                SHA512

                                                                                352405fb67674c59c52fabdf847bdf5906350c128e1b2c80ab2d68fde4f5c09f1d1f7ec6ac6ade6f0816143a778fbf69c86b94744ca568062d935ba61940bf5e

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\INFO.TXT

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                b9b3d7303e5fa8fbbcaf450a3a13393f

                                                                                SHA1

                                                                                7e1cd601e2f21fc8186271fc3bfbc0d55f36edf2

                                                                                SHA256

                                                                                c962cd97a18c4e624e01d42feb2b79839a465376a3cb8cd5664c14edfb16e912

                                                                                SHA512

                                                                                43a7f891f369d97e92d43a32f087f75e34f6ae0796e8a6ca6316735ccbb7211a79ceaaf4134a47d05746b4c9c660324a375b47f1608bb476c3737d9442625493

                                                                              • C:\Users\Public\Documents\Media\line.dat

                                                                                Filesize

                                                                                74B

                                                                                MD5

                                                                                9a183fa5decb55ccafeeef2bc2c2338a

                                                                                SHA1

                                                                                048c8b157d61f5364c678a966045224b70b355d4

                                                                                SHA256

                                                                                6979a9d011a33426a574e41ccf15560e00af3c6975a48586fea43c3c9ac3ca2e

                                                                                SHA512

                                                                                b3aa00454b915928844af1a7836f2c088a202aa0ae3604cc511c5571ca20a4ed5c2a4c907f3e4a0d1dd8b6b329ce653a8f96d2c83ce91f64a899d3006f845e4a

                                                                              • \ProgramData\wmimgmt.exe

                                                                                Filesize

                                                                                320KB

                                                                                MD5

                                                                                1359c6354ca6f617b36c738abdb993bb

                                                                                SHA1

                                                                                b0c6aff2a1725520bf76755375c2900ccfb2f742

                                                                                SHA256

                                                                                e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

                                                                                SHA512

                                                                                d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

                                                                              • \ProgramData\wmimgmt.exe

                                                                                Filesize

                                                                                320KB

                                                                                MD5

                                                                                1359c6354ca6f617b36c738abdb993bb

                                                                                SHA1

                                                                                b0c6aff2a1725520bf76755375c2900ccfb2f742

                                                                                SHA256

                                                                                e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

                                                                                SHA512

                                                                                d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

                                                                              • \ProgramData\wmimgmt.exe

                                                                                Filesize

                                                                                320KB

                                                                                MD5

                                                                                1359c6354ca6f617b36c738abdb993bb

                                                                                SHA1

                                                                                b0c6aff2a1725520bf76755375c2900ccfb2f742

                                                                                SHA256

                                                                                e741fb9d0eb11801dd163875479a8b56eff8ae5f3ca1987b996026f752693641

                                                                                SHA512

                                                                                d6ae88baf601fac71f360ce7dcfd1f40fb9c0fb8eedf1f502924e52a3abe83e1e80f103a3afda4ac1ed316c1e5e8a23b26017b0c96164dc49f36e57b016b5473

                                                                              • memory/552-131-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-100-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-132-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-133-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-139-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-141-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-144-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-147-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/552-150-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/1356-70-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                Filesize

                                                                                348KB

                                                                              • memory/1996-64-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/1996-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/2024-55-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                Filesize

                                                                                348KB